Why do we call them trust boundaries?

 Adam Shostack's post delves into the terms "trust boundaries" and "security boundaries" in cybersecurity, exploring their history, distinctions, and applications. While "security boundaries" denote well-defined, robustly defended areas by security policy, "trust boundaries" imply broader trust-related elements, including privacy and computing bases. Shostack critiques the inconsistent commitments by companies to defending boundaries and explores if trust, as a concept, merits specific distinction within threat modeling practices. 

https://shostack.org/blog/trust-and-security-boundaries/

Comments

Popular posts from this blog

Secure Vibe Coding Guide: Best Practices for Writing Secure Code

OWASP SAMM Skills Framework Enhances Software Security Roles

Opengrep: Open-Source SAST for Code Security and Innovation