Why do we call them trust boundaries?
Adam Shostack's post delves into the terms "trust boundaries" and "security boundaries" in cybersecurity, exploring their history, distinctions, and applications. While "security boundaries" denote well-defined, robustly defended areas by security policy, "trust boundaries" imply broader trust-related elements, including privacy and computing bases. Shostack critiques the inconsistent commitments by companies to defending boundaries and explores if trust, as a concept, merits specific distinction within threat modeling practices.
https://shostack.org/blog/trust-and-security-boundaries/
Comments
Post a Comment