It's a good list, but like most (all?) of these lists it doesn't offer too much advice on organizational best practices.<p>IMO a security program which cannot justify its own worth to others in the organization is incomplete.<p>Most security professionals I've met (and I've been one of them, too) assume that security is or should be everyone's top priority. They struggle to deal with people for whom security is just one of many competing concerns.
I think of myself as pretty security-conscious. But it's striking to me just how _long_ this list is. Even as someone who is trying to constantly think about this stuff, if I were faced with a list of this magnitude, I'd be tempted to throw in the towel and admit defeat right off the bat. It's no wonder so many SaaSes end up getting exposed. Even with a lot of best practices built in to so many cloud providers... how did we as an industry end up in a place where it's this dang hard to keep systems secure?
This list is the "brute force" security algo. Eg 'just make everything more secure'. This would have someone upgrading a door lock with a hole in an adjacent wall.<p>There are at least the following major factors:<p>* what might happen (event A,B, ...) ?<p>* how probable is eventi?<p>* what is the cost if eventi happens?<p>* how can one deal with eventi? (action 1, 2 ...) ?<p>* how much / how long does actioni take?<p>* what actions should we perform with the skills/resources/time we have?<p>My algo:<p>1 enumerate possible security issues<p>2 assign approx probability and cost to business<p>3 re-order by prob*cost<p>4 imagine ways to address issues, assign cost to address<p>5 decide on courses to address issues<p>6 for next epoch, address issues<p>7 goto 1
I don’t see any mention of domain names. Domain names should be set up properly, like implementing dnssec, dmarc, dkim, spf, and using a secure registrar. So many overlook domain security.
While I'm generally a fan of the Sqreen checklist that this is built on, looking over it with fresh eyes I have quite a few quibbles:<p>"Require 2FA wherever possible" - Given the target audience, it would be nice if this was explicit about the reason to use hardware keys (including those builtin to TouchID + chromebooks).<p>"Accustom your team to locking their computers" - This is good advice, but I'd recommend configuring locking on inactivity a higher leverage effort<p>"Hire your first security engineer" - "do we have a security roadmap? do we manage to deliver on it?" is not a good heuristic for whether you need a security hire. I'd argue that most startups will lack a formal security roadmap when they don't have dedicated security staff. For example, the linked First Round article [1] has a more actionable recommendation, with justification: "Onboard your first, full-time security hire between 30-100 employees."<p>"Set up a bug bounty program (NEXT)" and "Monitor your user’s suspicious activities (NEXT)" being placed before "Have a security incident response plan (LATER)"<p>[1] <a href="https://review.firstround.com/how-early-stage-startups-can-enlist-the-right-amount-of-security-as-they-grow" rel="nofollow">https://review.firstround.com/how-early-stage-startups-can-e...</a>
Previously — <a href="https://news.ycombinator.com/item?id=16615593" rel="nofollow">https://news.ycombinator.com/item?id=16615593</a><p>With Sqreen's acquisition, the list's previous home unfortunately redirects the their acquisition announcement. We're grateful that they released the list under CCA and we look forward to keeping it updated and relevant to startups on beginning their infosec journeys.
2FA on itself is good, but should not be an excuse for corporate to own my cell phone.<p>They want to send messages with codes to my phone? I'll live with it. But then they want me to buy a phone with more recent android version. Then they want to enforce biometrics and encryption on my phone. Then they want to remotely erase my phone?<p>No. If central IT wants that kind of access, they should buy me a phone.
This is the first I'd heard of RASP (runtime application self protection), so thanks for that, I think. Now I need to decide which RASP tool to use.
Company that want to become SOC2 or iso27001 can automate all of this and more with <a href="https://www.vanta.com/" rel="nofollow">https://www.vanta.com/</a>. This helps us a lot at <a href="https://mergify.io" rel="nofollow">https://mergify.io</a> for our SOC2 certification.
Whenever I'm forced to use 2fa the most probable outcome is that I will get locked out when I need to log in the most.
Not to mention most implementation in the wild trivially reduces to 1 factor.<p>I could make a case for MFA if really pressed, but M=2 is such a bad choice too.
I didn't see ransomware mentioned anywhere in there.<p>At best being ignorant of that risk is going to result in fiscal losses and dubious legalities wrt sanctions, at worst existential risk to the company.