Architecture and configuration: an important aspect for cyber security

In today’s digital age, security is of paramount importance when designing, building, maintaining and managing systems. An important aspect of ensuring the security of systems is to pay close attention to the architecture and configuration of the system. In this blog, we will explore the importance of architecture and configuration in designing, building, maintaining and managing secure systems.
Architecture
A system’s architecture determines how its components and subsystems are organized and interact with each other. A well-designed architecture can make a system more secure by reducing the attack surface and making the system more resistant to attacks.
One approach to designing a secure architecture is to follow the principle of least privilege. This principle states that a system should grant only the minimum permissions a user or process needs to perform its tasks. Following this principle reduces the attack surface because any malicious activity is limited to the permissions allowed.
Another approach to designing a secure architecture is the concept of “defense in depth.” In this approach, multiple layers of security measures are implemented that work together to protect the system. Examples of these security measures include firewalls, intrusion detection systems and access control mechanisms. By implementing multiple layers of security, a single security flaw is unlikely to result in a breach of the system.
Configuration
A system’s configuration refers to the specific settings and options selected to make the system work. Configuration plays a crucial role in system security because misconfigured settings can make a system vulnerable to attack.
One approach to securely configuring a system is to follow industry best practices. Many organizations and regulatory agencies publish guidelines for securing systems, and following these guidelines can help ensure that a system is properly configured. Examples of these guidelines include the Center for Internet Security’s Critical Security Controls (CIS Controls) and the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework.
Another way to securely configure a system is to conduct regular security audits. These audits can reveal any misconfigurations or vulnerabilities in the system and help prioritize necessary security measures to mitigate risks. Regular security audits also ensure that the system remains secure as new threats emerge.

Benefits of building a good architecture and configuration
- Protective approach
A proactive approach to security from the very beginning of development. This can help create systems that are easier to keep secure and minimize the need for costly remediation work later.
- Trust
When a system is properly designed and configured, it inspires confidence that the security measures in place effectively mitigate the risks an organization considers important.
- Constantly monitoring and assessing
It’s not enough to just build a secure system. Managing and maintaining security over time is just as important. By constantly monitoring and assessing or auditing the security of a system, organizations can stay ahead of new threats and ensure their systems remain secure.
What measurements need to be taken?
To guarantee the safety of a system, various steps need to be taken:
- Understand what you’re building and why
It’s essential to understand what you’re building and why before designing a system. This means taking time to understand the context in which the system will function, including the risks your organization is and is not willing to accept, as well as a threat model for the system. By identifying the critical systems and components in relation to your organization’s objectives, you can focus your efforts on the most important areas.
- Follow a risk-based approach
When selecting security controls, it’s important make choices based on the risks identified and their effectiveness in mitigating the types of attacks expected based on your threat model. It’s not enough to simply implement all possible security measures; a risk-based approach ensures that resources are allocated where they are most needed.
- Adaptability to keep up with changes in the threat landscape
It’s important to think about the expected lifespan of systems and how they can adapt to a changing context. The cybersecurity landscape is constantly changing and systems must be able to adapt to new and emerging threats to stay safe.
- Implement a combination of technical and policy controls
It’s important to monitor and manage the way changes are made. This can be achieved through a combination of technical and policy checks to ensure that all changes are authorized and have undergone appropriate checks to ensure they do not adversely affect the live services. These controls should be designed so that security updates and vulnerability fixes can be applied easily and quickly, minimizing exposure to known vulnerabilities.
Multifactor authentication (MFA) for a stronger management interface
In the case of administrative accounts, MFA is particularly important, as these accounts have access to sensitive and critical functions that, if hacked, could have serious consequences.
By enabling MFA for administrative accounts, organizations can significantly reduce the risk of unauthorized access to these accounts. Even if an attacker manages to get an account’s password, they would still need to provide an additional form of identification (such as a code generated by a mobile app or a biometric scan) to gain access. This makes it much more difficult for attackers to hack into these accounts and perform malicious activities.
In short…
The architecture and configuration of a system are critical to its security. A well-designed architecture can reduce the attack surface and increase the system’s resilience to attacks, while a secure configuration can mitigate risk and prevent vulnerabilities. By paying close attention to architecture and configuration, organizations can design, build, maintain, and manage systems that are secure and resistant to attack.
If you have questions or concerns about the architecture and configuration within your organization, we can certainly help you explore different approaches to tackling compliance, or put you in touch with one of our experts who can provide more specific advice.
OpenSight Summer Series
During the OpenSight Summer Series, we publish weekly blogs that elaborate on the following topics:
- Risk management
- Engagement and training
- Asset management
- Architecture and configuration
- Vulnerability management
- Identity and access management
- Information security
- Logging and monitoring
- Incident management
- Supply chain security
By implementing the security measures outlined in these ten steps, organizations can reduce the likelihood of cyberattacks and lessen the impact of potential incidents.Learn more about the OpenSight Summer Series here!