National Cyber Security Centre: ‘Entirely possible to build secure tech in an agile way’
The UK’s National Cyber Security Centre has revealed how it built its new IT systems using an agile approach, saying that waterfall “was never going to bring this job in on time”.
The centre is located in London, in addition to its parent body, GCHQ's base in Cheltenham - Photo credit: PA
The London-based centre, which launched in October last year but was officially opened by the Queen yesterday, created its own IT system from scratch.
This, it said, was because none of the existing IT systems designed for working with OFFICIAL information met the needs of the centre – which was formed from several different organisations under the parent body GCHQ.
The centre’s chief architect, known as Richard C, said that the existing systems did not “strike the right balance of security, usability and functionality required” by the new organisation.
Pasting passwords gets seal of approval from National Cyber Security Centre
“Active cyber defence”: UK’s first National Cyber Security Centre chief sets out strategy
Are we entering a 'cognitive era'?
In a blogpost setting out the centre’s work, Richard said that having an agile approach was crucial. “A traditional waterfall approach was never going to bring this job in on time,” he said.
However, he noted that – because the project was an infrastructure one – there were areas where using agile techniques would be “tricky”, such as procurement of commercial services and equipment.
“While it’s possible to iterate the code which defines the configuration of our service, frequently changing our minds about the hardware we use just isn't practical,” Richard said. “There are some choices it pays to get right first time.”
The blogpost also emphasised that it was “entirely possible to build good, secure tech using an agile approach”. The main difference is that the system needs to be evolved over time, with risks taken in “sensible ways” while building in new functionality of security into the system.
“On day one, we were running a relatively high risk in some areas while we were comfortable with the controls we had in place elsewhere,” Richard wrote.
In addition, the team had to take “well-informed decisions to accept calculated risks” in the knowledge that more controls would be added as deployment numbers increased.
Working in this way meant that each sprint added not only new features to the system, but also increased security.
“The risks we take change on a sprint by sprint basis. We’ll continue to take sensible decisions, security being considered as an important factor, along with various other demands of the project, like usability and cost,” Richard said.
Because of this approach, however, the system will “never be ‘accredited’ in the traditional sense of a point-in-time decision, because it will never be ‘done’”.
The centre had three main design principles for the project: technology, security and user experience.
Among the security principles were that the centre follows its own advice on security enterprise technology, patch “aggressively and automatically” and “avoid creating complex trust relationship with other IT systems” to maintain its autonomy.
On the technology side, the centre followed the government’s Technology Code of Practice and noted that it does not need “gold level” support or availability for everything – only for some elements like email or communications tools.
However, in the blogpost, Richard said that the most important element was that the system was “a pleasure for people to use”, noting that “a highly secure solution that no-one uses isn’t secure at all”.
In addition to creating a “fantastic” experience for users, the other principles are that users should get a choice of devices, that all device builds are kept “vanilla” as possible to make it easier to maintain them, and that web apps are used over “thick client apps”.
The blogpost is part of the centre’s efforts to be more open about its work, with other posts including advice on password security, cloud security and securing smartphones.
Cybersecurity unit director reveals how US intelligence agency is working to spread best practice by promoting openness and collaboration
As an ever-greater volume of increasingly sophisticated devices watch us all, PublicTechnology talks to regulator Tony Porter about his office’s role in ensuring surveillance is always...
CEO of capital-based not-for-profit trust that helps schools to get the most out of technology discusses plans to expand into the education space outside London and the wider public sector
Former senior civil servant Andrew Greenway looks at the reasons for both optimism and scepticism as the government embarks on another shared-services rollout
BT brought together CIOs from well known organisations to identify the key threats and opportunities that new technologies are presenting
Hartley was a senior officer in the RAF and now works in cyber security for BT. Ahead of the BT Cyber Security Careers Insight, the Officers' Association asked him to...
BT's Andy Rowland on technological risk, and how the systems fundamental to modern life are under attack
BT's Mike Pannell on the different ways of anonymising information and their application to IoT data