
The 10 laws of safety
IT security is a highly dynamic field that must constantly adapt to new threats and technological innovations.
Many security measures that were considered sufficient a few years ago may no longer be effective today. At the same time, there are certain basic principles that have never lost their validity over time.
A prime example of this are the “laws of security” formulated by Microsoft. Although they were published several years ago, they have not lost their place as guidelines in the modern IT security world.
1. Physical access means loss of control
“If an attacker has physical access to your computer, it’s no longer your computer.”
The first point sounds simple at first, but it has far-reaching consequences. If someone can gain unhindered access to a server or workstation, several attack paths open up: manipulating hardware, installing keyloggers or changing system configurations to create backdoors.
What does this mean for companies today?
Especially in a world where many employees work remotely or use their devices in public areas, strict physical security measures should be a top priority. These include locking systems for server rooms, cameras, access logging, security guards and the security of mobile devices (e.g. through laptop locks). It is also important to integrate remote workplaces – i.e. home office or co-working situations – into the security concept. No one should make the mistake of believing that physical vulnerabilities are less relevant in the age of the cloud. A lost or stolen notebook can quickly become a gateway for industrial espionage or ransomware attacks.
2. Malware undermines all protective measures
“If someone can run malware on your system, it’s no longer your system.”
This means that once attackers are able to execute arbitrary code, even robust defenses such as firewalls and antivirus programs can be quickly bypassed. Zero Trust is the buzzword that is becoming increasingly important in this context: The approach states that you should not trust anyone or any application until the opposite is explicitly proven.
Today, cybercriminals are very creative and often use AI-based attack strategies to quickly find and exploit vulnerabilities. Therefore, classic endpoint protection solutions alone are no longer sufficient. A combination of multi-layered protection mechanisms such as behavior-based malware detection, application whitelisting, and continuous monitoring (e.g., Security Information and Event Management, SIEM) is recommended. If you rely solely on “my virus scanner already detects malware”, you lose valuable time and possibly the entire system in an emergency.
3. Administrator privileges open all doors
“If someone gains administrator privileges, they own the entire system.”
With administrator or root privileges, attackers can perform any action they want: access data, create new users, disable security mechanisms, and more. For this reason, the
How can this be implemented in practice?
- Privileged Access Management (PAM): Special tools monitor and log administrator access.
- Multi-factor authentication (MFA): MFA has long been indispensable for particularly critical accounts.
- Regular audits: Regularly checking which accounts actually need admin rights helps to prevent “privilege creep”.
Hacker groups prefer to use vulnerabilities in account management or sloppily configured systems to permanently establish themselves in the network. A current example is attacks on cloud services, in which misconfigurations or default passwords that have remained blank are exploited. Those who implement carefully managed administrator rights and strict password policies have a clear advantage.
4. Without a backup plan, data loss is inevitable
“If you don’t have a backup plan, your data loss is inevitable.”
“If you don’t have a backup, then no pity!”
The frequency of ransomware attacks shows how crucial a reliable backup and recovery plan is. In an emergency, an encrypted system can only be restored quickly if the data is secure and duplicated elsewhere. The 3-2-1 rule (three copies on two different media, one of which is off-site) continues to be the proven standard.
Currently, many companies have already implemented cloud backup solutions, but must ensure that backups are encrypted and protected from unauthorized access. In addition, regular rehearsals should be held to see if the restoration works as planned – in stressful situations, there is no time for improvisation.
5. Cryptography works, but it’s complex
“Strong cryptography works, but no one says it’s easy.”
Cryptography is one of the most important foundations of IT security. It ensures protected transmissions (e.g., HTTPS or VPN) and secure data storage (e.g., disk-level encryption). But even the best encryption is of no use if it is implemented incorrectly – be it due to inappropriate key lengths, faulty certificate chains or outdated algorithms such as SHA-1 or SSLv3.
Today, strong TLS configurations (e.g. TLS 1.2 or higher), modern hash algorithms such as SHA-256 or SHA-3 and the conscientious management of certificates are recommended. In addition, companies should regularly check the status of their keys and protocols used – ideally with the help of automated scanning tools that report outdated TLS versions or expired certificates.
6. The weakest link determines the level of protection
“The security level of your system is only as strong as its weakest point.”
If the IT infrastructure is spread over several locations, cloud services, mobile devices and external service providers, gaps are quickly created that hackers can exploit. There are known cases in which successful cyberattacks were triggered via seemingly harmless third-party interfaces.
Therefore, it is advisable to take a holistic view :
- Regular penetration tests identify vulnerabilities at an early stage.
- Patch management should be automated and timely.
- Third-party components (e.g. plugins or libraries) must not remain unseen in the IT landscape.
This approach prevents individual “forgotten” systems from becoming a gateway that can compromise an entire network.
7. Vulnerability secrecy is not a security
“Keeping security vulnerabilities secret is not the same as security.”
Open communication about security issues fosters trust and offers the opportunity to quickly remedy vulnerabilities. The so-called
From personal experience, I know that if a company reacts quickly and transparently to safety-critical incidents, this ultimately strengthens customer relationships. The times when you believed that security vulnerabilities could be kept “secret” are long gone. Especially through social media and hacker communities, information spreads rapidly.
8. Antivirus software alone is insufficient
“Antivirus software is important, but not omnipotent.”
While a classic antivirus solution is an essential part of the security strategy, it is by no means a panacea. Increasingly sophisticated attacks, such as zero-day exploits, can be circumvented by signature-only scanners. A multi-layered protection concept should therefore include further building blocks:
- Network segmentation: Attackers cannot easily spread throughout the network.
- Intrusion Detection/Prevention Systems (IDS/IPS): Suspicious patterns in traffic are detected.
- Security awareness training: Employees learn to recognize phishing emails and social engineering tricks.
The trick is to combine technical measures in such a way that gaps are minimized and attacks are detected at an early stage. A well-designed IT security architecture prevents infections from spreading like wildfire.
9. Humans as the greatest risk
“People remain the greatest security risk.”
Social engineering attacks such as phishing, spear phishing or CEO fraud show how strongly human factors intervene in the security chain. Even the most secure system can be bypassed if there is a careless click on an infected email attachment or if sensitive credentials are exposed in plain text.
Regular training is therefore an absolute must. Employees should know how dangerous even a click can be and what indicators speak for phishing (e.g. dubious sender addresses, spelling errors or prompting language). An open company culture in which no one is afraid to report a possible incident immediately is just as important. Because the faster you react, the lower the damage.
10. Technology alone does not solve problems
“Technology cannot solve social problems.”
The last point reminds us that IT security is not just about hardware and software. Human aspects, corporate culture, strategic planning and clear processes are at least as crucial. No matter how many technical protective measures you put in place, if management does not take IT security seriously or employees are not aware of the dangers, gaps will remain.
If you want to firmly anchor IT security in your company, you should first define a security strategy and create clear responsibilities. Training, guidelines and a fixed process for handling security incidents (incident response) ensure that action is structured in the event of an emergency. Only if everyone in the company pursues the common goal of “safety” can you be successful in the long term.
Result
The “Ten Immutable Laws of Security” are more relevant than ever, despite all the technological advances and changes in the IT landscape. Whether cloud, mobile computing or AI-based attacks – these principles form a stable foundation for any IT security strategy. The central message: It is not only technology that matters, but also processes, culture and human behavior. Those who take these principles to heart and implement them consistently are much better prepared against ransomware, data theft and other attacks.
Modern IT security is a balancing act between caution and pragmatic action. At a time when even the smallest vulnerability can be quickly exploited, companies should understand the Ten Immutable Laws of Security not as a rigid set of rules, but as living guidelines that must be adapted and sharpened again and again. Because what was safe yesterday may be outdated tomorrow. Only through continuous development and a holistic security culture can you always stay one step ahead of the attackers.
| Source | URL |
|---|---|
| Microsoft Learn – Security | https://learn.microsoft.com |
| Microsoft Learn – Laws of Security | https://learn.microsoft.com |
| BSI (Federal Office for Information Security) | https://www.bsi.bund.de |
| NIST Cybersecurity Framework | https://www.nist.gov/cyberframework |

