National Cyber Security Centre: ‘It’s entirely possible to build good, secure tech using an agile approach’
The NCSC’s chief architect describes the agile approach taken to developing its IT systems
Lego figures fixing a computer - Image credit: marie-lyse briffard via Flickr
The UK’s National Cyber Security Centre has revealed how it built its new IT systems using an agile approach, saying that waterfall “was never going to bring this job in on time”.
The London-based centre, which launched in October last year but was officially opened by the Queen this week, created its own IT system from scratch.
This, it said, was because none of the existing IT systems designed for working with information classified in the category ‘official’ met the needs of the centre – which was formed from several different organisations under the parent body GCHQ.
In a blog post, the centre’s chief architect, named as Richard C, said that the existing systems did not “strike the right balance of security, usability and functionality required” by the new organisation.
He said that having an agile approach was crucial. “A traditional waterfall approach was never going to bring this job in on time.”
However, he noted that there were areas where using agile techniques would be “tricky”, such as procurement of commercial services and equipment.
“While it’s possible to iterate the code which defines the configuration of our service, frequently changing our minds about the hardware we use just isn't practical,” he said.
The blog post also emphasised that it is “entirely possible to build good, secure tech using an agile approach”.
The main difference is that the system needs to be evolved over time, with risks taken in “sensible ways” while building in new functionality of security into the system.
“On day one, we were running a relatively high risk in some areas while we were comfortable with the controls we had in place elsewhere,” he wrote.
In addition, the team had to take “well-informed decisions to accept calculated risks” in the knowledge that more controls would be added as deployment numbers increased.
Working in this way meant that each sprint added not only new features to the system, but also increased security.
“The risks we take change on a sprint by sprint basis. We’ll continue to take sensible decisions, security being considered as an important factor, along with various other demands of the project, like usability and cost,” he writes.
Because of this approach, however, the system will “never be ‘accredited’ in the traditional sense of a point-in-time decision, because it will never be ‘done’”.
The centre had three main design principles for the project: technology, security and user experience.
However, he says that the most important element is that the system is “a pleasure for people to use”, noting that “a highly secure solution that no-one uses isn’t secure at all”.
Intelligence experts from the NCSC were in Edinburgh and Glasgow to meet counterparts
A series of cyber attacks has grabbed the headlines – what is being done to protect our data and our safety?
Early relationship breakdown, an overreliance on an existing IT system and the inability to test the system until a late stage all contributed to the failure of the i6 project, Audit Scotland...
As the internet of things becomes more common, cyber security is not just about financial and reputational loss, but also physical safety
Microsoft Surface has helped Cheshire Police reduce paperwork and free up time
Microsoft partner FlowForma walks through its efforts to empower local government as part of a series that highlights local government innovators across the UK
Microsoft partner CPS walks through its efforts to empower local government as part of a series that highlights local government innovators across the UK
Microsoft looks at how intelligent business applications can help the public sector improve service delivery