MX SBD™
Security-by-Design Framework

Maximus has managed to install various compliance programmes with our Customers that requires compliance to Singapore Cyber Security Act, CII Cybersecurity Code of Practice (CCOP), and related cybersecurity requirements.

Our distinctive compliance methodology has led to a revolution in the ways many Critical Information Infrastructure Owners (CIIO) fortify their compliance approach whilst managed compliance cost.


cybersecurity 

Security-by-Design (SBD) Framework 

Maximus methodology used for performing Security-by-Design (SBD) is a combination of models/frameworks and standards including zero trust security, defence-in-depth, Enterprise Architecture (EA), ISO/IEC 27002, CIS v8 and SP800-series standards.

MXMS SBD™ adopts the zero trust security model where the concepts of defining mission outcomes, architect from inside outside, determine who/what needs access to the critical Data/Assets/Applications/ Services (DAAS) to create access control policies, inspect and log all traffic before acting.

While “Defining mission outcomes” in the zero trust concept allows designers of the system to focus on right places to secure the solution, the rest of the concepts are principle-based and require further elaboration. SBD frames the security concerns through the EA framework of this system in which this framework helps architects, designers, engineers and reviewers understand how an organization's systems and assets are logically structured and connected. There are four architectural layers in an EA framework, business, data, application and technical architectures.  

our solutions

Security Planning Advisory

System Classification Advisory

Threat and Risk Assessment

Tender Security Requirements Analysis and Advisory

Tender Security Specification Evaluation & Advisory

Critical Security Design Review (Architecture Security & Security Controls)

Application Security Testing & Source Code Review

System Security Acceptance Testing

Network Service Penetration Testing

Application Penetration Testing

Cybersecurity Audit

Configuration Management Advisory

Change Management Advisory

Secure Disposal Advisory

If you want to learn more about how we managed to assist various organizations in integrating security into their SDLC, feel free to contact us.

We use cookies
Cookie preferences
Below you may find information about the purposes for which we and our partners use cookies and process data. You can exercise your preferences for processing, and/or see details on our partners' websites.
Analytical cookies Disable all
Functional cookies
Other cookies
We use cookies to personalize content and ads, to provide social media features and to analyze our traffic. Learn more about our cookie policy.
I understand Details
Cookies