YOU MIGHT ALSO LIKE
ASSOCIATED TAGS
access  assume  breach  controls  exactly  google  instead  million  months  people  phishing  policy  principles  security  vulnerability  
LATEST POSTS

What Are the 8 Rules of Security Everyone Keeps Getting Wrong?

Where the Myth of "8 Rules" Actually Comes From

The idea of “8 rules” likely traces back to outdated military or government doctrine—think old-school Air Force or NSA handbooks from the 90s, where access, authentication, and air-gapped systems ruled. But those frameworks were built for closed networks, not today’s cloud-first, remote-work, API-driven chaos. Still, the number stuck. Why eight? Probably because it’s enough to feel comprehensive without being absurd. But here’s the truth: no single authoritative source—NIST, CIS, ISO—lists exactly eight rules. Instead, they bundle best practices into frameworks with dozens of controls. So when people ask about the “8 rules,” they’re usually referring to a distilled, street-level version of cybersecurity hygiene. Except that’s exactly where confusion starts. Because while the principles may overlap, the execution rarely does.

The Core Philosophy: Defense Is a Mindset, Not a Checklist

You can patch every vulnerability, encrypt every drive, and still get owned because someone clicked a link. That’s why the first mental shift is this: security fails not when systems break, but when trust is exploited. Humans are wired to cooperate, not suspect. We open doors for people behind us. We answer emails from “HR.” We trust software updates. And because of that, social engineering remains the top attack vector—involved in over 90% of breaches. So any real “rule” must start with psychology, not firewalls. It’s not enough to say “don’t click.” We need to design systems that assume clicking will happen.

Origins in Real Doctrine: The CIS Critical Security Controls

The closest thing to a modern “rule set” is the CIS Critical Security Controls—a list of 18 prioritized practices, not 8. But if you squint, you can distill it down. Inventory and control of hardware assets? That’s rule one, in spirit. Continuous vulnerability management? Rule two. Controlled use of administrative privileges? Rule three. You get the pattern. These aren’t arbitrary. They’re based on actual breach post-mortems. For example, the 2017 Equifax breach happened because a known vulnerability in Apache Struts went unpatched for 60 days. Simple fix. Catastrophic failure. Which explains why “patch fast” is less a rule and more a survival reflex.

How Modern Threats Have Rewritten the Old Rules

Back in 2005, perimeter security made sense. You had a network. You walled it off. Done. But now? Employees work from Bali. Vendors connect via third-party SaaS apps. Contractors use personal laptops. The perimeter is gone. So is the old rule: “keep outsiders out.” Instead, we have zero trust—“never trust, always verify,” even if you’re inside. And that changes everything. Google’s BeyondCorp model proved it: they removed the corporate network entirely. No VPNs. No internal zones. Every access request is treated as hostile. That’s not paranoid. It’s realistic. Because the average time to detect a breach is still 207 days (IBM again). That’s seven months of free rein for attackers. So the new rule isn’t “build a wall.” It’s “assume you’re already breached.”

Cloud Environments: Where Old Rules Collapse

Take misconfigured S3 buckets. One typo in an AWS permission setting, and suddenly your customer database is public. It happens daily. In 2022, a single misconfigured bucket exposed 540 million Facebook user records. And because cloud environments are API-driven, dynamic, and often managed by developers—not security teams—the old “set it and forget it” model fails. Automation isn’t optional here—it’s oxygen. Tools like AWS Config, Azure Policy, or open-source Open Policy Agent enforce guardrails in real time. But adoption? Spotty at best. Why? Because security teams are understaffed, and developers move fast. The friction between “ship code” and “secure code” is real. And that’s where policy-as-code comes in—writing security rules in the same language as infrastructure (think Terraform, YAML). It’s not perfect. But it’s better than a PDF document no one reads.

Remote Work: The End of the Trusted Office

When Zoom went from 10 million to 300 million daily users in three months (early 2020), no one paused to ask: “Is this secure?” Suddenly, employees were joining meetings from home networks, using personal devices, sharing screens with family members in the background. The risk surface exploded. Default passwords, weak MFA, unpatched firmware—each a potential entry point. And yet, many companies still treat remote access as a secondary concern. They deploy VPNs but skip endpoint detection. They enable MFA but allow SMS—which can be hijacked via SIM swapping. (Yes, really: in 2019, a hacker stole $24 million in crypto by porting a victim’s number.) So the rule here isn’t “use MFA.” It’s “use phishing-resistant MFA,” like FIDO2 keys or authenticator apps. A subtle difference. A massive impact.

8 Practical Principles That Actually Work in 2024

Forget the myth. Let’s build a real set of 8 actionable principles—based not on nostalgia, but on what’s working now. These aren’t theoretical. They’re battle-tested.

1. Assume Breach—Because You Probably Are Compromised

Adopting a “assume breach” mindset means you stop asking “if” and start asking “where.” It shifts your focus from prevention to detection and response. That means logging everything—DNS queries, file access, login attempts—and feeding it into a SIEM. It means running purple team exercises, not just compliance audits. It means accepting that antivirus won’t save you. (Look at the 2020 SolarWinds attack: sophisticated malware flew under the radar of every major AV vendor.) So what do you do? You monitor behavior. You look for anomalies—like a user logging in from Tokyo at 3 a.m. after always being in Chicago. And you automate response: isolate the device, freeze the account, trigger an alert. Because prevention fails. Detection saves.

2. Enforce Least Privilege—No Exceptions, Even for Executives

Here’s a story: a CFO wanted local admin rights to install a “special reporting tool.” IT said no. He escalated. They gave in. Three weeks later, his machine was infected via a malicious Excel macro. Lateral movement began. $1.2 million siphoned via fake vendor payments. And that’s exactly where privilege creep kills. The rule is simple: users get only the access they need, nothing more. No exceptions. Not for VPs. Not for “special projects.” Tools like Just-In-Time (JIT) access or Privileged Access Management (PAM) make this enforceable. Microsoft’s own data shows that removing local admin rights reduces malware infection rates by up to 92%. That’s not a statistic. That’s a mandate.

3. Patch Relentlessly—Speed Matters More Than Perfection

Patching isn’t glamorous. It’s tedious. It breaks things sometimes. But the math is clear: 60% of breaches exploit known vulnerabilities for which a patch exists. The average patching delay? 69 days. That’s over two months of exposure. So the rule isn’t “patch when convenient.” It’s “patch within 48 hours for critical CVEs.” Use automated tools. Test in staging. But move fast. Because attackers aren’t waiting. The Log4j vulnerability (CVE-2021-44228) had exploits within hours of disclosure. Companies that patched in 24 hours avoided the worst. Those that waited? Breached. No debate.

4. MFA Everywhere—But Not All MFA Is Equal

You’ve heard it a thousand times: enable MFA. But here’s what no one says: SMS and voice-based MFA are broken. They’re better than nothing, sure. But they’re vulnerable to SIM swaps, SS7 exploits, and phishing proxies. The real standard? FIDO2 security keys or app-based tokens (Google Authenticator, Microsoft Authenticator). Why? They’re phishing-resistant. Even if you enter your credentials on a fake login page, the attacker can’t reuse the MFA token. Google reported zero successful account takeovers among its 85,000 employees after mandating security keys. Zero. That’s not luck. That’s design.

Why Some “Rules” Are Overrated—and What to Do Instead

Let’s be honest about this: some security advice is outdated. Take password complexity rules—“use symbols, numbers, uppercase.” It sounded smart in 2003. Now? It leads to “Password1!”—predictable, reused, and easy to crack. NIST now recommends length over complexity: 12+ character passphrases, like “correct-horse-battery-staple.” Better yet? Eliminate passwords entirely with passkeys. (Yes, they’re real. Apple, Google, Microsoft all support them.) And that’s the shift: from inconvenient rules to frictionless security. Because if it’s hard, people will bypass it. Always.

Frequently Asked Questions

Is There a Real, Official List of 8 Security Rules?

No. Not from any major standards body. NIST has 20 controls in its Cybersecurity Framework. ISO 27001 has 93 controls. The idea of “8 rules” is more of a heuristic—a way to simplify a complex field. But simplification has limits. Experts disagree on what should be included. Some emphasize encryption. Others prioritize incident response. Data is still lacking on which single control offers the most ROI. So take any “8 rules” list with a grain of salt. Focus instead on risk-based prioritization.

Can Small Businesses Apply These Rules Without a Big Budget?

Absolutely. Many controls cost nothing. Enforcing MFA on Office 365? Free. Disabling local admin rights? Free. Using built-in logging in Windows or macOS? Free. For under $50/month, you can get endpoint detection (like Bitdefender or Kaspersky). And that’s exactly where budget isn’t the barrier—awareness is. Too many small shops think they’re “not a target.” Wrong. Automated bots scan the internet 24/7. They don’t care if you’re a Fortune 500 or a three-person bakery. If you’re online, you’re in the crosshairs.

How Often Should Security Training Happen?

Once a year? Useless. People forget. Threats evolve. The best programs run monthly micro-training—5-minute videos, phishing simulations, real-time feedback. KnowBe4 reports that regular training reduces click rates on phishing tests from 30% to under 5% in six months. That’s not magic. It’s repetition. And because habits form slowly, you need constant reinforcement. But don’t just quiz people. Show them real examples—emails that fooled others. Make it personal.

The Bottom Line

The so-called “8 rules of security” aren’t a checklist. They’re a starting point for a culture shift. Because the real rule—the one no one talks about—is this: security only works when it’s everyone’s job, not just the IT team’s. A perfectly configured firewall won’t stop a CEO from wiring $500k to a fake vendor. No amount of encryption helps if someone hands over their password “to fix the login issue.” So invest in tools, yes. But invest more in awareness, in design, in assuming failure. And for the love of all things digital, stop treating security like a one-time project. It’s a practice. A habit. A constant negotiation between risk and reality. Honestly, it is unclear if we’ll ever “solve” security. But we can get better. One patch, one policy, one smart decision at a time. Suffice to say, that’s the only rule worth following.

💡 Key Takeaways

  • Is 6 a good height? - The average height of a human male is 5'10". So 6 foot is only slightly more than average by 2 inches. So 6 foot is above average, not tall.
  • Is 172 cm good for a man? - Yes it is. Average height of male in India is 166.3 cm (i.e. 5 ft 5.5 inches) while for female it is 152.6 cm (i.e. 5 ft) approximately.
  • How much height should a boy have to look attractive? - Well, fellas, worry no more, because a new study has revealed 5ft 8in is the ideal height for a man.
  • Is 165 cm normal for a 15 year old? - The predicted height for a female, based on your parents heights, is 155 to 165cm. Most 15 year old girls are nearly done growing. I was too.
  • Is 160 cm too tall for a 12 year old? - How Tall Should a 12 Year Old Be? We can only speak to national average heights here in North America, whereby, a 12 year old girl would be between 13

❓ Frequently Asked Questions

1. Is 6 a good height?

The average height of a human male is 5'10". So 6 foot is only slightly more than average by 2 inches. So 6 foot is above average, not tall.

2. Is 172 cm good for a man?

Yes it is. Average height of male in India is 166.3 cm (i.e. 5 ft 5.5 inches) while for female it is 152.6 cm (i.e. 5 ft) approximately. So, as far as your question is concerned, aforesaid height is above average in both cases.

3. How much height should a boy have to look attractive?

Well, fellas, worry no more, because a new study has revealed 5ft 8in is the ideal height for a man. Dating app Badoo has revealed the most right-swiped heights based on their users aged 18 to 30.

4. Is 165 cm normal for a 15 year old?

The predicted height for a female, based on your parents heights, is 155 to 165cm. Most 15 year old girls are nearly done growing. I was too. It's a very normal height for a girl.

5. Is 160 cm too tall for a 12 year old?

How Tall Should a 12 Year Old Be? We can only speak to national average heights here in North America, whereby, a 12 year old girl would be between 137 cm to 162 cm tall (4-1/2 to 5-1/3 feet). A 12 year old boy should be between 137 cm to 160 cm tall (4-1/2 to 5-1/4 feet).

6. How tall is a average 15 year old?

Average Height to Weight for Teenage Boys - 13 to 20 Years
Male Teens: 13 - 20 Years)
14 Years112.0 lb. (50.8 kg)64.5" (163.8 cm)
15 Years123.5 lb. (56.02 kg)67.0" (170.1 cm)
16 Years134.0 lb. (60.78 kg)68.3" (173.4 cm)
17 Years142.0 lb. (64.41 kg)69.0" (175.2 cm)

7. How to get taller at 18?

Staying physically active is even more essential from childhood to grow and improve overall health. But taking it up even in adulthood can help you add a few inches to your height. Strength-building exercises, yoga, jumping rope, and biking all can help to increase your flexibility and grow a few inches taller.

8. Is 5.7 a good height for a 15 year old boy?

Generally speaking, the average height for 15 year olds girls is 62.9 inches (or 159.7 cm). On the other hand, teen boys at the age of 15 have a much higher average height, which is 67.0 inches (or 170.1 cm).

9. Can you grow between 16 and 18?

Most girls stop growing taller by age 14 or 15. However, after their early teenage growth spurt, boys continue gaining height at a gradual pace until around 18. Note that some kids will stop growing earlier and others may keep growing a year or two more.

10. Can you grow 1 cm after 17?

Even with a healthy diet, most people's height won't increase after age 18 to 20. The graph below shows the rate of growth from birth to age 20. As you can see, the growth lines fall to zero between ages 18 and 20 ( 7 , 8 ). The reason why your height stops increasing is your bones, specifically your growth plates.