How does cybersecurity help preserve the integrity of data information and systems more than one answer may be correct?

Data and information protection comprise the third and most important pillar of a sound cyber security strategy. It is crucial to consider the ‘CIA triad’ when considering how to protect our data.

The three-pillar approach to cyber security

This is the third and final article in a series addressing the three-pillar approach to cyber security. The first two pillars are ‘people’ and ‘process’, The last pillar is ‘data and information’.

Data and information protection is the most technical and tangible of the three pillars. The data we gather comes from multiple sources, such as information technology (IT), operational technology (OT), personal data and operational data. It must be properly managed and protected every step of the way.

What is the CIA triad?

When we discuss data and information, we must consider the CIA triad. The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability. Each component represents a fundamental objective of information security.

The three components of the CIA triad are discussed below:

  1. Confidentiality: This component is often associated with secrecy and the use of encryption. Confidentiality in this context means that the data is only available to authorized parties. When information has been kept confidential it means that it has not been compromised by other parties; confidential data are not disclosed to people who do not require them or who should not have access to them. Ensuring confidentiality means that information is organized in terms of who needs to have access, as well as the sensitivity of the data. A breach of confidentiality may take place through different means, for instance hacking or social engineering.
  2. Integrity: Data integrity refers to the certainty that the data is not tampered with or degraded during or after submission. It is the certainty that the data has not been subject to unauthorized modification, either intentional or unintentional. There are two points during the transmission process during which the integrity could be compromised: during the upload or transmission of data or during the storage of the document in the database or collection.
  3. Availability: This means that the information is available to authorized users when it is needed. For a system to demonstrate availability, it must have properly functioning computing systems, security controls and communication channels. Systems defined as critical (power generation, medical equipment, safety systems) often have extreme requirements related to availability. These systems must be resilient against cyber threats, and have safeguards against power outages, hardware failures and other events that might impact the system availability.

Stability, availability and security

Availability is a major challenge in collaborative environments, as such environments must be stable and continually maintained. Such systems must also allow users to access required information with little waiting time. Redundant systems may be in place to offer a high level of fail-over. The concept of availability can also refer to the usability of a system.

Information security refers to the preservation of integrity and secrecy when information is stored or transmitted. Information security breaches occur when information is accessed by unauthorized individuals or parties. Breaches may be the result of the actions of hackers, intelligence agencies, criminals, competitors, employees or others. In addition, individuals who value and wish to preserve their privacy are interested in information security.

The CIA triad describes three crucial components of data and information protection which can be used as guides for establishing the security policies in an organization. Establishing and maintaining the organization’s security policies can be a daunting task, but using the three-pillared strategic approach to cyber security can help you identify and manage cyber security risks in a methodic and comprehensive manner.

Follow the ACSC's cyber security principles to better understand how to protect systems and data.

The purpose of the cyber security principles is to provide strategic guidance on how an organisation can protect their systems and data from cyber threats. These cyber security principles are grouped into four key activities: govern, protect, detect and respond.

  • Govern: Identifying and managing security risks.
  • Protect: Implementing controls to reduce security risks.
  • Detect: Detecting and understanding cyber security events to identify cyber security incidents.
  • Respond: Responding to and recovering from cyber security incidents.

Govern principles

The govern principles are:

  • G1: A Chief Information Security Officer provides leadership and oversight of cyber security.
  • G2: The identity and value of systems, applications and data is determined and documented.
  • G3: The confidentiality, integrity and availability requirements for systems, applications and data are determined and documented.
  • G4: Security risk management processes are embedded into organisational risk management frameworks.
  • G5: Security risks are identified, documented, managed and accepted both before systems and applications are authorised for use, and continuously throughout their operational life.

Protect principles

The protect principles are:

  • P1: Systems and applications are designed, deployed, maintained and decommissioned according to their value and their confidentiality, integrity and availability requirements.
  • P2: Systems and applications are delivered and supported by trusted suppliers.
  • P3: Systems and applications are configured to reduce their attack surface.
  • P4: Systems and applications are administered in a secure and accountable manner.
  • P5: Security vulnerabilities in systems and applications are identified and mitigated in a timely manner.
  • P6: Only trusted and supported operating systems, applications and computer code can execute on systems.
  • P7: Data is encrypted at rest and in transit between different systems.
  • P8: Data communicated between different systems is controlled and inspectable.
  • P9: Data, applications and configuration settings are backed up in a secure and proven manner on a regular basis.
  • P10: Only trusted and vetted personnel are granted access to systems, applications and data repositories.
  • P11: Personnel are granted the minimum access to systems, applications and data repositories required for their duties.
  • P12: Multiple methods are used to identify and authenticate personnel to systems, applications and data repositories.
  • P13: Personnel are provided with ongoing cyber security awareness training.
  • P14: Physical access to systems, supporting infrastructure and facilities is restricted to authorised personnel.

Detect principles

The detect principles are:

  • D1: Event logs are collected and analysed in a timely manner to detect cyber security events.
  • D2: Cyber security events are analysed in a timely manner to identify cyber security incidents.

Respond principles

The respond principles are:

  • R1: Cyber security incidents are reported both internally and externally to relevant bodies in a timely manner.
  • R2: Cyber security incidents are contained, eradicated and recovered from in a timely manner.
  • R3: Business continuity and disaster recovery plans are enacted when required.

Maturity modelling

When implementing the cyber security principles, an organisation can use the following maturity model to assess the implementation of individual principles, groups of principles or the cyber security principles as a whole. The five levels in the maturity model are:

  • Incomplete: The cyber security principles are partially implemented or not implemented.
  • Initial: The cyber security principles are implemented, but in a poor or ad hoc manner.
  • Developing: The cyber security principles are sufficiently implemented, but on a project-by-project basis.
  • Managing: The cyber security principles are established as standard business practices and robustly implemented throughout the organisation.
  • Optimising: A deliberate focus on optimisation and continual improvement exists for the implementation of the cyber security principles throughout the organisation.

Postingan terbaru

LIHAT SEMUA