Skip to the content.

Security Principles

Information Security

Information Security

Information Systems Security

CIA Triad

Confidentiality

Confidentiality refers to protecting information from unauthorized access. It is all about ensuring only authorized individuals can access sensitive data.

Integrity

Integrity is about safeguarding the accuracy and reliability of data. It is all about preventing unauthorized modification or tampering of information.

Availability

Availability refers to ensuring that authorized users have access to information when needed.

Relationship between Confidentiality and Integrity

Confidentiality and integrity are separate but complementary security concepts. Confidentiality protects against unauthorized access, while integrity ensures data remains accurate and unaltered.

AAA of Security

Authentication

When a person’s identity is established with proof and confirmed by a system.

Authorization

Occurs when a user is given access to a certain piece of data or certain areas of a building

Accounting

Often called auditing, it involves tracking of data, computer usage, and network resources.

Authentication

This is the process of verifying the identity of a user who has stated their identity.

Methods of Authentication

Common Authentication Techniques

Multi-Factor Authentication

Multifactor Authentication (MFA) is a security system that requires more than one method of a authentication from independent categories of credentials to verify the user’s identity.

Factors:

Types of MFA

Token-based Authentication

Password-less Authentication

Provides improved security and a more user-friendly experience.

Best Practices

Implement at least two of the three common authentication techniques for better security.

IAM Concepts

Identity Proofing

Process of verifying the identity of the user before the account is created.

Provisioning

Creating new user accounts, assigning them appropriate permissions, and providing users with access to the systems

Deprovisioning

Removing an individual’s access rights when the rights is no longer required, such as when they move to a different team or when they leave the company.

Permission/Authorization Creep

Occurs when user gains more and more rights during their career progression in the company.

Interoperability

The ability of different systems, devices, and applications to work together and share information.

User Account Control

A mechanism designed to ensure that actions requiring administrative rights are explicitly authorized by the user.

Password Security

Measures the password’s ability to resist guessing and brute-force attacks. To learn more, please see Common Security Policies.

Sensitivity

Sensitivity is also defined as the measure of the importance assigned to information by its owner, or the purpose of representing its need for protection (see the ISC2 study guide, module 1, under CIA Deep Dive).

Non-repudiation

Non-repudiation is a legal term that refers to protecting against false denial of a specific action by an individual.

Privacy

Privacy is the right of an individual to control the distribution of information about themselves.

Principle of Least Privilege

The Principle of Least Privilege dictates that users or programs should be granted the minimum access essential to fulfill their functions. Access is restricted to the specific systems and programs required for their designated job or tasks.

Segregation of Duties

In cybersecurity, ‘segregation’, or ‘segregation of duties’ (SoD), is a security principle designed to prevent fraud or error by dividing tasks among multiple persons.It is an administrative control that reduces the risk of potential errors or fraud from a single person having control over all aspects of a critical process.

To learn more, see Privilege Access Management.

Trust but Verify

The “Trust but verify” model is a method of threat protection that involves granting privileged accounts access to the network and other resources, while at the same time verifying their actions and activities.

Due Care

In cybersecurity, ‘due care’ means taking reasonable steps to secure and protect the organization’s assets, reputation and finances.

Collusion

Collusion occurs when two or more individuals work together to circumvent the segregation of duties for fraudulent purposes.

Gap Analysis

Process of evaluating the differences betweenan organization’s current performance and its desired performance.

Steps

  1. Define the scope of analysis.
  2. Gather data on the current state of the organization.
  3. Analyze the data to identify the gaps.
  4. Develop a plan to bridge the gap.

Technical Gap Analysis

Business Gap Analysis

Zero Trust

Security model that operates on the principle that no one, whether inside or outside the organization, should be trusted by default and verification is required for everybody.

Control Plane

Define, manage, and enforce the policies related to user and system access

Data Plane

Ensures that the policies and procedures are properly executed.


Back to main page