Three Pillars of Infosec: Confidentiality, Integrity and Availability (2024)

Resurgent data breaches that can be tied back to a failure to adhere to basic infosec principles have been an unpleasant surprise in a world of modern security frameworks and maturing processes, but they serve as a useful reminder to us all that there is immense value in mastering the basics.

Weak and recycled passwords, patching delays, misconfigured assets or an incomplete asset inventory are all examples of simple lapses that can lead to infiltration from adversaries.

Security teams that self-identify as ‘less mature’ find little solace in strategies like Zero Trust which are aspirational given the current state of affairs, and more achievable in the short term by mature teams with adequate staffing and internal processes to support a Zero Trust framework.

When in doubt, return to the basics and make sure you are excelling in those areas before following every newfangled industry trend on a wild goose chase that may or may not improve your security posture at the end of the day.

Confidentiality, Integrity and Availability, often referred to as the CIA triad (has nothing to do with the Central Intelligence Agency!), are basic but foundational principles to maintaining robust security in a given environment. The CIA triad is useful for creating security-positive outcomes, and here’s why.

The CIA Triad Explained

Confidentiality: Are my systems protected from outside, unauthorized access?

Being some of the more tech savvy cohorts of people in society, security professionals are well aware that data privacy for consumers is close to nonexistent with the last private corners of our digital lives dissipating rapidly. On the benign side, this lack of privacy means a well-timed social media advertisem*nt for the perfect product that you didn’t even know you wanted (how did they know?!).

On the more sinister side, this lack of privacy could involve nation-state surveillance of journalists, activists and political opponents - a prime example being the DeadRinger campaign, which involved targeted surveillance through compromised telecommunications providers in Southeast Asia that was uncovered by Cybereason in August of this year.

Confidentiality implies an infosec team's ability to keep company information, customer information, proprietary intellectual property and any other data under the infosec domain protected from unauthorized access. Attackers will look to interrupt a state of confidentiality to exfiltrate data or surveil the information that is meant to be kept private.

Earlier this year Microsoft was breached via several vulnerabilities in their Exchange product, which is used by thousands of customers for email and calendar tasks, exposing sensitive government and corporate emails en masse to prying eyes. A breach in trusted and embedded software can lead to scaled attacks that are able to compromise massive amounts of previously confidential information in a single operation.

Cybereason maintains confidentiality of sensitive data via aggressive prevention at the endpoint. We monitor across the breadth of the enterprise and, as malicious behaviors are detected, our platform takes automated action to kill running malware without tying up valuable infosec resources to take manual actions.

These actions are taken when chains of behavior escalate from suspicious to malicious and when it becomes clear that a response action is required--all done with .

Integrity: Is my data corrupted, tampered with or impacted by outside threat actors?

Most serious breaches take time to develop, with the dwell times of adversaries in a target’s environment averaging several weeks, and more sophisticated attacks spanning multi-year periods. The anatomy of a modern attack often begins with the compromise of a less-than-vital system.

This creates a foothold for the attacker that can be used to move upward to more vital assets in an environment, with the common goal of getting access to the Microsoft Domain Controller (and thereby the Active Directory database) or some other authentication and credentials database system that may be in use in an environment.

Nearly every sophisticated attack involves some use or attempted misuse of stolen credentials. Once credentials are available to the bad actors, new logins can look normal and privileged access to more types of data and more valuable sets of data creates a way to escalate and elevate the breach activity.

A lack of integrity in an environment can lead to credential misuse, meaning that attackers can manipulate data to achieve various objectives without doing something as noisy and noticeable as encrypting or exfiltrating the data. Common examples include, manipulating financial records to remove traces of transactions and manipulating account balances, or changing blueprints, chemical equations, and recipes to intentionally sabotage a product the organization produces.

These subtle malicious activities can often go unnoticed by traditional security solutions, which is why Cybereason takes an operation-centric approach to threat detection that delivers opportunities for defenders to end malicious operations at multiple stages of escalation before the environment as a whole can be compromised.

Our platform surfaces threats based on malicious behaviors and MITRE ATT&CK techniques, deploys custom detection rules and policies, and threat-hunts against a lengthy historical dataset to leave no stone unturned and maintain the integrity of data and systems.

Availability: Are my systems and data readily accessible for everyday use and approved operations?

As proof that no industry is fully immune to useful proverbs, aviation aficionados will be familiar with the saying “elevate and then navigate,” meaning that while flying, a pilots job number one is to keep the plane in the air at all times, and if a risk appears that jeopardizes the elevation of the plane - troubleshoot that problem first.

As that first and primary need is met, pilots can then continue addressing the emergency and can focus next on navigation. In the CIA triad, availability of IT systems is the primary pillar, on par with “elevate” for pilots, and carries the most weight and importance. A lack of availability is an outwardly-visible sign of disruption.

Adversaries have been known to resort to DDoS (Distributed Denial of Service) attacks to disrupt availability of IT systems, but the more effective and alarming threat of the moment is ransomware.

A well-developed and successful ransomware attack involves the encryption of sensitive data and a lockout from crucial IT systems until a ransom is paid. The ransom payment is unsurprisingly not a guarantee of safe return of the impacted data, which makes sense given that the negotiation is taking place with cybercriminals whose morals are questionable.

Cybereason is undefeated in the fight against ransomware, ending ransomware operations before they can escalate and paralyze business operations. The Cybereason anti-ransomware solution applies a multi-layered approach that combines intelligence-based detection, deception techniques, behavioral analytics and machine learning algorithms that reliably predict and block ransomware before data can be encrypted or compromised, including in attacks leveraging previously unknown, fileless and MBR-based ransomware.

Back to infosec Basics

The day-to-day of the average infosec practitioner is chaotic and involves a penchant for spinning plates. Simplifying where possible can lead to small victories that can be built upon over time, and improve the overall security posture little by little until one day it is unrecognizably capable.

A simplified focus on maintaining confidentiality, integrity and availability can help to avoid endeavors that don’t ultimately improve security or create better outcomes and to double-down efforts of worthwhile pursuits.

The endpoint plays a critical role in a defense strategy that supports outcomes of confidentiality, integrity and availability. The endpoint produces valuable telemetry - data artifacts that can be cross-examined to surface adversary tactics, techniques and procedures.

When correlated together, this telemetry can paint a picture of the adversary activity and can be used for a targeted response and recovery. The endpoint is involved in nearly every noteworthy breach, making endpoint prevention, detection and response a vital layer of defense.

Where appropriate, consider a self assessment or a guided assessment to identify gaps in security coverage and test your incident response plan and processes against sophisticated threats to ensure readiness.

Cybereason is dedicated to teaming with defenders to end cyber attacks from endpoints to the enterprise to everywhere - including modern ransomware attacks. Learn more about ransomware defense here or schedule a demo today to learn how your organization can benefit from an operation-centric approach to security.

Share

Three Pillars of Infosec: Confidentiality, Integrity and Availability (4)

About the Author

JJ Cranford

Three Pillars of Infosec: Confidentiality, Integrity and Availability (5) Three Pillars of Infosec: Confidentiality, Integrity and Availability (6)

JJ Cranford is a Senior Product Marketing Manager at Cybereason, He was previously with OpenText after the acquisition of Guidance Software where he was responsible for the go-to-market strategy for endpoint security products. JJ provides insight into market trends, industry challenges, and solutions in the areas of incident response, endpoint security, risk management, and compliance.

All Posts by JJ Cranford

Related Posts

Ransomware Shifting to the Cloud

We are already seeing ransomware that scans for cloud-based collaboration points. And while you may think the risks are the same, that's not the case.

CISO Stories Podcast: No Senior Management Buy-In - No Success

Are you reporting the same risks each year? This may be due to lack buy-in from senior management - Chris Apgar joins the podcast to discuss how to show that funding security initiatives is more than just risk avoidance - check it out...

Three Pillars of Infosec: Confidentiality, Integrity and Availability (2024)

FAQs

Three Pillars of Infosec: Confidentiality, Integrity and Availability? ›

The CIA Triad—Confidentiality, Integrity, and Availability—is a guiding model in information security. A comprehensive information security strategy includes policies and security controls that minimize threats to these three crucial components.

What are the 3 basic values of information security? ›

The CIA Triad—Confidentiality, Integrity, and Availability—is a guiding model in information security. A comprehensive information security strategy includes policies and security controls that minimize threats to these three crucial components.

What are the three 3 aspects of information security? ›

The basic tenets of information security are confidentiality, integrity and availability. Every element of the information security program must be designed to implement one or more of these principles. Together they are called the CIA Triad.

What are the three security goals confidentiality integrity and availability? ›

Put simply, confidentiality is limiting data access, integrity is ensuring your data is accurate, and availability is making sure it is accessible to those who need it. This triad can be used as a foundation to develop strong information security policies.

What are the three pillars of the security framework? ›

An Information Security Management System is designed to give your organisation a framework that protects your information assets against security threats. The three main pillars of information security are people, processes, and technology.

What are the three pillars of Infosec? ›

Confidentiality, Integrity and Availability, often referred to as the CIA triad (has nothing to do with the Central Intelligence Agency!), are basic but foundational principles to maintaining robust security in a given environment.

What are the 3 C's in security? ›

The 3 Cs of Enterprise Security: Communicate, Coordinate and Collaborate. As technology continues to evolve and become more interconnected, the line between cyber and physical security is increasingly blurred.

What is the 3 major aspect of security? ›

The confidentiality, integrity, availability is the building block of designing any security system. These important security aspects necessary applied to be made a secure cloud.

What are the three pillars of isms? ›

Practical and robust cybersecurity requires an information security management system (ISMS) built on three pillars – People, Processes and Technology.

What are the three pillars of integrity? ›

Eight integrity principles have been identified and are articulated around three key pillars: honesty and transparency, respect and dignity, and exemplarity. It is essential that all of us follow the same ethics and moral standards in our daily work.

What are the three basic security concepts? ›

Three basic security concepts important to information on the internet are confidentiality, integrity, and availability. Concepts relating to the people who use that information are authentication, authorization, and nonrepudiation.

What are the main three 3 objectives of security? ›

Included in this definition are three terms that are generally regarded as the high-level security objectives – integrity, availability, and confidentiality.

What is the 3 triad of security? ›

The three letters in "CIA triad" stand for Confidentiality, Integrity, and Availability. The CIA triad is a common model that forms the basis for the development of security systems.

What are 3 pillars of application security? ›

In order to protect your organization's applications from attack, it is essential to have a strong foundation in the three pillars of application security: process, technology, and people. Each pillar plays an equally important role in ensuring the security of your applications.

What are the three pillars of a cybersecurity strategy? ›

These three pillars of cyber security—people, processes, and technology—should all work together to build a sturdy defense network. It's these guiding principles that will help you as part of a cyber security team or larger IT department.

What are the 3 golden principles of information security? ›

A Robust Security Posture

Understanding and implementing the three principles of information security— confidentiality, integrity, and availability —are crucial for protecting your organisation's digital assets.

What are the 3 important key security concepts? ›

Three basic security concepts important to information on the internet are confidentiality, integrity, and availability.

What are the 3 security standards? ›

The HIPAA Security Rule contains what are referred to as three required standards of implementation. Covered entities and BAs must comply with each of these. The Security Rule requires implementation of three types of safeguards: 1) administrative, 2) physical, and 3) technical.

Top Articles
What month is best to start social security?
Weighted Average Cost of Capital (WACC) or discount rate analysis
Jordanbush Only Fans
Tyson Employee Paperless
How To Do A Springboard Attack In Wwe 2K22
Www.politicser.com Pepperboy News
Boomerang Media Group: Quality Media Solutions
Sissy Transformation Guide | Venus Sissy Training
Stl Craiglist
Craigslist Nj North Cars By Owner
Atrium Shift Select
Scentsy Dashboard Log In
De Leerling Watch Online
Mission Impossible 7 Showtimes Near Regal Bridgeport Village
Caresha Please Discount Code
People Portal Loma Linda
Busted Newspaper S Randolph County Dirt The Press As Pawns
Christina Khalil Forum
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Abortion Bans Have Delayed Emergency Medical Care. In Georgia, Experts Say This Mother’s Death Was Preventable.
24 Hour Drive Thru Car Wash Near Me
Vigoro Mulch Safe For Dogs
Hermitcraft Texture Pack
Milanka Kudel Telegram
Aerocareusa Hmebillpay Com
Soulstone Survivors Igg
Minnick Funeral Home West Point Nebraska
All Obituaries | Gateway-Forest Lawn Funeral Home | Lake City FL funeral home and cremation Lake City FL funeral home and cremation
Chicago Based Pizza Chain Familiarly
Arlington Museum of Art to show shining, shimmering, splendid costumes from Disney Archives
Rainfall Map Oklahoma
Spirited Showtimes Near Marcus Twin Creek Cinema
County Cricket Championship, day one - scores, radio commentary & live text
Swimgs Yuzzle Wuzzle Yups Wits Sadie Plant Tune 3 Tabs Winnie The Pooh Halloween Bob The Builder Christmas Autumns Cow Dog Pig Tim Cook’s Birthday Buff Work It Out Wombats Pineview Playtime Chronicles Day Of The Dead The Alpha Baa Baa Twinkle
Ofw Pinoy Channel Su
Kattis-Solutions
Ewwwww Gif
Radical Red Doc
Ticketmaster Lion King Chicago
Giantess Feet Deviantart
Barber Gym Quantico Hours
Beaufort SC Mugshots
Tunica Inmate Roster Release
Bekkenpijn: oorzaken en symptomen van pijn in het bekken
Best Haircut Shop Near Me
Go Nutrients Intestinal Edge Reviews
Advance Auto.parts Near Me
Plumfund Reviews
CPM Homework Help
Mytmoclaim Tracking
The Significance Of The Haitian Revolution Was That It Weegy
Arre St Wv Srj
Latest Posts
Article information

Author: Nathanael Baumbach

Last Updated:

Views: 5568

Rating: 4.4 / 5 (55 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Nathanael Baumbach

Birthday: 1998-12-02

Address: Apt. 829 751 Glover View, West Orlando, IN 22436

Phone: +901025288581

Job: Internal IT Coordinator

Hobby: Gunsmithing, Motor sports, Flying, Skiing, Hooping, Lego building, Ice skating

Introduction: My name is Nathanael Baumbach, I am a fantastic, nice, victorious, brave, healthy, cute, glorious person who loves writing and wants to share my knowledge and understanding with you.