๐ CIA/IAAA
CIA#
In security terms, CIA stands for: Confidentiality, Integrity and Availability
These three principles form the cornerstone of any organisation's security infrastructure.
Confidentiality#
Confidentiality has been written about here Confidentiality
Integrity#
Integrity is about ensuring that data has not been tampered with and can be trusted. It is correct, authentic and reliable.
Integrity can be compromised directly by methods including:
Deliberately#
- Tampering with intrusion detection systems
- Modifying configuration files
- Changing system logs to evade detection
Unintentionally#
- Through human error
- Lack of care
- Coding errors
- Inadequate policies, procedures, and protection mechanisms
How can integrity be ensured?#
- Encryption
- Hashing
- Digital signatures
- Digital certificates
- Intrusion detection systems
- Auditing
- Version control
- Strong authentication mechanisms and access controls
Availability#
Availability means that networks, systems and applications are up and running. It ensures authorused users have timely, reliable access to resources when they're needed
Things can jeopardise availability, including:
- Hardware or software failure
- Power failure
- Natural disasters
- Human error
Example
The most well known attack that threatens availability is the denial of service attack, in which the performance of a systsm, website, web based application/service is degraded and the syste, becomes unreachable.
How can availibility be ensured?#
- Redundancy (in servers, networks, applications and services)
- Hardware fault tolerance (for servers and storage)
- Regular software patching and system upgrades
- Backups
- Comprehensive disaster recovery plans
- Denial-of-service protection solutions
IAAA#
This is Identification, Authentication, Authorisation and Accountability
These are key concepts to understanding identity access management.
Identification#
This is who you are
Without identifying yourself, you cannot access a system
Normal methods of identification includes:
- Your name
- Username
- ID number
Authentication#
After you've identified yourself, you need to prove you are who you say you are. That is authentication.
Authentication methods:
- Something you know, password
- Something you have, token
- Something you are, fingerprint
- Something you are, IP address
- Something you can do, signature
Authorisation#
Once you've identified and proved who you are using authentication, you will be given access to the system once your authorisation has been determined.
What is authorisation
- Authorisation determines which part of the system / data you are allowed to access and what actions you are allowed to do with that access. For example, read and write.
Accountability#
Once you've been given access to a system and authorised to perform certain tasks, accountability takes place.
What is accountability?
- Being able to trace an action back to an individual
- Prove what someone did, and when they did it: known as non-repudiation
- This is also known as auditing (audit logs)
Maintaining CIA#
Why is it important?
- Maintains compliance with legislation
- Maintains trust with internal and external stakeholders
- Promotes positive brand image
- Avoids security risks and unauthorised access
Lack of CIA#
Consequences
Financial
- Regulatory fines
- Refunds/compensation to customers
- Loss of earnings
Legal
- Lawsuits
- Termination of contract
Reputational
- Loss of customers
- Damage to brand