Enforcing the CIA triad – overview
When protecting critical data (and assets), an organization must provision the system's security against internal (intentional and unintentional) and external (malicious and non-malicious attackers and natural catastrophes) attacks. The primary objective for data security is to ensure that the CIA is not compromised and that it is adequately managed. In the following points, we look at some data security use cases for better system protection.
Enforcing and maintaining confidentiality
Data secrecy must be maintained every time on critical assets at rest (assets or data stored on endpoints, database servers, and backup devices) or in transit (moving between two points within the system or outside the system). In addition, as part of the security or cyber TI (CTI) team, you must ensure that the following are in place and enforce them:
- Access restriction: Only the right people or applications need access to the organization...