What are the core principles of InfoSec?
First mentioned in a NIST publication in 1977,8 what's commonly referred as the CIA triad consists of the core principles that make up the beating heart of InfoSec. These three principles are:
Confidentiality
Arguably the element that’s most synonymous with InfoSec, confidentiality refers to the act of protecting privacy and maintaining authorized restrictions on disclosure and access to data, information, software, or something similar. CSO notes that to maintain confidentiality, your IT security must “be able to identify who is trying to access data and block attempts by those without authorization”.7 Tools that increase your cyber resilience and help ensure data confidentiality include the following:
- Single-factor authentication (SFA), two-factor authentication (2FA), multi-factor authentication (MFA), and other similar types of authentication
- Password-based authentication, which is the most common type of authentication
- Symmetric encryption and asymmetric encryption
- Identity and access management products and services
Integrity
Integrity refers to the act of maintaining your data’s homeostasis and protecting it from improper or similarly unauthorized modification or destruction. Many of the tools and practices for ensuring data confidentiality are identical to the practices used for defending your data’s integrity.
Tools that increase your cyber resilience and help ensure data integrity include the following:
- Checksums or hashes are alphanumeric values which uniquely represent a file’s contents and are frequently used for verifying a file’s integrity. For example, a file installer that was downloaded from an external website.
- Version control systems (VCSs) help users keep track of their files’ histories, including what changes were made to their files and when these changes were made.
- Git is an example of a VCS and GitHub is a website that hosts projects using Git.
- Frequent data backups help ensure that your data is restored from its most recent state.
- A cyber vault helps shield your critical data from malicious cyberthreats. Cyber vaults function as a security-rich, isolated vault of immutable storage with analytics scans monitoring your data and detecting potential threats, unauthorized access, or similar issues. A cyber recovery solution, cyber vaults help ensure that your data is clean, protected, and accessible when you need to restore your data.
SecurityScorecard states that by maintaining integrity, you ensure “information non-repudiation and authenticity [of your data]”.5 CSO shares a similar point and expands on what nonrepudiation is by defining it as “[being] able to prove that you’ve maintained the integrity of your data, especially in legal contexts”.7
Availability
While integrity shares many similarities with confidentiality, availability is an almost perfect reflection of confidentiality. The principal difference is that the concept of integrity addresses what data unauthorized users shouldn’t have access to. The concept of availability addresses what data authorized users should be able to access.
Establishing proper permissions is one way to ensure your data’s accessibility. CSO argues that you can ensure data availability by “matching network and computing resources to the volume of data access you expect and implementing a good backup policy for disaster recovery purposes”.7
Ensuring that your data is both confidential and available is a balancing act that many organizations struggle to maintain. As with integrity, establish a regular schedule for replicating and backing up your files. These processes help streamline your disaster recovery process and help ensure a fast recovery. In addition to frequently backing up your files, CSO states that to ensure data availability you should “[match] network and computing resources to the volume of data access you expect”.7
What is disaster recovery as a service?
Disaster recovery as a service (DRaaS) is an important component of availability, ensuring that either you always have access to your data, IT assets, and applications or if it’s not immediately available, then it will quickly become available.
In its Market Guide for Disaster Recovery as a Service, Gartner notes that “DRaaS is a great option for infrastructure and operations leaders who want to cost-effectively improve IT resilience, meet compliance or regulatory requirements, and address resource deficiencies”.9
Techopedia defines DRaaS as “a cloud computing and backup service model that uses cloud resources to protect applications and data, [functioning as a second infrastructure that gives] an organization a total system backup that allows for business continuity in the event of system failure”.10
IBM notes that DRaaS “provides continuous replication of critical applications and infrastructure, data and systems for rapid recovery after an IT outage [and includes] the following features:
- Reliable, verifiable, consistent [RTOs] in minutes and [RPOs] in seconds
- Custom solution architectures [including] private, public and hybrid cloud, disk and tape combinations"11
IBM also notes that DRaaS helps “support business resiliency”10 and “provides comprehensive disaster recovery services, including disaster recovery orchestration processes, disaster recovery health monitoring [and] continuous replication of applications, infrastructure, data and cloud systems”.11
“DRaaS is often paired with a disaster recovery plan (DRP) or a business continuity plan (BCP)”.10 If DRaaS works properly, then organizations should be able to continue with their daily processes—despite any disruption or necessary repairs—by running them on virtual machines (VMs).
Gartner notes that the DRaaS provider “can deliver the service as a fully managed offering, an assisted recovery offering, or a software-as-a-service (SaaS) model”.9 The DRaaS service should be “marketed and sold as a stand-alone, industrialized offering and includes the following features [at a minimum]:
- On-demand recovery cloud for planned exercises and declarations
- Server image and production data replication to the cloud
- Automated failover and failback between on premises and cloud
- Recovery time service-level agreements (SLAs)9