Confidentiality : Only authorized
entities have access to the data
Example :
Information that could be considered confidential are health records, financial account information, criminal records, source code, trade secrets and military tactical plans.
Controls Expected : Identification and authentication, Authorization, auditing and logging
Integrity : No unauthorized modifications of the data
Example : Unaltered data
Controls Expected :logical and physical access controls, backups, file integrity monitoring and Change Management monitoring and privileged user access review
Example : Unaltered data
Controls Expected :logical and physical access controls, backups, file integrity monitoring and Change Management monitoring and privileged user access review
Availability : Availability guarantees
that systems, applications and data are available to users when
they need them
Example : A loss of availability is the disruption of access to or use of information or an information system.
Controls Expected : Security controls that can provide availability protection include load balancing, clustering, controlled traffic flows, intrusion detection, fault tolerance and recovery mechanisms
Controls Expected : Security controls that can provide availability protection include load balancing, clustering, controlled traffic flows, intrusion detection, fault tolerance and recovery mechanisms
Comments
Post a Comment