What is the CIA Triplet in Information Security?

Hello!

Adding value from #Ovnicom, with more publications in #CyberSecurity month, today I want to talk to you about the CIA Triplet and its value of Information Security for the achievement of Business IT Governance.

Let us begin!

What is the CIA Triplet?

The CIA Triplet is the Information Security Base.

Defines the following terms of great importance for the insurance of business assets. Namely:

  • #Confidenciality.
  • #Integrity.
  • #Availabitily.

What is the use of understanding the CIA Triplet?

It works for any Business Owner, Director of Technology or Operations, Network Engineer, Security Specialist, IT Support Agent and even for the end user, who makes use of business ASSETS in their day to day.

And it is that the Triple CIA represents and signifies the intelligence and identification of the “Effective Balance of Security”, which is found in the relationship and association between each of its contexts.

This balanced and continuous relationship guarantees a correct implementation of Information Security and #Cybersecurity in any company.

Here I leave you an image, very representative of the “BALANCE” that must exist between these 3 fundamental areas of Information Security and Cybersecurity.

Ovnicom - triplet CIA #Confidenciality #Integrity #Availability

What does each letter of the CIA Triplet mean?

  • Let’s start with CONFIDENTIALITY, which refers to a very specific topic. “Whoever accesses an organization’s digital or physical asset is who it should be.” This means that the data or business resource should only be accessed by the person to whom the right to use and consume that resource is assigned, and no one else.
  • I continue with INTEGRITY, which refers to the DATA itself. And it is explained as follows: All data that goes from point A to point B must arrive at the destination in the same way as it left the origin.
  • And finally, AVAILABILITY, which refers to the capacity of the communications and data infrastructure to be ACTIVE and CONSUMABLE for business production.

How to take the first step with the CIA Tripleta?

Definitely, the #VALUE of the triplet is in its applicability in the business environment.

Here are the three primary and fundamental solutions, in each context of the #TripletaCIA.

  1. CONFIDENTIALITY is fundamentally achieved with strategies, solutions and products oriented towards AUTHENTICATION, such as the case of 2FA from Microsoft Azure.
  2. INTEGRITY is achieved, fundamentally, with ENCRYPTION mechanisms such as IPSec VPN Site to Site or Remote Access systems from Cisco Meraki.
  3. AVAILABILITY is achieved mainly with DATA BACKUP systems or REDUNDANCY systems of network connections with ACRONIS or VEEAM Technology.

Finally, I invite you to contact the Ovnicom staff, to listen to your Information Security and Cybersecurity requirements.

We are at your service to accompany you in the identification and achievement of the objectives of Information Security in your company or business.

Greetings and success

Jesus Espinoza

VP of Ovnicom