Cybersecurity Requirements
CIA Triad
Confidentiality:
Is data hidden from unauthorized access
Data at rest: Is the data secure when not in use
Encrypted in database
Data in transit: Is data secure when moved
Encrypted usb, broadcast in secure text, sending to the right person
Data in use: Is data secure in use
Is dead data in memory? Is it secure in memory while in use?
Integrity:
Ensure data is accurate, consistent, and trustworthy
Do you have a hash to ensure data has not been tampered?
Is it cryptographically signed that we can verify the sender?
Do we have a secure history of what’s changed?
Availability:
Do the authorized users have access to tools and data to do work
Do have redecides built?
Do you have a disaster recovery plan?
Do you have a way to know if you’ve lost availability?
Authorization:
You are allowed some level access to the data
Read vs. Write vs. Append
Just because someone can access something, should they?
Access Control Matrix
Defines the permissions and access levels for each user, ensuring that only authorized individuals can perform specific actions on the data.
Role-Based Access Control (RBAC)
Organizes users & data into discrete groups and permissions
Authentication:
You know
Username, password, security question
You have:
Key, Security token, two-factor authn.
You are:
Biometrics
Fingerprint
Iris
Voice
Typing patterns