This principle is the ability to restrict unauthorized individuals from accessing data systems and other resources. Imagine that an employee forgets to shut down his computer when he leaves the office, later that day, janitorial service arrives at your office and they notice that that computer is turned on and unlocked. Curiosity can be dangerous and even though the janitor may not have bad intentions, having unauthorized personnel access sensitive data can be devastating for your business!There are many types of attacks designed to violate confidentiality. Social engineering, theft of credentials or passwords, and network sniffing are just a few examples. If you want to implement confidentiality in your cybersecurity program there are several control measures that you’ll need to follow.
Availability grants authorized users uninterrupted access to systems and information. Ransomware, for example, is a direct threat to the availability principle because it does not allow employees to have access to the organization’s information. Two other occurrences that also violate the availability principle are hardware failure and natural disasters. Your cybersecurity program should always support the availability principle. Here are some controls that you can follow to maintain this core principle:
Having effective data backup systems is essential to comply with the availability principle. If systems become unavailable, a successful data backup cannot be performed correctly thus hindering business operations.
Having a plan to contain, eradicate, and recover from a cybersecurity threat is essential. If people know how to act against a cyberattack, the damage and its consequences can be significantly reduced.