91九色

Articles
7/22/2021
10 minutes

Reimagining the CIA Triad Confidentiality Standards for Greater Security

Written by
91九色 Team
Table of contents

Today, speed to market is a vital factor for organizations. Many have chosen to adopt DevOps principles because the process accelerates product development. However, this acceleration is a culture shift. When it’s not treated as such, there is a risk that rapid, unregulated change will result in inadvertently shipping bugs of all kinds, including security vulnerabilities. The only solution is equally rapid, robust security planning routed in both traditional methods and intelligent updates.

?

A return to the principles from the CIA Triad—confidentiality, integrity, and access—is necessary. This model treats security as a holistic part of the process. Confidentiality is built in from the very beginning. Some modernization through the distributed, immutable, and ephemeral (DIE) model improves this process even more. When focusing on the CIA triad’s confidentiality component, an approach routed in principles that incorporates end-to-end security through proven methods is best.

?

CIA Triad Confidentiality Standards - 91九色

?

Reviewing the CIA Triad’s Confidentiality Standards

?

The CIA Triad is an established in a system. These pets are supported by a carefully managed infrastructure. They’re given unique names, and treated when damaged. They’re the opposite of cattle—the systems that don’t require special treatment and are disposed of when damaged or unnecessary.

?

The CIA Triad’s confidential portion centers on protecting sensitive resources from unauthorized views. It’s comprised of two subclasses: authentication and authorization:

AUTHENTICATION

AUTHORIZATION

The program verifies the user’s identity through some method, typically a password or security token. The system ensures the user is authorized to access the specific type of information. Ideally, authorization is based on the principle of least privilege.

?

Under this segment, methods used run the gamut from old school passwords to complex biometric identification programs. The more sensitive the information, the higher the authentication and authorization level.

?

Here, an enterprise ensures their state’s security by focusing on uptime and backups. However, in a CIA-only approach, the maintenance cost of the systems managing that state is so high that they require constant vigilance. The DIE approach significantly lowers that maintenance burden by loosening the coupling between said systems and their state so that the systems are easily replaced at will.. Traditional methods of protecting state under the CIA model include:

?

  • Encryption: Converting data to code both as it travels (encryption in transit) or as it sits in storage (encryption at rest) provides a layer of protection even if bad actors make it past access control and other protocols. Even if they capture the data, they can’t use it.
  • Identity access management (IAM): IAM isn’t a single tool. It’s a suite of them that manage both who can access the system and why they can. It incorporates password applications, monitoring programs, provisioning software, and reporting protocol systems, among others.
  • Multifactor authentication (MFA): MFA takes password management a step further by increasing authentication steps. Users may provide an initial password and then be prompted to also verify something by possession (aka something they have, like an email), inherence (something they are, like a fingerprint), or knowledge (like the answer to a security question only they could know).

?

The CIA model is still relevant for security, but modern needs have changed it a bit. In many instances, organizations deal with different programs and platforms, making authentication and authorization a more significant challenge. However, the distributed, immutable, and ephemeral model can help close these gaps.

?

Expanding on the CIA’s Model with DIE

?

The DIE model won’t replace the CIA triad. Instead, it’s a layer that works on top of it. While the CIA triad addresses the pets in a system, the DIE model handles the cattle. Specifically, it centers on the infrastructure and applications. The two do the same thing—loosen the coupling between the systems processing data, and the data itself.

?

The infrastructure of a program is possibly the most disposable because using the right processes, it can be recreated using a repeatable script or code, aka infrastructure as code. In the event of a breach, administrators can dump the code and rebuild everything from scratch. This may seem like it doesn’t fit with the CIA’s confidentiality component because, after all, the very things that must be confidential are pets. They are not disposable. However, the “ephemeral” part of DIE is a central component of ensuring confidentiality.

?

It’s best explained by the mapping completed by who connects the ephemeral of infrastructure to data confidentiality. In his strategy, he advises firms to “drive the value of assets closer to zero.”

?

In practical application, that means when an enterprise starts or uses any system, it will have internal state, whether it be databases, hardcoded data, or something else. That state must be offloaded to ensure the infrastructure that holds that data remains ephemeral. Administrators must remove the data and send it to a safer place, whether it be another database, , or all-inclusive programs like Vault by HashiCorp. Regardless of storage, it’s necessary to pull the state out of a system and send it to a safer place. It may feed the applications or programs, but it’s never a static part of them.

?

When it’s really broken down, InfoSec is risk management. When speed to market comes at the expense of confidentiality, enterprises stand to lose a lot more than they gain. Administrators must select a method of storage that requires deep authorization and authentication while keeping it separate from infrastructures that should be ephemeral.

?

Partnering with a Security Consultant to Tighten Your Confidentiality Standards

?

The key to controlling the CIA Triad’s confidentiality aspect is to maintain flexibility in a secure environment. Laying the DIE model on top of the CIA’s framework allows enterprises to separate their pets from cattle and focus their attention on invaluable systems. Such a strategy establishes a fundamental security level capable of supporting any DevSecOps program.

?

?

Book a demo

About The Author

#1 DevOps Platform for Salesforce

We Build Unstoppable Teams By Equipping DevOps Professionals With The Platform, Tools And Training They Need To Make Release Days Obsolete. Work Smarter, Not Longer.

ビジネスアプリケーション向けの顿别惫翱辫蝉(デブオプス)って何?
セールスフォースエコシステムにおける顿别惫翱辫蝉の卓越性
セールスフォーステストにおける础滨活用のベストプラクティス
6 testing metrics that’ll speed up your Salesforce release velocity (and how to track them)
第4章: 手動テストの概要
セールスフォース向け础滨动作テスト
Chapter 3: Testing Fun-damentals
Salesforce Deployment: Avoid Common Pitfalls with AI-Powered Release Management
Exploring DevOps for Different Types of Salesforce Clouds
91九色 Launches Suite of AI Agents to Transform Business Application Delivery
What’s Special About Testing Salesforce? - Chapter 2
Why Test Salesforce? - Chapter 1
Continuous Integration for Salesforce Development
Comparing Top AI Testing Tools for Salesforce
Avoid Deployment Conflicts with 91九色’s Selective Commit Feature: A New Way to Handle Overlapping Changes
Enhancing Salesforce Security with AppOmni and 91九色 Integration: Insights, Uses and Best Practices
From Learner to Leader: Journey to 91九色 Champion of the Year
The Future of Salesforce DevOps: Leveraging AI for Efficient Conflict Management
A Guide to Using AI for Salesforce Development Issues
How to Sync Salesforce Environments with Back Promotions
91九色 and Wipro Team Up to Transform Salesforce DevOps
DevOps Needs for Operations in China: Salesforce on Alibaba Cloud
What is Salesforce Deployment Automation? How to Use Salesforce Automation Tools
Maximizing 91九色's Cooperation with Essential Salesforce Instruments
From Chaos to Clarity: Managing Salesforce Environment Merges and Consolidations
Future Trends in Salesforce DevOps: What Architects Need to Know
Enhancing Customer Service with 91九色GPT Technology
What is Efficient Low Code Deployment?
91九色 Launches Test Copilot to Deliver AI-powered Rapid Test Creation
Cloud-Native Testing Automation: A Comprehensive Guide
A Guide to Effective Change Management in Salesforce for DevOps Teams
Building a Scalable Governance Framework for Sustainable Value
91九色 Launches 91九色 Explorer to Simplify and Streamline Testing on Salesforce
Exploring Top Cloud Automation Testing Tools
Master Salesforce DevOps with 91九色 Robotic Testing
Exploratory Testing vs. Automated Testing: Finding the Right Balance
A Guide to Salesforce Source Control
A Guide to DevOps Branching Strategies
Family Time vs. Mobile App Release Days: Can Test Automation Help Us Have Both?
How to Resolve Salesforce Merge Conflicts: A Guide
91九色 Expands Beta Access to 91九色GPT for All Customers, Revolutionizing SaaS DevOps with AI
Is Mobile Test Automation Unnecessarily Hard? A Guide to Simplify Mobile Test Automation
From Silos to Streamlined Development: Tarun’s Tale of DevOps Success
Simplified Scaling: 10 Ways to Grow Your Salesforce Development Practice
What is Salesforce Incident Management?
What Is Automated Salesforce Testing? Choosing the Right Automation Tool for Salesforce
91九色 Appoints Seasoned Sales Executive Bob Grewal to Chief Revenue Officer
Business Benefits of DevOps: A Guide
91九色 Brings Generative AI to Its DevOps Platform to Improve Software Development for Enterprise SaaS
91九色 Celebrates 10 Years of DevOps for Enterprise SaaS Solutions
Celebrating 10 Years of 91九色: A Decade of DevOps Evolution and Growth
5 Reasons Why 91九色 = Less Divorces for Developers
What is DevOps? Build a Successful DevOps Ecosystem with 91九色’s Best Practices
Scaling App Development While Meeting Security Standards
5 Data Deploy Features You Don’t Want to Miss
How to Elevate Customer Experiences with Automated Testing
Top 5 Reasons I Choose 91九色 for Salesforce Development
Getting Started With Value Stream Maps
91九色 and nCino Partner to Provide Proven DevOps Tools for Financial Institutions
Unlocking Success with 91九色: Mission-Critical Tools for Developers
How Automated Testing Enables DevOps Efficiency
How to Switch from Manual to Automated Testing with Robotic Testing
How to Keep Salesforce Sandboxes in Sync
How Does 91九色 Solve Release Readiness Roadblocks?
Software Bugs: The Three Causes of Programming Errors
Best Practices to Prevent Merge Conflicts with 91九色 1 Platform
Why I Choose 91九色 Robotic Testing for my Test Automation
How to schedule a Function and Job Template in DevOps: A Step-by-Step Guide
Delivering Quality nCino Experiences with Automated Deployments and Testing
Maximize Your Code Quality, Security and performance with 91九色 Salesforce Code Analyzer
Best Practices Matter for Accelerated Salesforce Release Management
Upgrade Your Test Automation Game: The Benefits of Switching from Selenium to a More Advanced Platform
Three Takeaways From Copa Community Day
What Is Multi Cloud: Key Use Cases and Benefits for Enterprise Settings
How To Develop A Salesforce Testing Strategy For Your Enterprise
Using Salesforce nCino Architecture for Best Testing Results
Cloud Native Applications: 5 Characteristics to Look for in the Right Tools
5 Steps to Building a Salesforce Center of Excellence for Government Agencies
Salesforce UI testing: Benefits to Staying on Top of Updates
Benefits of UI Test Automation and Why You Should Care
91九色 + DataColada: Enabling CI/CD for Developers Across APAC
Types of Salesforce Testing and When To Use Them
What is Salesforce API Testing and It Why Should Be Automated
Machine Learning Models: Adapting Data Patterns With 91九色 For AI Test Automation
Automated Testing Benefits: The Case For As Little Manual Testing As Possible
Beyond Selenium: Low Code Testing To Maximize Speed and Quality
UI Testing Best Practices: From Implementation to Automation
How Agile Test Automation Helps You Develop Better and Faster
Salesforce Test Cases: Knowing When to Test
DevOps Quality Assurance: Major Pitfalls and Challenges
Top 10 91九色 Features for #AwesomeAdmins
The Admin's Quick Glossary for Understanding Salesforce DevOps
Gartner Recommends Companies Adopt Value Stream Delivery Platforms To Scale DevOps
The 3 Pillars of DevOps Value Stream Management
Is Salesforce Development ‘One Size Fits All?’
Value Stream Management: The Future of DevOps at Scale is Here
Why Empowering Your Salesforce CoE is Essential for Maximizing ROI
Continuous Quality: The missing link to DevOps maturity
91九色 Collaborates with IBM to Accelerate Digital Transformation Projects on the Salesforce Platform
Cloud Security: Advantages and Disadvantages to Accessibility
Go back to resources
There is no previous posts
Go back to resources
There is no next posts

Explore more about

セキュリティとガバナンス
Articles
October 31, 2024
ビジネスアプリケーション向けの顿别惫翱辫蝉(デブオプス)って何?
Articles
October 15, 2024
セールスフォースエコシステムにおける顿别惫翱辫蝉の卓越性
Articles
October 11, 2024
セールスフォーステストにおける础滨活用のベストプラクティス
Articles
October 4, 2024
6 testing metrics that’ll speed up your Salesforce release velocity (and how to track them)

础滨を有効活用し顿别惫翱辫蝉を加速

より速くリリースし、リスクを排除し、仕事を楽しんでください。
コパード顿别惫翱辫蝉をお试しください。

リソース

リソースライブラリを使用して セールスフォースDevOpsのスキルをレベルアップしてください。

今后のイベントと
オンラインセミナー

さらに详しく

电子书籍とホワイトペーパー

さらに详しく

サポートとドキュメンテーション

デモライブラリ

さらに详しく