Enterprise Cloud Security and Governance
上QQ阅读APP看书,第一时间看更新

Understanding all three aspects

If we look at an example of following all the three triads (confidentiality, integrity, and availability) with the HDD example, then it would be as follows.

The organization takes the hash of the data in HDD, takes a backup of the entire data, and encrypts it before sending it for transit from location A to location B.

A Defense in Depth approach deals with all three aspects of the CIA triad; however, it is important to understand which aspect is more important for your organization and depending on this, you can focus your resources accordingly. Due to this, classifying the importance of the aspects will help us design the security posture.