Mastering The Fundamentals of NIST 800-171 Compliance
Protecting an organization's data and the systems that collect, process and maintain this data is of critical importance. Commensurate with risk, cybersecurity and privacy measures must be implemented to guard against unauthorized access to, alteration, disclosure or destruction of data and systems, applications and services. This also includes protection against accidental loss or destruction. The security of systems, applications and services must include controls and safeguards to offset possible threats, as well as controls to ensure confidentiality, integrity, availability and safety:
- CONFIDENTIALITY – This addresses preserving authorized restrictions on access and disclosure to authorized users and services, including means for protecting personal privacy and proprietary information.
- INTEGRITY – This addresses protecting against improper modification or destruction, including ensuring non-repudiation and authenticity.
- AVAILABILITY – This addresses timely, reliable access to data, systems and services for authorized users, services and processes.
- SAFETY – This addresses reducing risk associated with technologies that could fail or be manipulated by nefarious actors to cause death, injury, illness, damage to or loss of equipment.
Confidentiality, Integrity, Availability & Safety (CIAS) Model
Populating The CIAS Model
There are no products listed under this category.
-
Efficient CMMC Scoping
Determining the scope of controls (e.g., assessment boundary) is different than determining control...
-
Are you a cyber criminal?
As a Chief Information Security Officer (CISO) or cybersecurity director, it is likely that you been...
-
New Standard For Third-Party Cybersecurity Assessments
The release of the Cybersecurity & Data Protection Assessment Standards (CDPAS) is important to the...
-
Cybersecurity Materiality & Key Controls
There is a "materiality ecosystem" that exists within modern cybersecurity risk management discussio...