CIA Triad; Authentication vs. Authorization

BLUF

Confidentiality, integrity, and availability is a model designed to guide policies for information security within an organization. Authentication is the process of verifying the identity of a user, system, or entity, and Authorization comes after authentication and involves granting or denying access.

What is CIA TRIAD?

The CIA Triad known as Confidentiality, integrity, and availability is a model designed to guide policies for information security within an organization (Chai, 2022). The CIA Triad each letter represents a cornerstone to the foundational principles of cybersecurity. 

Confidentiality

Confidentiality purpose is to protect sensitive information (Chai, 2022). Depending on a confidentiality rating on information will help dictate the security measures used to protect it. This ensures that the information is only accessible to those who have the proper authorization. A great example of confidentiality is when accessing your bank you need both routing and account information. 

Integrity

Integrity involves maintaining the consistency, accuracy, and trustworthiness of data over its entire lifecycle. Data must not be changed when going to its ultimate destination. Integrity goes hand and hand with Confidentiality to ensure that information remains accurate and unaltered, and only authorized users can modify it.

Availability

Availability means information should be readily accessible only to the ones with proper authorization (Chai, 2022). This means the equipment and hardware must be aligned with technical infrastructure and systems to properly display the information. Like Integrity before it; Availability success lies when the other 2 components are working. 

Authentication
Authentication is the process of verifying the identity of a user or system (Heimdal Security, 2023). It is a tool used by the system to confirm the identity of the user. For example; Two-factor authentication when you put in your email and the site you are accessing requires a code sent via text message. Also, as simple as the password system where the authenticator will cross reference your password on their database. 

Authorization

Authorization is the process of granting someone permission to have access to certain resources usually following the Authentication process (Heimdal Security, 2023). A good example is government work where the same people may be authenticated to access a specific document, but may not be authorized to view specific details in the document like Secret Clearance and Top-Secret Clearance. 

Conclusion

In summary, the CIA Triad forms the foundation for information security. Confidentiality protects sensitive data, Integrity ensures its accuracy isn’t affected, and Availability ensures its access is readily available. Authentication verifies user identity through passwords or two-factor authentication and many others, while Authorization grants specific access permissions based on authentication. These components work together to create a strong cybersecurity framework, paramount for protecting information from unauthorized access and manipulation.

Leave a Reply

Your email address will not be published. Required fields are marked *