Use the CIA triad to shape security automation use cases

<p>Many IT automation and orchestration discussions focus on using pipelines that enable continuous integration/continuous delivery to improve IT productivity and efficiency. While these pipelines benefit service and software development, they can also bolster an organization’s security posture.</p>
<p>It’s helpful to frame security automation discussions by using the <a href=”https://www.techtarget.com/whatis/definition/Confidentiality-integrity-and-availability-CIA”>CIA triad</a>. The triad consists of the following three aspects:</p>
<ul class=”default-list”>
<li><b>Confidentiality.</b> Enforcing resource access to only authorized users.</li>
<li><b>Integrity.</b> Ensuring data does not unexpectedly change.</li>
<li><b>Availability.</b> Guaranteeing services, applications and data are available to authorized users.</li>
</ul>
<p>The CIA triad <a target=”_blank” href=”https://www.nccoe.nist.gov/publication/1800-26/VolA/index.html” rel=”noopener”>provides context</a> to security discussions. It’s helpful for cybersecurity planning, practices and maintenance. In this case, it helps demonstrate how security automation benefits organizations.</p>
<section class=”section main-article-chapter” data-menu-title=”Challenges of manual intervention”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Challenges of manual intervention</h2>
<p>Let’s begin with the challenges inherent in manual IT security configuration and monitoring.</p>
<p>Modern IT infrastructures are typically too large, too diverse and too distributed to permit efficient and effective manual management. Today’s environments include on-premises physical and virtual devices running Linux and Windows, as well as <a href=”https://www.techtarget.com/searchcloudcomputing/tip/Hybrid-cloud-security-challenges-and-how-to-manage-them”>hybrid and multi-cloud deployments</a> across Amazon, Microsoft and Google platforms. While these placements offer significant benefits in scalability, cost-effectiveness and security, they also introduce a level of complexity that prohibits manual security processes.</p>
<p>Consider the following challenges of manual security management:</p>
<ul class=”default-list”>
<li>Human error due to overlooked settings, unf

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: