Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • Integrity: How It’s More than Just Data Security and FIM
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Integrity: How It’s More than Just Data Security and FIM

5 years ago Neil Harvey
Integrity: How It’s More than Just Data Security and FIM

Integrity is a word thrown around a lot in the cybersecurity space. That’s not surprising. It is one of the three components that make up the CIA Triad, after all. However, the meaning and use of the word has been relatively limited in many security circles up until now.

Let’s take a look at the security industry more broadly. In most conversations dealing with integrity, data security and File Integrity Monitoring (FIM) controls often end up being the primary focal areas. But there’s more going on with integrity than just those two security principles. There’s more to talk about.

With that said, let’s take a step back and consider integrity as a broader concept. A definition of integrity can get us started.

Integrity Defined

Integrity is a way to understand what matters to an organization and what an organization should focus on in order to prevent undesired consequences. As the basis for trust and reliability, integrity becomes the ultimate measure of system security. True integrity allows for no variance between something’s original and current state. In other words, that something’s current state can be trusted because nothing has changed from its original, trustworthy state.

Tim Erlin, vice president of product management for Tripwire, notes that organizations can’t build trust into their security programs without integrity.

Managing integrity is ultimately about managing change throughout your entire environment. Change can be internal or external, authorised or unauthorised, intentional or accidental, benign or malicious. When you take an expansive view of change, it’s clear that managing integrity is at the core of foundational security.

Expanding the Focus Beyond Data Integrity

As mentioned in the introduction, integrity is one of the three CIA Triad principles – confidentiality, integrity, and availability – that serve as a framework for organizations to make sound information security policies. In this context, integrity is generally focused on the nature of organizational data and on organizations’ responsibility to make sure that external sources don’t succeed in compromising that information.

Yet integrity is so much bigger. While data integrity is certainly important to any security strategy, its broader application affects every area of an information system. As such, integrity can be a driving force of an organization’s entire security program. The focus on integrity can expand beyond just data integrity to encompass all aspects of architecture and security measures across IT and OT environments.

Here are examples of how integrity can take shape across your organization:

  • Repeating the example mentioned above, data integrity protects the incorruptibility of data. It includes data backup and recovery, encryption, blockchain, identity and access management (IAM) as well as file access monitoring.
  • System integrity ensures that no one makes unauthorized changes to critical assets. It includes FIM, security configuration management (SCM), host-based intrusion detection systems (IDS), vulnerability management and patching as well as privileged account management (PAM).
  • Network integrity maintains the reliability of connections and protects the data moving through the network. It includes firewalls, network-based intrusion detection systems (IDS), encryption, virtual private networks (VPNs) and secure remote access.
  • Physical integrity protects the facilities and spaces within which critical assets reside. It includes access controls, security monitoring, all-hazards mitigation (fire, water, earthquakes, etc.) and uninterrupted power supplies.
  • Process integrity ensures that organizations have properly integrated, configured and coordinated multiple controls in a way that ensures a holistic approach to incorruptibility and resilience. It includes security incident and event management (SIEM); security orchestration, automation and response (SOAR); analytics and reporting; and a well-functioning security operations center (SOC).
  • People integrity seeks to maintain trust in the humans who use IT and OT systems, who create and use data as well as who oversee enterprise security efforts. It includes security awareness training, certification, role-based access controls (RBAC), end-user behavior analytics (EUBA), organizational policy enforcement and background screening.

Integrity and Tripwire

By building an enterprise security strategy focused on integrity, organizations can incorporate trust into their people, processes and technology. All they need is the right security solutions provider to walk with them and to help to enable their security efforts.

That’s where Tripwire comes in. The company’s best-in-class technology and services empowers customers to focus on the right endpoints in real-time, on-site and in the cloud as well as to enable intelligent decisions and actions that strengthen security.

Learn more about how Tripwire can help your organization focus its enterprise security strategy around integrity.

The post ” Integrity: How It’s More than Just Data Security and FIM” appeared first on TripWire

Source:TripWire – Neil Harvey

Tags: Cloud, Critical Severity, TripWire

Continue Reading

Previous Attackers Blowing Up Discord, Slack with Malware  
Next PHP Site’s User Database Was Hacked In Recent Source Code Backdoor Attack

More Stories

  • Cyber Attacks
  • Data Breach

Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

1 hour ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats

5 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach

Securing the Mid-Market Across the Complete Threat Lifecycle

5 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

8 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

11 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

12 hours ago [email protected] (The Hacker News)

Recent Posts

  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
  • ⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats
  • Securing the Mid-Market Across the Complete Threat Lifecycle
  • Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users
  • eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT