Principles of Security
Principles of Security
As discussed, security testing is used to find flaws in the app code that make it
susceptible to dangers or security threats such as malicious attacks from third-
party party-entities, thus helping boost the security of your software
applications. The six primary principles of security testing are as follows:
1. Confidentiality
1
individuals have access to the material, and only those with the proper
permissions can view it.
Confidentiality is the very first method through which organizations can ensure
the security of their information. It is a security procedure that delays the leak of
data from outsiders. Any information that is not intended for third parties to see
is considered confidential. Confidentiality is primarily used to safeguard
stakeholder interests by avoiding unauthorized disclosure of information.
2. Integrity
The integrity principle states that the data that an unauthorized individual
modifies must be protected. Integrity’s main goal is to provide the receiver
control over the data that the system provides. The confidentiality structures and
integrity systems frequently employ some of the same underlying strategies.
The integrity model makes sure that accurate data is transmitted from one
program to the next. It shields system data against unauthorized or unintentional
modifications, maintaining the accuracy and reliability of the data. Integrity
models aim to achieve three things:
3. Authentication
4. Authorization
The authorization process typically involves the usage of an access control list,
user roles, user groups, and the definition of permissions and limits for a given
user group as well as the granting and cancelling of user rights.
5. Availability
A data breach may result in lost productivity, damaged reputation, fines, legal
action, and a host of other issues. For each of these reasons, having a data
availability plan is essential in the event that there is a data breach.
3
Systems with high availability strive to be operational at all times, avoiding
service interruptions brought on by power outages, hardware malfunctions, and
system updates. In order to maintain availability, denial-of-service attacks must
be avoided. One such assault would include flooding the target system with
messages, effectively forcing it to shut down.
6. Non-repudiation
Non-repudiation guards against fraud and guarantees that a business can rely on
a message or transaction coming from a particular person or computer system.
Conclusion
4
The principles of security, often referred to as the CIA triad, are fundamental
concepts that guide the protection of information and systems. These principles
are:
1. Confidentiality:
o Ensures that information is accessible only to those authorized to
have access.
o Protects data from unauthorized access and disclosure.
o Techniques: Encryption, access controls, and authentication
mechanisms.
2. Integrity:
o Ensures the accuracy and completeness of information.
o Protects data from being altered or tampered with by unauthorized
parties.
o Techniques: Hashing, digital signatures, and checksums.
3. Availability:
o Ensures that information and resources are available to authorized
users when needed.
o Protects against disruptions to service or data accessibility.
o Techniques: Redundancy, failover mechanisms, and regular
maintenance.
4. Authentication:
o Verifies the identity of users or systems.
o Ensures that entities are who they claim to be.
o Techniques: Passwords, biometrics, and multi-factor
authentication.
5. Authorization:
5
o Determines what authenticated users are allowed to do.
o Ensures that users have appropriate permissions for their roles.
o Techniques: Role-based access control (RBAC), access control
lists (ACLs).
6. Non-repudiation:
o Ensures that a party in a communication cannot deny the
authenticity of their signature or the sending of a message.
o Techniques: Digital signatures and audit logs.
7. Accountability:
o Ensures that actions of individuals can be traced back to them.
o Provides a way to hold individuals responsible for their actions.
o Techniques: Logging and monitoring, audit trails.
8. Privacy:
o Ensures the protection of personal and sensitive information.
o Adheres to regulations and policies regarding data protection.
o Techniques: Data anonymization, encryption, and strict access
controls.
9. Least Privilege:
o Ensures that users have the minimum level of access necessary to
perform their functions.
o Reduces the risk of misuse or compromise.
o Techniques: Fine-grained access controls and regular access
reviews.
10.Defense in Depth:
o Uses multiple layers of security controls to protect information and
systems.
o Provides redundancy in case one control fails.
o Techniques: Firewalls, intrusion detection systems (IDS), and
endpoint protection.
6
These principles collectively contribute to a comprehensive security posture,
ensuring that information and systems are protected from various threats and
vulnerabilities.