CIA Triad
- Confidentiality: Keeping data secret or private.
- Integrity: Ensuring the legitimacy of data so it can be trusted.
- Availability: Ensuring networks, systems, and applications are up and running.
Authentication Factors:
- Knowledge - Something you know.
- Possession - Something you have.
- Inherence - Something you are.
- Location - Where you are.
- Behavior - Something you do.
SFA, DFA, and MFA
Single, Dual, and Multi-Factor Authentication are all important forms of authentication you’ll encounter. The more types of authentication are required the more secure, and more complicated, your system will become.
Authorization
Determines what an authenticated user can, and cannot, do.
Multi-Tenant and Single-Tenant
In a multi-tenant system, data is commingled with other user’s data. Meanwhile, in a single-tenant system, your data is in a completely isolated environment.
Non-Repudiation
Refers to a person’s inability to deny something. Basically, someone cannot claim they did not do something. A user cannot pretend they didn’t do an action they did.
Principles of Secure Design
- Principles of Secure Design and Establishing Security Requirements
- Secure design is a proactive security approach. Secure design is the process of building an application that has been designed with security in mind from the ground up. This is opposed to a more reactive approach of building an application and attempting to secure it after it has been developed.
- OWASP Secure Design Principles
- Minimize Attack Surface
- Establish Secure Defaults
- Principle of Least Privilege
- Defense in Depth
- Fail Securely
- Don’t Trust Services
- Separation of Duties
- Avoid Security by Obscurity
- Keep Security Simple
- Fix Security Issues Correctly
comments powered by Disqus