In information security, confidentiality, integrity and availability, known as CIA, are essential principles for an effective strategy to protect the corporate environment.

We have already talked in this blog about what each of these pillars consists of.

For companies that seek to treat information reliably and securely, these principles make perfect sense. But how can you move from theory to practice?

Let’s look at some layers of infrastructure controls that help companies achieve CIA goals. But first, it is worth remembering that these principles are considered crucial by ISO 27000, which serves as reference for the selection and implementation of an information security management system.

The layers presented below are efficient ways to protect corporate information, and can effectively prevent data leakage in any system:

Firewalls

Internal networks need to communicate with external environments (public network: internet) or even with other geographically independent private networks (which generally also use the public network for this purpose). However, nowadays, the risk of allowing direct communication, that is without any intermediate control, is way too high for a company. The number of threats on the web is endless and if there is no control such as a firewall, for example, security incidents (and the costs to businesses) would be even greater.

Firewalls have a crucial role of mediating communication requests by blocking packets and traffic solicitations that do not meet the pre-established rules by each company’s security and productivity policy – for both internal and external requests. For example, you can restrict unplanned local activities (such as accessing a directory by an unprivileged user, promoting the confidentiality of information), or blocking external requests (such as suspicious packages).

Proxy and Routing

Proxy helps you manage what the external world to your network is capable to see within your company. Because local devices on a network do not access the external network directly, it’s up to the proxy to receive the request from the local device, forward it to the server and then return access to the device.

Another important practice is the adoption of routers that also regulate access to the network and, just like firewalls, use reputation lists (whitelists, blacklists) to target packets. The difference is that routers have the function of correctly redirecting IP packets to other networks, in a complementary action to that of the firewall.

Threat Control

In the event of an infection that can cause data loss or other damage (such unavailability of any systems, triggered by ransomware), the adoption of software for active detection and remediation is critical. In this group, we can include several functions, such as advanced threat protection systems, anti-malware, intrusion prevention and other functions required for a comprehensive approach.

Cryptography

Each of the layers above represents a raise in the level of security of the network. Encryption is one of the most important controls and must permeate all layers. It is so important to ensure the protection of data in transit (with the support, for example, of VPN networks), and to protect the data that is still stored at rest in your network. Therefore, security applications generally use cryptography associated with their functions.

BLOCKBIT UTM unifies a variety of advanced security technologies, from firewall to encryption, reinforcing adherence to security standards to promote confidentiality, integrity and availability. Learn more.