Security Design patterns: CIA triad

CIA Triad

When reviewing systems, I use this model to provide useful context to ensure that applications/services have sufficient processing to ensure data security is managed and maintained.

Confidentiality – what level of secrecy is expected for this product or service, how do we protect it, how do we allow access to the data

Integrity – how do we protect the data, how do we prevent unwanted modifications, how do we maintain consistency, how do we know what changed and who changed it.

Availability – ensure uninterrupted access to the data

 

Feel free to share on

Recent Posts

Related blog posts

Designing with Intention: Reflections from UX Brighton’s AI-Powered Future

Designing with Intention: Reflections from UX Brighton’s AI-Powered Future

Is your Mac performing strange on Mac OS Sequoia 15.0? Here's a possible solution.

Is your Mac performing strange on Mac OS Sequoia 15.0? Here’s a possible solution.

Project porfolio: some of the projects I’ve been part of.

Project porfolio: some of the projects I’ve been part of.