

As an example, only authorized Payroll employees should have access to the employee payroll database.

Typically, this involves ensuring that only those who are authorized have access to specific assets and that those who are unauthorized are actively prevented from obtaining access. In practice, it’s about controlling access to data to prevent unauthorized disclosure. ConfidentialityĬonfidentiality refers to an organization’s efforts to keep their data private or secret. In the next section, we’ll provide precise and detailed explanations of these principles in the context of InfoSec, and then look at real-world applications of these principles. Based on that evaluation, the security team implements a set of security controls to reduce risk within their environment. Security professionals evaluate threats and vulnerabilities based on the potential impact they have on the confidentiality, integrity, and availability of an organization’s assets-namely, its data, applications, and critical systems.
