top of page

How much security is good security?

  • Writer: sandeep karnik
    sandeep karnik
  • Feb 21, 2023
  • 4 min read



This question haunts every sys admin, network admin, product owner, and company owner! Often I am asked to evaluate the security where the depth and breadth of a pen-test is determined in absolute, however, it should be assessed in the context. The context being - what the assets are, their weight and impact of the breach, what the adversaries are, and what kind of risks they pose. You don't want to implement too little security and leave your system open for attacks, but also you don't want to do too much security too.


The level of security required depends on the specific context and the nature of the assets being protected. There is no one-size-fits-all answer to this question, as the amount of security needed can vary greatly depending on a variety of factors, such as the value of the assets being protected, the likelihood and potential impact of a security breach, and the level of resources that can be allocated towards security measures.

In general, it is important to balance the amount of security needed to adequately protect assets and the costs associated with implementing and maintaining those security measures. It is also important to consider the user experience and potential negative impacts of overly strict security measures that could limit productivity or discourage system use.

Ultimately, the appropriate level of security will depend on a thorough risk assessment and the development of a security strategy that takes into account the specific needs and constraints of the system or organization.



Going over the board with security can create a number of problems, including:

  1. User experience: Implementing too many security measures can make it difficult or cumbersome for users to access and use systems or data, leading to frustration and decreased productivity.

  2. Cost: Implementing and maintaining excessive security measures can be expensive, consuming valuable resources that could be used elsewhere in the organization.

  3. False sense of security: Overreliance on security measures can create a false sense of security, leading organizations to overlook other potential vulnerabilities or threats.

  4. Compatibility issues: Adding too many layers of security can sometimes create compatibility issues with other software or systems, leading to technical difficulties that can impact functionality.

  5. Slower response time: Overly strict security measures may require additional time to access or modify data, which can impact response time in critical situations.

  6. Reduced innovation: Too much focus on security can sometimes stifle innovation and creativity, limiting the ability of organizations to explore new technologies or processes.


So how do we know what is "just enough"? Let's understand the CIA triad to get to it.


CIA Triad


The CIA triad is a widely recognized framework for information security that consists of three core principles: confidentiality, integrity, and availability.


Confidentiality

This principle is concerned with ensuring that sensitive information is kept private and only accessible to authorized individuals or entities. Confidentiality measures typically include access controls, encryption, and secure communication protocols to prevent unauthorized access or disclosure.


Integrity

This principle is concerned with ensuring that information remains accurate and trustworthy throughout its lifecycle. This involves implementing measures to prevent unauthorized modification or deletion of information, as well as ensuring the accuracy and completeness of information.


Availability

This principle is concerned with ensuring that information is accessible to authorized users when needed. Availability measures typically include redundant systems and backup solutions to ensure that information can be accessed even in the event of an outage or other disruption.


The CIA triad is a useful framework for developing a comprehensive approach to information security, as it helps to ensure that sensitive information is protected from unauthorized access, modification, or disclosure, while also ensuring that authorized users have access to the information they need when they need it.


In risk assessment, the security triad can identify potential risks and vulnerabilities related to confidentiality, integrity, and availability. By assessing the risks associated with each area, organizations can develop a comprehensive risk management strategy that includes appropriate security measures and controls to address the identified risks. This can help organizations protect their information assets and minimize the impact of security incidents or other disruptions. In risk assessment, the security triad can identify potential risks and vulnerabilities related to confidentiality, integrity, and availability. By assessing the risks associated with each area, organizations can develop a comprehensive risk management strategy that includes appropriate security measures and controls to address the identified risks. This can help organizations protect their information assets and minimize the impact of security incidents or other disruptions.



How are assets valued?


Assets can be valued in a number of ways, depending on the specific context and the nature of the asset. Here are a few common methods of asset valuation:


Financial value: This involves determining the financial value of an asset based on its market price or the amount of money it can generate through sale, lease, or other transactions. Financial value can be determined using financial analysis tools, such as discounted cash flow analysis, which takes into account factors such as inflation and interest rates.


Replacement value: This involves determining the cost of replacing an asset if it were lost or damaged. This includes not only the direct cost of replacement, but also the cost of any associated downtime or lost productivity.


Functional value: This involves determining the value of an asset based on its usefulness or utility. For example, the value of a software application might be based on its ability to streamline business processes or improve operational efficiency.


Reputation value: This involves determining the value of an asset based on its reputation or brand recognition. This is particularly relevant for intangible assets such as intellectual property or customer relationships, where reputation can be a critical factor in determining the value of the asset.


Regulatory value: This involves determining the value of an asset based on its compliance with regulatory requirements. For example, a company might place a high value on assets that enable it to comply with environmental or data privacy regulations.


Overall, the method of asset valuation will depend on the specific context and the nature of the asset. In many cases, a combination of these methods may be used to arrive at a comprehensive assessment of the value of an asset.



Contact us to know more and how we can help you improve the security posture of your products, infrastructure and cloud setup.


Comments


bottom of page