Member-only story

Use, Ownership and Control are at the heart of Cybersecurity

Ignore them at your peril

Vicente Aceituno Canal
2 min readDec 2, 2021
Photo by Naveed Pervaiz on Unsplash

The best way to protect information is understanding the expectations that users have about it, and the first thing we need to address is: Who is in the best position to tell us what the organization cybersecurity requirements are? I think the best way is to find out is finding who are the owners, users and administrators of information. Let’s go over the definitions:

a) Ownership is defined having legal rights and duties on something.

b) Control is defined as having the ability to:

  • Grant or deny access to users.
  • Attribute to specific users their use of information.

c) Use is defined as having access to read, write or modify information.

As you can see in the following table, how we will go about protecting each type of information will be very different, even before getting the full details of security requirements the owners.

I am still surprised about how infrequent is this type of analysis…

To learn more

This article is part of a series that starts here: Principles of Evidence Based Cybersecurity Management

--

--

Vicente Aceituno Canal
Vicente Aceituno Canal

Written by Vicente Aceituno Canal

Evidence-based cybersecurity management leader

No responses yet