Information Security Fundamentals

Information security defines the professional and regulatory boundary between protected and exposed organizational assets. This reference covers the structural components of the infosec discipline — its formal definitions, control mechanisms, applied scenarios, and the decision frameworks that practitioners and compliance professionals use to classify and prioritize protective measures. The scope is national (US), with references to the federal standards bodies and regulatory codes that govern practice across commercial, government, and critical infrastructure sectors.

Definition and scope

Information security is formally defined by the National Institute of Standards and Technology (NIST) as the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction (NIST SP 800-12, Rev 1). That definition anchors the three foundational properties known as the CIA triad: confidentiality (access limited to authorized parties), integrity (data remains accurate and unaltered), and availability (systems and data accessible when required). Nearly every control catalog, audit framework, and compliance standard in professional use — from ISO/IEC 27001 to NIST SP 800-53 — organizes controls around one or more of these three properties.

The scope of information security spans five operationally distinct domains:

  1. Network security — controls governing data in transit across infrastructure layers, including firewalls, intrusion detection systems, and segmentation policies
  2. Endpoint security — device-level controls applied to workstations, servers, and mobile devices, including patch management and host-based detection
  3. Application security — secure development lifecycles, code review, and vulnerability management for software systems
  4. Data security — encryption, data loss prevention, classification schemes, and access control at the data layer
  5. Identity and access management (IAM) — authentication, authorization, and privilege governance governing who accesses what resources under what conditions

The InfoSec Providers resource maps practitioners and service providers across these domains at a national level.

How it works

Information security operates through a structured risk management cycle rather than a static set of installed tools. NIST's Risk Management Framework (RMF), documented in NIST SP 800-37, Rev 2, defines six discrete phases:

  1. Categorize — classify information systems by impact level (low, moderate, high) based on potential harm to organizational operations, assets, or individuals
  2. Select — choose a baseline set of security controls from NIST SP 800-53 appropriate to the categorized impact level
  3. Implement — deploy selected controls within the system environment and document implementation details
  4. Assess — evaluate whether controls are implemented correctly, operating as intended, and producing the desired security outcomes
  5. Authorize — senior officials formally accept residual risk and authorize system operation
  6. Monitor — continuously track control effectiveness, document changes, and conduct ongoing assessments

Federal civilian agencies are required by the Federal Information Security Modernization Act (FISMA) of 2014 (44 U.S.C. § 3551 et seq.) to implement this cycle for all federal information systems. The Office of Management and Budget (OMB) sets annual reporting requirements under FISMA, and the Cybersecurity and Infrastructure Security Agency (CISA) provides implementation guidance and threat intelligence to support agency compliance.

Common scenarios

Three deployment contexts represent the majority of infosec implementation work in the US professional sector.

Federal and government systems: Agencies operate under FISMA, with controls selected from NIST SP 800-53 Rev 5 — a catalog of over 1,000 individual control parameters across 20 control families (NIST SP 800-53, Rev 5). Authorization to Operate (ATO) packages document control implementation and form the legal basis for system operation.

Healthcare: Covered entities and business associates regulated under the Health Insurance Portability and Accountability Act (HIPAA) Security Rule (45 C.F.R. Parts 160 and 164) must implement administrative, physical, and technical safeguards. The Department of Health and Human Services (HHS) Office for Civil Rights enforces penalties, with a maximum civil monetary penalty of $1,919,173 per violation category per year as adjusted for inflation (HHS, HIPAA Civil Money Penalties).

Financial services: The Federal Financial Institutions Examination Council (FFIEC) publishes the IT Examination Handbook — Information Security, which establishes examination standards for banks, credit unions, and related institutions. The Gramm-Leach-Bliley Act (GLBA) Safeguards Rule, enforced by the Federal Trade Commission (FTC), requires financial institutions to maintain a written information security program.

The distinction between these contexts is primarily one of regulatory authority: federal systems answer to OMB and CISA, healthcare entities to HHS, and financial institutions to the FFIEC, FTC, and applicable prudential regulators.

Decision boundaries

Practitioners use two primary classification instruments to determine appropriate security investment: impact categorization and control baseline selection.

Impact categorization, defined in FIPS Publication 199, distinguishes three levels — low, moderate, and high — based on the potential adverse effect of a security failure on organizational operations, assets, or individuals. A high-impact categorization triggers a substantially larger control baseline than a low-impact one, with corresponding resource and operational implications.

Control baseline selection follows from categorization. NIST SP 800-53B defines three corresponding baselines: low, moderate, and high. The high baseline includes controls absent from the low baseline — for example, mandatory multi-factor authentication for privileged accounts, automated audit log review, and supply chain risk management requirements.

The boundary between preventive and detective controls is a second decision axis. Preventive controls (e.g., access restrictions, encryption) reduce the probability of a security event. Detective controls (e.g., intrusion detection, log monitoring) identify events that have already occurred. A balanced control architecture maintains both layers; organizations that rely exclusively on preventive controls cannot respond to failures that bypass perimeter defenses.

The page describes how these professional categories are represented in the service sector landscape, and the How to Use This InfoSec Resource page covers navigation of the practitioner provider network by domain and specialization.

 ·   · 

References