CISOBox Provides the Granular Access Controls You Need for Efficient Sharing that also Preserves Confidentiality
As your team works to handle information security incidents, sharing data, documentation and communication is essential to a quick, effective response. Yet sharing must be balanced with security: since information security incident data is often sensitive, you must ensure that confidentiality is not compromised in the sharing process.
Put another way, your team members need easy, shared access to the incident data that will help them to perform their jobs and work together. But to ensure security, they can’t have access to everything.
CISOBox lets you have your cake and eat it too: through its unique object-based and role-based access controls, the system lets you share and collaborate for efficiency, but also provide appropriate, strong protections for sensitive incident data.
Object-Based Incident Data Access Control
CISOBox provides users the ability to precisely control access to and visibility of records in the system at the object level.
Access can be controlled granularly, object-by-object for incident records and sub-components of incident records including attached evidence files and journal entries.
Each of these data objects in CISOBox has its own unique access controls which specify the sensitivity of the object’s data, as well as optionally which users and groups can see it and which users and groups can edit it.
When users authenticate, the system determines their privileges for accessing data of varying levels of sensitivity or “classifications”. In all of its user interfaces, the system then dynamically filters users’ views of data objects so that users see only what their privileges and the objects’ access controls permit them to see.
Users’ view of data is precisely and continuously controlled to ensure the confidentiality of sensitive data in the system.
Role-Based Access Control
Working in tandem with object-level incident data access controls are role-based controls.
Users can be assigned roles that determine their privileges for creating and editing incident and other data in CISOBox. For example, users may be assigned a Team Member role, allowing them to create and edit incidents and their sub-components. Or they may be assigned a Read Only role, which grants no editing privileges.
Roles work in tandem with object-level access controls to create precision control over the visibility of incident data and over who can create and modify that data.
The end result is total control over who can access, view and edit data and a powerful method of protecting the confidentiality and integrity of shared information security incident records.
Security Technology You Can Trust
You can trust CISOBox’s incident data access controls because they’ve been battle tested in the world’s most demanding data security environments:
In fact, CISOBox’s access control technology is the same technology developed for and utilized on an enterprise scale by US Federal Intelligence agencies to protect sensitive mission data classified under the CAPCO standard.
Through CISOBox, it’s available to non-federal organizations, too.
As a trained information security officer, you know that protecting the confidentiality of sensitive data is a critical requirement for information security incident management systems. You also know the risks associated with unsecured cyber incident data are substantial. CISOBox’s security technology mitigates those risks and makes it easy to implement best-practices and compliance in your IR processes.
Get in touch with us today to schedule a demo of CISOBox’s secure incident management capabilities and access control technology.