1. The Institute of Internal Auditors (IIA). (2012). Global Technology Audit Guide (GTAG) 1: Information Technology Risk and Controls
2nd Edition. Page 6. The guide defines "Confidentiality" as "Preserving authorized restrictions on access and disclosure
" which directly aligns with preventing unauthorized access to information assets.
2. National Institute of Standards and Technology (NIST). (2018). Framework for Improving Critical Infrastructure Cybersecurity
Version 1.1. Page 9. The "Protect" function (PR) includes the "Access Control (PR.AC)" category
whose purpose is to ensure that "Access to assets...is limited to authorized users
processes
or devices." This highlights access control as a core protective function.
3. Stallings
W.
& Brown
L. (2018). Computer Security: Principles and Practice (4th ed.). Pearson. In Chapter 1
Section 1.1
the text introduces the three key security objectives (the CIA triad)
defining Confidentiality as "Data confidentiality
" which "assures that private or confidential information is not made available or disclosed to unauthorized individuals." This establishes the prevention of unauthorized access as a fundamental goal.