CISSP Study Note: The CIA Triad – Confidentiality, Integrity, Availability


CISSP Study Note: The CIA Triad – Confidentiality, Integrity, Availability

The CIA Triad is the core foundation of information security and shows up throughout the CISSP exam — especially in Domain 1: Security and Risk Management.

To pass the exam and excel as a cybersecurity professional, you must understand how each pillar works, how we implement protections, and what threatens them.


๐Ÿ”’ Confidentiality – Keep Secrets Secret

CISSP – the CIA Triad – Confidentiality

We want to ensure that only authorized users can access information. Confidentiality is about preventing unauthorized disclosure of data.

✅ How We Protect Confidentiality:

  • Encryption for data at rest (e.g., AES-256), full disk encryption.

  • Secure transport protocols for data in motion: SSL, TLS, IPsec.

  • Best practices for data in use:

    • Clean desk policy

    • Screen privacy filters

    • Automatic and manual screen locking

    • Avoid shoulder surfing

  • Access control principles:

    • Strong passwords

    • Multi-factor authentication (MFA)

    • Masking sensitive data

    • Need-to-Know & Least Privilege

⚠️ Threats to Confidentiality:

  • Cryptanalysis (breaking encryption)

  • Social engineering (phishing, pretexting)

  • Keyloggers (software or hardware)

  • Cameras & Steganography

  • Insecure IoT devices acting as backdoors


๐Ÿงฌ Integrity – Trust What You See

CISSP – the CIA Triad – Integrity

We want system and data integrity — ensuring information hasn’t been altered improperly, whether by accident or by a malicious actor.

✅ How We Protect Integrity:

  • Cryptography (again!)

  • Checksums (e.g., CRC)

  • Hashes/Message Digests (e.g., MD5, SHA-1, SHA-256)

  • Digital signatures – ensure authenticity and non-repudiation

  • Access controls – prevent unauthorized modifications

⚠️ Threats to Integrity:

  • Data alteration (accidental or malicious)

  • Code injections (SQLi, XSS)

  • Cryptanalysis (forging or manipulating data)


⚙️ Availability – Keep Systems Running

CISSP – the CIA Triad – Availability

We want to ensure authorized users have reliable and timely access to systems and data. Availability is about minimizing downtime.

✅ How We Ensure Availability:

  • IPS/IDS to detect and prevent attacks

  • Patch management to fix vulnerabilities

  • Redundancy at all levels:

    • Power: UPS, generators

    • Storage: RAID

    • Networks: Multiple paths

    • People: Cross-trained staff

    • Systems: High Availability (HA) clusters

  • Service Level Agreements (SLAs) define uptime expectations (e.g., 99.9%)

⚠️ Threats to Availability:

  • Malicious attacks (DDoS, physical sabotage, ransomware)

  • Application failures (bad code, crashes)

  • Hardware/component failures (disks, routers, HVAC, etc.)


๐Ÿง  TL;DR – One-Liner Flash Summary:

CIA Pillar Goal Defense Threat
Confidentiality Keep data secret Encryption, MFA, access control Phishing, keyloggers, IoT
Integrity Keep data unaltered Hashes, digital signatures, access control Code injection, data tampering
Availability Keep systems and data accessible Redundancy, patching, IPS/IDS DDoS, hardware failure, malware

๐Ÿ“š Domain Reference:

This content is covered primarily in:

  • Domain 1: Security and Risk Management

  • ๐Ÿ”„ Reinforced across:

    • Domain 3: Security Architecture and Engineering

    • Domain 7: Security Operations


๐Ÿš€ Final Tip:

On the exam, many questions will indirectly reference the CIA triad. Ask yourself:

“Which pillar is being attacked or protected in this scenario?”

If you can answer that, you’re thinking like a CISSP.


Comments

Popular posts from this blog

๐Ÿงญ CISSP Study Note: Guidelines

๐Ÿ’ธ CISSP Study Note: Risk Transference

๐Ÿ“ CISSP Study Note: Standards