CISSP Study Note: The CIA Triad – Confidentiality, Integrity, Availability
CISSP Study Note: The CIA Triad – Confidentiality, Integrity, Availability
The CIA Triad is the core foundation of information security and shows up throughout the CISSP exam — especially in Domain 1: Security and Risk Management.
To pass the exam and excel as a cybersecurity professional, you must understand how each pillar works, how we implement protections, and what threatens them.
๐ Confidentiality – Keep Secrets Secret
CISSP – the CIA Triad – Confidentiality
We want to ensure that only authorized users can access information. Confidentiality is about preventing unauthorized disclosure of data.
✅ How We Protect Confidentiality:
-
Encryption for data at rest (e.g., AES-256), full disk encryption.
-
Secure transport protocols for data in motion: SSL, TLS, IPsec.
-
Best practices for data in use:
-
Clean desk policy
-
Screen privacy filters
-
Automatic and manual screen locking
-
Avoid shoulder surfing
-
-
Access control principles:
-
Strong passwords
-
Multi-factor authentication (MFA)
-
Masking sensitive data
-
Need-to-Know & Least Privilege
-
⚠️ Threats to Confidentiality:
-
Cryptanalysis (breaking encryption)
-
Social engineering (phishing, pretexting)
-
Keyloggers (software or hardware)
-
Cameras & Steganography
-
Insecure IoT devices acting as backdoors
๐งฌ Integrity – Trust What You See
CISSP – the CIA Triad – Integrity
We want system and data integrity — ensuring information hasn’t been altered improperly, whether by accident or by a malicious actor.
✅ How We Protect Integrity:
-
Cryptography (again!)
-
Checksums (e.g., CRC)
-
Hashes/Message Digests (e.g., MD5, SHA-1, SHA-256)
-
Digital signatures – ensure authenticity and non-repudiation
-
Access controls – prevent unauthorized modifications
⚠️ Threats to Integrity:
-
Data alteration (accidental or malicious)
-
Code injections (SQLi, XSS)
-
Cryptanalysis (forging or manipulating data)
⚙️ Availability – Keep Systems Running
CISSP – the CIA Triad – Availability
We want to ensure authorized users have reliable and timely access to systems and data. Availability is about minimizing downtime.
✅ How We Ensure Availability:
-
IPS/IDS to detect and prevent attacks
-
Patch management to fix vulnerabilities
-
Redundancy at all levels:
-
Power: UPS, generators
-
Storage: RAID
-
Networks: Multiple paths
-
People: Cross-trained staff
-
Systems: High Availability (HA) clusters
-
-
Service Level Agreements (SLAs) define uptime expectations (e.g., 99.9%)
⚠️ Threats to Availability:
-
Malicious attacks (DDoS, physical sabotage, ransomware)
-
Application failures (bad code, crashes)
-
Hardware/component failures (disks, routers, HVAC, etc.)
๐ง TL;DR – One-Liner Flash Summary:
| CIA Pillar | Goal | Defense | Threat |
|---|---|---|---|
| Confidentiality | Keep data secret | Encryption, MFA, access control | Phishing, keyloggers, IoT |
| Integrity | Keep data unaltered | Hashes, digital signatures, access control | Code injection, data tampering |
| Availability | Keep systems and data accessible | Redundancy, patching, IPS/IDS | DDoS, hardware failure, malware |
๐ Domain Reference:
This content is covered primarily in:
-
✅ Domain 1: Security and Risk Management
-
๐ Reinforced across:
-
Domain 3: Security Architecture and Engineering
-
Domain 7: Security Operations
-
๐ Final Tip:
On the exam, many questions will indirectly reference the CIA triad. Ask yourself:
“Which pillar is being attacked or protected in this scenario?”
If you can answer that, you’re thinking like a CISSP.
Comments
Post a Comment