๐ CISSP Study Note: Confidentiality
๐ CISSP Study Note: Confidentiality
๐ Definition
Confidentiality is the principle of preserving authorized restrictions on information access and disclosure, ensuring that data is only accessible by authorized individuals. This includes protecting personal privacy, proprietary information, and sensitive organizational data.
๐ง Why It Matters in Cybersecurity
Confidentiality is essential for trust, privacy, and legal compliance. A breach of confidentiality can result in identity theft, financial loss, intellectual property theft, and regulatory penalties. It's especially critical in fields like healthcare, finance, defense, and government.
๐ What Confidentiality Protects
| Type of Data | Examples |
|---|---|
| Personal | Social Security Numbers, medical records, addresses |
| Financial | Bank records, credit card numbers, trading algorithms |
| Corporate | Trade secrets, source code, strategic plans |
| Government | Classified documents, national defense data |
๐ก️ Techniques to Enforce Confidentiality
| Method | Description |
|---|---|
| Encryption | Converts data into unreadable form unless decrypted by authorized parties. |
| Access Controls | Role-based, attribute-based, or mandatory access models to restrict who can view what. |
| Authentication | Verifies identity before granting access (e.g., passwords, biometrics, MFA). |
| Data Classification | Labels data based on sensitivity (e.g., Public, Confidential, Secret). |
| Need-to-Know Principle | Users only access what is required for their role. |
⚠️ Threats to Confidentiality
| Threat | Description |
|---|---|
| Data Breach | Unauthorized access or exfiltration of sensitive data. |
| Eavesdropping / Sniffing | Intercepting data in transit (e.g., on unencrypted networks). |
| Phishing / Social Engineering | Tricking users into revealing sensitive information. |
| Improper Disposal | Failing to securely destroy data or hardware. |
✅ Example (CISSP-Style)
A law firm encrypts client files, restricts access to case data using role-based controls, and requires two-factor authentication for its document management system.
✅ These controls preserve confidentiality, ensuring sensitive legal data is only accessed by those with a legitimate need.
๐ Found In CISSP Domains
| Domain | Focus |
|---|---|
| ๐ Domain 1: Security and Risk Management | Includes confidentiality as part of security governance and risk principles. |
| ๐ Domain 3: Security Architecture and Engineering | Covers implementation of cryptographic and access control systems. |
๐ Memory Hook
“Only those who should see it, can see it.”
Confidentiality ensures that information is kept private, protected, and purpose-specific.
Comments
Post a Comment