CIA Triad & Security Controls
Master the fundamental principles of information security through the CIA Triad (Confidentiality, Integrity, Availability) and understand how security controls protect against threats.
The CIA Triad - Foundation of Information Security
Confidentiality
Definition: Ensuring information is accessible only to authorized individuals.
Key Concepts:
- Data classification (Public, Internal, Confidential, Secret)
- Need-to-know principle
- Privacy protection
- Information disclosure prevention
Common Threats:
- Data breaches
- Eavesdropping
- Social engineering
- Insider threats
- Unauthorized access
Protection Methods:
- Encryption (AES, RSA)
- Access controls (RBAC, ABAC)
- Authentication (MFA, biometrics)
- Data loss prevention (DLP)
- Network segmentation
Integrity
Definition: Maintaining accuracy and trustworthiness of data throughout its lifecycle.
Key Concepts:
- Data accuracy and completeness
- Non-repudiation
- Version control
- Change management
Common Threats:
- Data corruption
- Unauthorized modifications
- Malware infections
- Human error
- System failures
Protection Methods:
- Digital signatures
- Checksums and hashing (SHA-256)
- Version control systems
- Database constraints
- Audit trails and logging
Availability
Definition: Ensuring information and systems are accessible when needed by authorized users.
Key Concepts:
- Uptime and reliability
- Service level agreements (SLAs)
- Business continuity
- Disaster recovery
Common Threats:
- DDoS attacks
- Hardware failures
- Natural disasters
- Power outages
- Network congestion
Protection Methods:
- Redundancy and failover
- Load balancing
- Backup systems (3-2-1 rule)
- Uninterruptible power supply (UPS)
- Content delivery networks (CDN)
CIA Triad Scenario Analysis
Select a Security Scenario:
Impact Analysis:
Threat: Unauthorized access to patient records
Patient data exposed to unauthorized personnel
Medical records could be altered, affecting treatment
System shutdown prevents access to critical patient data
Security Controls Framework
Security controls are safeguards implemented to reduce risk and protect the CIA Triad. They can be categorized by function and implementation type.
Security Control Categories
Category | Administrative/Operational | Technical/Logical | Physical/Environmental |
---|---|---|---|
Preventive | Security policies, Training, Background checks | Firewalls, Encryption, Access controls | Locks, Fences, Security guards |
Detective | Security audits, Reviews, Monitoring | IDS/IPS, SIEM, Log analysis | CCTV, Motion sensors, Alarms |
Corrective | Incident response, Disciplinary actions | Patches, Antivirus updates, Backups | Fire suppression, Emergency procedures |
Recovery | Business continuity, Disaster recovery | System restoration, Data recovery | Alternate sites, Emergency power |
Compensating | Manual processes, Increased oversight | Alternative authentication, Monitoring | Additional barriers, Enhanced security |
Explore Control Types:
Preventive Controls
Purpose: Stop security incidents before they occur
Examples:
- Firewalls blocking unauthorized network access
- Antivirus software preventing malware installation
- Access control systems restricting facility entry
- Input validation preventing injection attacks
- Security awareness training for employees
Risk Management & CIA Integration
Risk Assessment Process
- Asset Identification: Catalog information assets and their value
- Threat Identification: Identify potential threats to each asset
- Vulnerability Assessment: Find weaknesses that threats could exploit
- Risk Calculation: Risk = Threat × Vulnerability × Impact
- Control Selection: Choose appropriate controls to mitigate risks
- Residual Risk: Evaluate remaining risk after controls
Risk Treatment Options
- Accept: Acknowledge risk and take no action
- Avoid: Eliminate the risk by not performing the activity
- Transfer: Share risk with third parties (insurance, outsourcing)
- Mitigate: Reduce risk through security controls
CIA Impact Levels
Level | Description | Examples |
---|---|---|
Low | Limited adverse effect | Public website defacement |
Moderate | Serious adverse effect | Customer data exposure |
High | Severe or catastrophic effect | Critical infrastructure failure |
Risk Calculation Example:
Threat: Insider threat (Medium probability)
Vulnerability: Weak access controls (High)
Impact: Financial data breach (High)
Risk Level: Medium × High × High = HIGH RISK
Security Frameworks & Standards
NIST Cybersecurity Framework
Five Core Functions:
- Identify: Asset management, business environment
- Protect: Access controls, awareness training
- Detect: Anomaly detection, monitoring
- Respond: Incident response, communication
- Recover: Recovery planning, improvements
ISO 27001/27002
Control Categories:
- Information security policies
- Organization of information security
- Human resource security
- Asset management
- Access control
- Cryptography
- Physical and environmental security
- Operations security
- Communications security
- Incident management
Industry-Specific
Common Frameworks:
- PCI DSS: Payment card industry
- HIPAA: Healthcare information
- SOX: Financial reporting
- GDPR: European data protection
- FERPA: Educational records
- FISMA: Federal information systems
Practical Implementation Guide
Confidentiality Basics
- Strong passwords policy
- Multi-factor authentication
- File encryption for sensitive data
- Secure Wi-Fi configuration
- Employee training on data handling
Integrity Essentials
- Regular data backups (3-2-1 rule)
- Antivirus and anti-malware
- Software patching schedule
- Change management process
- Digital signatures for documents
Availability Fundamentals
- Uninterruptible power supply (UPS)
- Cloud backup solutions
- Internet service redundancy
- Basic disaster recovery plan
- Regular system maintenance
Advanced Confidentiality
- Zero-trust architecture
- Data loss prevention (DLP)
- Privileged access management
- Network segmentation
- End-to-end encryption
Robust Integrity
- Blockchain for critical records
- Advanced threat protection
- Configuration management
- Database integrity monitoring
- Immutable audit logs
High Availability
- Clustered systems and failover
- Geographic redundancy
- Load balancing and CDN
- Hot/warm/cold site recovery
- Real-time replication
Step-by-Step Process:
- Asset Classification: Identify and classify information assets
- Threat Modeling: Identify potential threats and attack vectors
- Vulnerability Assessment: Scan for technical and procedural weaknesses
- Risk Analysis: Calculate risk levels for each asset-threat pair
- Control Mapping: Map controls to CIA principles and risks
- Cost-Benefit Analysis: Evaluate control effectiveness vs. cost
- Implementation Plan: Prioritize and schedule control deployment
- Monitoring & Review: Continuously assess control effectiveness
Control Selection Criteria:
Factor | Considerations |
---|---|
Effectiveness | How well does it mitigate the risk? |
Cost | Implementation and operational expenses |
Compliance | Regulatory and legal requirements |
Usability | Impact on user experience |
Scalability | Ability to grow with organization |
Integration | Compatibility with existing systems |
CIA Triad & Security Controls Quick Reference
Confidentiality
- • Encryption
- • Access controls
- • Authentication
- • Data classification
- • Privacy protection
Integrity
- • Digital signatures
- • Checksums/hashing
- • Version control
- • Input validation
- • Audit trails
Availability
- • Redundancy
- • Load balancing
- • Backup systems
- • Disaster recovery
- • Monitoring
Control Types
- • Preventive
- • Detective
- • Corrective
- • Recovery
- • Compensating
Knowledge Check Questions
Scenario-Based Questions:
Q1: A company's database was modified by an attacker, changing employee salary records. Which principle of the CIA Triad was violated?
Answer: Integrity - the accuracy and trustworthiness of data was compromised.
Q2: What type of control is a firewall that blocks unauthorized network traffic?
Answer: Preventive control - it stops security incidents before they occur.
Q3: A DDoS attack brings down a company's web server. Which CIA principle is affected?
Answer: Availability - authorized users cannot access the system when needed.
Technical Implementation:
Q4: Which control type would SHA-256 hashing be classified as?
Answer: Detective control - it can detect if data has been modified by comparing hash values.
Q5: A company implements additional manual reviews when automated controls fail. What type of control is this?
Answer: Compensating control - provides alternative protection when primary controls cannot be implemented.
Q6: What are the three implementation types for security controls?
Answer: Administrative/Operational, Technical/Logical, and Physical/Environmental.