What it is
A model that defines three core security objectives: confidentiality, integrity, and availability. Most security controls exist to improve one or more of these objectives.
Key points
- Confidentiality: prevent unauthorized access or disclosure of information.
- Integrity: prevent unauthorized modification and support authenticity and non repudiation.
- Availability: ensure timely and reliable access to systems and information.
- Real security work is balancing these goals based on mission and risk.
Concrete example
A hospital patient portal prioritizes confidentiality to protect patient data, integrity to ensure records are accurate, and availability because outages can disrupt care. Controls must be chosen and tested to support all three objectives, not only encryption.