First suggested by the National Institute of Standards and Technology (NIST) in 1977, the CIA triad is intended to guide organizations in choosing technologies, policies and practices to protect their information systems. The elements of the CIA triad include:
- Confidentiality
- Integrity
- Availability
Confidentiality means ensuring that parties cannot access data they're not authorized to access.
Confidentiality defines a continuum of users, from privileged insiders with access to much of the company's data to outsiders authorized to view only information the public is permitted to view.
Personal information should remain private. Sensitive data is sensitive. If an unauthorized person obtains a password to protected data, it would be a confidentiality breach.
Integrity means ensuring that all information contained within company databases is complete and accurate.
Integrity efforts aim to stop people from tampering with data, such as by unauthorized additions, alterations or deletions. Data integrity applies to preventing both adversaries who intentionally alter data and well-intentioned users who alter data in unauthorized ways.
Availability means ensuring that users can access the information they're authorized to access when they need it.
Availability dictates that information security measures and policies should not interfere with authorized data access. Much of availability is straightforward, such as working to ensure the robustness of hardware and software to prevent an organization’s sites going down.