⌂ Home

CIA Triad, OWASP Top 10 & CIS Controls

Map classic goals to modern attack data and control baselines.

CIA Triad

Confidentiality Integrity Availability Balance

Confidentiality — only authorized parties read data. Example: encrypt S3 objects; restrict KMS keys.

Integrity — data and code are not tampered with. Example: signed commits; RDS backups with immutability.

Availability — systems work when needed. Example: multi-AZ; DDoS protection; runbooked failover.

Real systems trade off cost and usability; threat modeling clarifies which leg matters most per asset.

OWASP Top 10 (2021) — expandable

Click a row for a one-line mitigation focus.

CIS Controls — by Implementation Group

IG1 — Essential cyber hygiene (~ safeguard subset)
  • Inventory of authorized/unauthorized devices & software
  • Secure configurations; continuous vulnerability management
  • Controlled admin access; email/web protections; malware defenses
IG2 — Medium sophistication environments
  • Data recovery; network infrastructure controls; network monitoring
  • Application software security; incident response planning
IG3 — High-sensitivity / advanced threats
  • Penetration testing; application penetration testing; red-team exercises
  • Implement segmentation and advanced monitoring analytics