Over 10 years we help companies reach their financial and branding goals. Engitech is a values-driven technology agency dedicated.

Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

1.2 Domain 1 · Security & Risk Management

Security Concepts — The 5 Pillars

Understand and apply concepts of confidentiality, integrity, availability, authenticity, and nonrepudiation

Concept
2
Textbook
3
Reference
4
Real Scenario
5
Hard Choice
6
Common Traps
7
Exam Signal
The Concept

The CISSP doesn't test three pillars — it tests five. The five pillars of information security are:

Confidentiality — information accessible only to authorized parties
Integrity — data is accurate, complete, and unaltered
Availability — systems and data accessible when needed
Authenticity — verified identity of users, systems, and data origin
Nonrepudiation — inability to deny an action occurred

Most people memorize CIA. The exam tests whether you understand Authenticity ≠ Nonrepudiation. Authenticity proves identity. Nonrepudiation proves an action happened and who did it. A digital signature provides both — but they're distinct concepts.

At a Fortune 500 with a mature security program, each pillar maps to specific controls:

  • Confidentiality — AES-256 encryption at rest, TLS 1.3 in transit, role-based access control, data classification labels
  • Integrity — SHA-256 hash verification, digital signatures on code commits, change management process, database constraints
  • Availability — Active-active data centers, load balancers, automated failover, tested DR plan with 4-hour RTO
  • Authenticity — PKI certificates for all internal services, MFA for all users, DKIM/SPF on email, code signing
  • Nonrepudiation — Centralized audit logging (SIEM), tamper-evident log storage, digital signatures on financial transactions

Notice: each pillar has multiple controls implementing it. No single control covers all five. This is defense in depth applied to the security model itself.

PillarProtectsBroken ByKey Controls
Confidentiality Unauthorized disclosure Data breach, eavesdropping, shoulder surfing Encryption, access controls, classification
Integrity Unauthorized modification Tampering, malware, SQL injection, bit rot Hashing, digital signatures, change mgmt
Availability System access when needed DDoS, ransomware, hardware failure, disaster Redundancy, failover, backups, load balancing
Authenticity Verified identity of origin Spoofing, phishing, certificate forgery PKI, MFA, DKIM/SPF, code signing
Nonrepudiation Proof an action occurred Log deletion, lack of audit trail, unsigned transactions Digital signatures, SIEM, tamper-evident logs
Key Takeaway

Authenticity vs. Nonrepudiation — the exam's favorite distinction:
Authenticity = "Who are you?" (proves identity)
Nonrepudiation = "You can't deny you did it" (proves action)
A digital signature provides both. MFA provides only authenticity. An audit log provides only nonrepudiation.

You're a security analyst at a regional hospital. At 3 AM, ransomware encrypts the EHR system.

Scenario
The Ransomware Attack
Regional hospital · 1,200 staff · EHR system encrypted
Night Shift Lead"We can't access patient records. The ER is diverting ambulances. Pharmacy can't verify drug interactions."
Attacker Note"Pay 50 BTC within 48 hours. We have exfiltrated 200GB of patient data. Pay or we publish."
YouYou need to assess: which of the 5 pillars are compromised?

All five pillars are hit:

  • Availability — EHR is encrypted, staff can't access records (most immediately life-threatening)
  • Confidentiality — 200GB of patient data exfiltrated before encryption
  • Integrity — can you trust data after decryption? Attacker may have modified records
  • Authenticity — how did the attacker get in? Compromised credentials mean identity verification failed
  • Nonrepudiation — if logs are encrypted too, you can't prove what happened when
Compensating Control

Triage by pillar priority: Availability first (lives at risk). Then integrity (can you trust restored data?). Then confidentiality (breach notification clock starts). The 5 pillars aren't just theory — they're your incident response framework.

Real Talk — Career Context

In practice, hospitals run on paper during outages. Downtime procedures exist for this. The security team focuses on containment and forensics while clinical staff switch to manual processes. The CISO's first call isn't to IT — it's to the incident commander.

On the exam: Availability is the pillar most directly tied to human safety. When lives are at stake, availability trumps confidentiality.

After the ransomware attack, backups are restored. The CFO demands: "Go live now — we're losing $200K/hour." But your integrity checks show 3 database tables have mismatched checksums. The data may have been modified before encryption.

Option A
Restore and go live immediately

Availability is critical — patients are at risk. Fix integrity issues later once systems are running.

Option B
Delay restoration until integrity is verified

Corrupted medical records could lead to wrong dosages. Integrity must be confirmed before availability.

Option B is correct — integrity before availability when safety is at stake

Option B: In healthcare, corrupted data is more dangerous than no data. A wrong drug interaction record could kill a patient. Clinicians can use paper-based downtime procedures while integrity is verified — they can't detect silently modified records.

Option A's kernel of truth: Availability matters enormously in healthcare. But "go live with unverified data" isn't restoring availability — it's creating a new, invisible threat. The exam tests whether you understand this distinction.

On the exam: when integrity and availability conflict, ask "what's the consequence of wrong data vs. no data?" In healthcare and finance, integrity usually wins.

Treating CIA as the complete model
The exam tests five pillars, not three. Answers that only reference Confidentiality, Integrity, and Availability are incomplete. If a question asks about "all security objectives" and the answer only lists CIA — it's wrong. Authenticity and Nonrepudiation are on the official exam outline.
Why it's tempting: Every intro security course teaches CIA. The CISSP goes beyond intro.
Confusing Authenticity with Nonrepudiation
"A digital signature provides authenticity" — true but incomplete. It also provides nonrepudiation and integrity. The exam will give you a scenario and ask which specific property is being addressed. "Verifying the sender's identity" = authenticity. "Proving the sender cannot deny sending" = nonrepudiation. Same mechanism, different properties.
Why it's tempting: Both involve identity. But authenticity asks "who?" and nonrepudiation asks "can they deny it?"
Always prioritizing Confidentiality
Security professionals often default to "protect the data" — but context determines priority. In a hospital, availability (patient access to records) may outweigh confidentiality. In finance, integrity (accurate transactions) may outweigh availability. The exam tests whether you can assess which pillar matters most in the given scenario, not which one matters most in general.
Why it's tempting: Confidentiality gets the most press (data breaches make headlines). But it's not always #1.
Exam Signal

When you see "proves identity" vs. "proves action": Authenticity = proving who someone is (certificates, MFA). Nonrepudiation = proving someone did something and they can't deny it (digital signatures, audit logs). A digital signature provides both, but the exam tests whether you know the distinction. If the question asks "which prevents denial of sending a message?" — that's nonrepudiation, not authenticity.

Quick Check — End of 1.2
A developer digitally signs a code release. Which security properties does this PRIMARILY provide?
  • A Confidentiality and availability
  • B Integrity, authenticity, and nonrepudiation
  • C Confidentiality and integrity
  • D Availability and authenticity

Correct: B. A digital signature proves the code wasn't tampered with (integrity), verifies who signed it (authenticity), and the signer can't deny signing it (nonrepudiation). It does NOT encrypt the code (no confidentiality) and has nothing to do with uptime (no availability).

Disclaimer: This content is provided for educational and exam preparation purposes only. It is not official ISC2 content, is not endorsed by ISC2, and does not guarantee exam success. All practice questions are original and based on published exam objectives. Always refer to the official ISC2 CISSP Exam Outline as your primary reference.