Chapter 1: Security Foundations and the CIA Triad

Learning Objectives

Section 1: The CIA Triad in Practice

The CIA triad is the foundational framework that organizes every enterprise security control, policy, and investment decision. The three pillars — Confidentiality, Integrity, and Availability — map directly to concrete technical mechanisms that network engineers and security practitioners implement every day.

Think of the CIA triad like the structural legs of a stool. Remove any one leg and the stool topples. Regulatory frameworks including HIPAA, ISO 27001, and the NIST Cybersecurity Framework map their requirements directly onto CIA triad controls.

Pre-Reading Check — CIA Triad

1. A hospital's EHR system uses TLS 1.3 for all connections and restricts nursing staff to read-only chart access. Which CIA pillar do these controls primarily enforce?

2. An attacker flips a single bit in a firmware image before it is distributed. Which mechanism would reliably detect this before installation?

3. A financial services firm deploys anycast routing across five cloud regions and absorbs a Tbps-scale DDoS with zero user-visible downtime. Which availability mechanism is most directly responsible?

4. Under a Zero Trust policy, what determines whether a user inside the corporate LAN is granted access to a sensitive resource?

5. Ransomware encrypts all organizational files and demands payment for the decryption key. Which CIA pillar does this attack primarily violate?

Figure 1.1 — CIA Triad: Pillars, Threats & Controls
CIA Triad Security Foundation Confidentiality Authorized access only Threat: Data Breach Integrity Data unaltered/untampered Threat: Tampered Data Availability Accessible when needed Threat: DDoS/Ransomware Controls • TLS 1.3 Encryption • RBAC / MFA • Zero Trust / DLP Controls • SHA-256 Hashing • Digital Signatures • Version Control (Git) Controls • Redundancy / Failover • DDoS Scrubbing • Backup / RTO/RPO

Confidentiality Controls

Confidentiality guarantees data is accessible only to authorized parties. A breach exposes data — it does not destroy it. Examples: leaked credentials, stolen intellectual property, exposed patient records.

Encryption: TLS establishes a shared session key via asymmetric cryptography, then encrypts bulk data with a symmetric cipher. A packet capture reveals only ciphertext.

Access control: RBAC assigns permissions to roles rather than individuals. MFA adds a second verification factor so a stolen password alone cannot grant access. Zero Trust removes implicit trust from network position — every request is verified per identity, device posture, and resource sensitivity.

Data classification determines which controls apply to each dataset:

ClassificationDescriptionExample Controls
PublicNo sensitivity; freely shareableNo restrictions
InternalRoutine business dataRBAC, standard authentication
ConfidentialSensitive business or customer dataMFA, encryption at rest and in transit
RestrictedRegulated or highest-sensitivity dataMFA, encryption, DLP, audit logging

Key Points — Confidentiality

flowchart TD DC["Data Classification\n(Public / Internal / Confidential / Restricted)"] DC --> AC["Access Control Layer"] AC --> RBAC["Role-Based Access Control\n(RBAC)"] AC --> MFA["Multi-Factor Authentication\n(MFA)"] AC --> ZT["Zero Trust Policy\n(verify every request)"] DC --> ENC["Encryption Layer"] ENC --> TLS["TLS 1.3\n(data in transit)"] ENC --> REST["AES-256\n(data at rest)"] DC --> DLP["Data Loss Prevention\n(DLP monitoring)"] style DC fill:#1a2a4a,stroke:#58a6ff,color:#e6edf3 style AC fill:#1a2a4a,stroke:#58a6ff,color:#e6edf3 style ENC fill:#1a2a4a,stroke:#58a6ff,color:#e6edf3 style DLP fill:#1a2a4a,stroke:#58a6ff,color:#e6edf3

Integrity Mechanisms

Integrity assures data has not been altered, corrupted, or tampered with — in transit or at rest. A breach corrupts data, often invisibly: a modified config file, tampered firmware, or altered financial record.

Cryptographic hashing (SHA-256): deterministic, collision-resistant. Any single-bit change produces a completely different digest. SHA-256 and SHA-3 are appropriate for security; CRC-32 detects transmission errors only and can be forged.

Digital signatures combine hashing with asymmetric crypto for integrity and non-repudiation: the sender encrypts a SHA-256 hash with their private key; the recipient decrypts with the sender's public key and recomputes the hash — matching hashes confirm authenticity and integrity.

Version control: Every Git commit is identified by a hash of its contents and parent commits. Any historical tampering invalidates all subsequent commit hashes.

sequenceDiagram participant S as Sender participant R as Recipient S->>S: 1. Compute SHA-256 hash of message S->>S: 2. Encrypt hash with Sender's Private Key → Signature S->>R: 3. Transmit: Message + Signature R->>R: 4. Decrypt Signature with Sender's Public Key → Hash_A R->>R: 5. Independently compute SHA-256 of received message → Hash_B alt Hash_A == Hash_B R->>R: ✓ Message is intact; sender identity verified else Hash_A ≠ Hash_B R->>R: ✗ Integrity or authenticity failure — reject message end

Key Points — Integrity

Availability Strategies

Availability guarantees authorized users can access systems and data when needed. 75% of organizations reported ransomware exposure in 2024 — ransomware is explicitly an availability attack.

Redundancy eliminates single points of failure: redundant power, dual uplinks, RAID arrays, geographically distributed data centers.

Failover: Active-passive keeps a standby warm but idle; active-active distributes load across live nodes. RTO (maximum tolerable downtime) and RPO (maximum tolerable data loss) drive these architectural choices.

Attack TypeMechanismMitigation
Volumetric (UDP flood)Overwhelm bandwidthUpstream scrubbing centers, anycast routing
Protocol (SYN flood)Exhaust connection state tablesSYN cookies, rate limiting
Application layer (HTTP flood)Exhaust application resourcesWAF rate limiting, CAPTCHA, behavioral analysis

Key Points — Availability

Post-Reading Check — CIA Triad

1. A hospital's EHR system uses TLS 1.3 for all connections and restricts nursing staff to read-only chart access. Which CIA pillar do these controls primarily enforce?

2. An attacker flips a single bit in a firmware image before it is distributed. Which mechanism would reliably detect this before installation?

3. A financial services firm deploys anycast routing across five cloud regions and absorbs a Tbps-scale DDoS with zero user-visible downtime. Which availability mechanism is most directly responsible?

4. Under a Zero Trust policy, what determines whether a user inside the corporate LAN is granted access to a sensitive resource?

5. Ransomware encrypts all organizational files and demands payment for the decryption key. Which CIA pillar does this attack primarily violate?

Section 2: Security Deployment Architectures

Enterprise security is a stack of complementary controls operating at different infrastructure layers. Understanding where each control type lives and what it can and cannot see is essential for designing a defense-in-depth architecture.

Pre-Reading Check — Deployment Architectures

6. A device with outdated antimalware signatures attempts to join the production network. Which control places it in a remediation VLAN instead?

7. A fileless malware attack executes entirely in memory and never writes a binary to disk. Which endpoint control is best positioned to detect it?

8. An organization runs hundreds of ephemeral cloud workloads that spin up and down within minutes. What is the primary advantage of agentless security for these workloads?

9. RASP (Runtime Application Self-Protection) is most effective in which scenario?

10. The majority of cloud security breaches are caused by what?

Figure 1.4 — Defense-in-Depth Security Stack
Network Layer NGFW — L7 inspection, TLS decrypt IPS — inline signature + anomaly NAC — posture-based admission Endpoint Layer EDR — telemetry & response Modern AV — behavioral + ML Host Firewall — per-process rules Application Layer (L7) WAF — SQL injection, XSS, etc. API Gateway — auth, rate limit RASP — runtime self-protection feeds feeds Cloud & Container Layer CSPM Misconfiguration scanning Policy-as-code enforcement Container Security Image scanning (CVEs) K8s RBAC, admission control Each layer sees threats the layers below it cannot — defense-in-depth requires all four Agent-based (EDR): deep OS visibility, process trees, fileless malware detection — requires installation, uses device resources Agentless (CSPM, cloud scanning): auto-scales, no installation — suited for ephemeral/IoT/legacy; limited direct response Mature organizations deploy a hybrid model: agent-based on high-risk endpoints, agentless on cloud/IoT/legacy

Network Security: IDS/IPS, Firewalls, and NAC

Firewalls: Stateful firewalls track TCP connection state, enforce rules on IP/port/protocol. NGFWs add Layer 7 application inspection, user identity integration, and TLS decryption for encrypted traffic inspection.

IDS vs IPS: IDS passively alerts; IPS is inline and can drop, reset, or redirect malicious traffic. IPS uses signature-based detection (known attacks) and anomaly-based detection (statistical deviations). Inline placement introduces latency — factor into network design.

NAC enforces posture requirements (current AV signatures, OS patches, compliant firewall settings) before permitting network access. Non-compliant devices are quarantined to a remediation VLAN.

Endpoint Security: EDR, Host Firewalls, and Antimalware

Legacy antimalware uses signature-based detection: known-malicious file hashes or byte sequences. Effective against known malware; fails against novel threats, obfuscated variants, and fileless malware.

Modern antimalware incorporates behavioral detection, ML classifiers, and cloud reputation lookups — asking "does this process behave like malware?" rather than "does this file match a known-bad signature?"

EDR records process trees, network connections, file events, and registry changes, streaming telemetry to a central platform. Analysts can reconstruct attack timelines, identify lateral movement, and remotely isolate endpoints without physical access.

Host-based firewalls (Windows Defender Firewall, iptables/nftables) enforce per-process network policies — providing a final defense layer even when the network perimeter is compromised.

Application Security: WAF, API Gateways, and RASP

WAF inspects HTTP request/response content for attack patterns: SQL injection, XSS, path traversal, protocol violations. Operates in signature mode (known patterns) or behavioral mode (deviation from normal traffic profile).

API gateways centralize authentication, rate limiting, input validation, and logging for API traffic — enforcing these as a single auditable policy layer rather than in each microservice individually.

RASP embeds security monitoring in the application runtime — intercepting database queries, shell executions, and file operations from inside the process. Particularly effective against zero-day vulnerabilities where no WAF signature exists.

Key Points — Deployment Architectures

Post-Reading Check — Deployment Architectures

6. A device with outdated antimalware signatures attempts to join the production network. Which control places it in a remediation VLAN instead?

7. A fileless malware attack executes entirely in memory and never writes a binary to disk. Which endpoint control is best positioned to detect it?

8. An organization runs hundreds of ephemeral cloud workloads that spin up and down within minutes. What is the primary advantage of agentless security for these workloads?

9. RASP (Runtime Application Self-Protection) is most effective in which scenario?

10. The majority of cloud security breaches are caused by what?

Section 3: SIEM, SOAR, and Log Management

Security controls generate enormous volumes of telemetry. Without a centralized system to collect, correlate, and act on this data, defenders are overwhelmed by volume and miss signals buried in the noise. The SOC toolchain — SIEM, SOAR, and log management — transforms raw telemetry into actionable intelligence and automated response.

Pre-Reading Check — SIEM, SOAR, and Log Management

11. A SIEM detects 500 failed logins against the same account in 60 seconds. Which SIEM capability produced this alert?

12. Compared to a static threshold rule, what is the key advantage of sliding window anomaly detection?

13. A SOAR playbook automatically quarantines phishing emails, submits attachments to a sandbox, and identifies all affected users — all within seconds of the SIEM alert. What is the primary SOC benefit this demonstrates?

Figure 1.5 — SIEM-to-SOAR Incident Response Pipeline
Log Sources Firewall / EDR IAM / Cloud Apps / IDS ① Intake SIEM Normalize events Apply correlation rules Sliding window detect HIGH severity alert fires ② Correlate SOAR Playbook triggered Threat intel lookup Asset / user context Risk level decision ③ Enrich & Triage Low Risk Auto-close with note Medium Risk Escalate to analyst queue High Risk Isolate endpoint Block IP / disable acct Create ticket + report Case Closure + Rules Tuning Intake Correlate Enrich & Triage Branch Response Closure

SIEM Architecture and Correlation Rules

A SIEM ingests log and event data from heterogeneous sources, normalizes it into a common schema (source IP, destination IP, port, action, timestamp), and applies correlation rules that identify attack patterns across all data sources uniformly.

Example correlation rule:

IF authentication_failure.count > 500
   AND authentication_failure.target_account = SAME
   AND authentication_failure.time_window < 60s
THEN generate_alert(severity=HIGH, type="Brute Force Attack")

Rules can also correlate across sources: a port scan from the IDS followed within 5 minutes by a new outbound connection from that server is a potential compromise sequence neither event alone would flag.

Sliding window anomaly detection computes a statistical baseline over a rolling time window and alerts when the current value deviates significantly. A global retailer's holiday traffic would trigger constant false positives with static thresholds — sliding window adapts to normal variation and catches low-and-slow attacks that stay below fixed limits.

SOAR Playbooks and Automated Response

SOAR receives alerts from the SIEM and executes automated response playbooks. SIEM provides detection and visibility; SOAR provides speed and consistency. The five-stage pipeline:

StageActorAction
1. IntakeSIEMForwards normalized alert to SOAR
2. Triage/EnrichmentSOARAdds context: threat intel lookups, asset ownership, user history
3. DecisionSOAR logicBranching: auto-close low risk, escalate medium, automate high risk
4. ResponseSOAR playbookIsolate endpoint, block IP, disable account, create ticket
5. ClosureSOAR + analystGenerate report, tune rules, close case

SOAR governance is critical: playbooks without change control, testing, and rollback procedures create fragile automation that can amplify incidents. Best practice requires version control for playbooks, staging environments, peer review, and defined rollback procedures.

DimensionSIEMSOAR
Primary functionDetection and visibilityOrchestration and response
Core strengthLog correlation, alertingPlaybook execution, speed
SOC roleFoundation layerAutomation layer built on SIEM
Maturity requirementEntry-level SOCRequires mature SIEM first

Centralized Log Management and Retention

Log management is the infrastructure layer that makes SIEM and SOAR possible. Key decisions:

Key Points — SIEM, SOAR, and Log Management

Post-Reading Check — SIEM, SOAR, and Log Management

11. A SIEM detects 500 failed logins against the same account in 60 seconds. Which SIEM capability produced this alert?

12. Compared to a static threshold rule, what is the key advantage of sliding window anomaly detection?

13. A SOAR playbook automatically quarantines phishing emails, submits attachments to a sandbox, and identifies all affected users — all within seconds of the SIEM alert. What is the primary SOC benefit this demonstrates?

Section 4: Core Security Terminology

Advanced security practice requires fluency with terminology that defines how organizations understand, hunt for, and respond to threats. These terms appear throughout this course and in professional certifications.

Pre-Reading Check — Core Security Terminology

14. A threat hunter forms the hypothesis: "APT groups targeting financial services commonly establish persistence via scheduled tasks" and queries EDR telemetry to test it. What distinguishes this activity from alert-driven incident response?

15. In the STRIDE threat model, "Tampering" maps to which CIA triad violation?

Threat Intelligence, Hunting, and Modeling

Threat intelligence (TI) is processed, contextualized information about adversary capabilities, infrastructure, motivations, and tactics. Raw indicators (IP addresses, domains, file hashes) are Indicators of Compromise (IoCs). Tactical TI describes MITRE ATT&CK TTPs; strategic TI describes the threat landscape for an industry or region. Operationalizing TI means ingesting IoC feeds into SIEM and EDR so detections fire when known-bad indicators appear.

Threat hunting is the proactive, hypothesis-driven search for adversary activity not detected by automated controls. A hunter forms a hypothesis, then actively queries endpoint telemetry, logs, and network captures to test it. Requires rich telemetry (EDR, full packet capture, DNS logs) and familiarity with MITRE ATT&CK.

Threat modeling identifies potential threats during system design. The STRIDE model maps to CIA violations:

Malware Analysis and Reverse Engineering

Static analysis examines the binary without executing it: strings, imported functions, file headers, hash comparison. Fast but misses packed/encrypted code and environment-dependent behavior.

Dynamic analysis executes malware in a controlled sandbox and observes behavior: network connections, files created, registry modifications, processes spawned. Captures behavior static analysis misses.

Reverse engineering uses disassemblers (IDA Pro, Ghidra) and debuggers to reconstruct compiled binary logic — necessary for custom C2 protocols, encryption implementations, and sandbox evasion techniques.

CriteriaAgent-BasedAgentless
DeploymentInstalled on each endpointNo installation; uses APIs/network scanning
VisibilityDeep: OS-level, process, fileless malwareBroader: configuration, network posture
ResponseImmediate: block, isolate, enforceNear-real-time; limited direct control
Performance impactConsumes device resourcesMinimal to none
ScalabilityHarder for dynamic/IoT/legacyAuto-scales; suited for cloud/ephemeral
Ideal use caseHigh-risk endpoints, fileless threat detectionCloud workloads, IoT, legacy systems

Run Book Automation and DevSecOps

Run book automation (RBA) codifies operational procedures into structured, machine-executable workflows. SOAR playbooks are the security implementation of RBA. Value: consistency (same procedure every time, regardless of which analyst is on shift) and speed (seconds vs. minutes/hours).

DevSecOps integrates security into every stage of the software development lifecycle:

Key Points — Core Security Terminology

Post-Reading Check — Core Security Terminology

14. A threat hunter forms the hypothesis: "APT groups targeting financial services commonly establish persistence via scheduled tasks" and queries EDR telemetry to test it. What distinguishes this activity from alert-driven incident response?

15. In the STRIDE threat model, "Tampering" maps to which CIA triad violation?

Your Progress

Answer Explanations