CIA Triad (also called the AIC Triad)

The classic model for information security: ConfidentialityIntegrityAvailability

Overview

The CIA Triad is a concise way to remember the fundamentals of IT security. You may also see it called the AIC Triad (to avoid confusion with the U.S. federal agency, the Central Intelligence Agency). In security, CIA refers only to the three core objectives below and has nothing to do with the government agency.

You’ll often see the triad depicted as a triangle: each side represents one objective—Confidentiality, Integrity, and Availability.

Model

Security Objectives

Design Trade-offs

Integrity Availability Confidentiality Security Goals
Each leg supports overall security; strengthening one can affect the others.

Confidentiality (the “C”)

Confidentiality ensures that only authorized people can view sensitive information. We protect data from unauthorized disclosure so private information stays private.

Common Methods

Goal: Make data available only to the right people.

Integrity (the “I”)

Integrity guarantees that data is accurate and unaltered from the time it is sent to the time it is received. We want recipients to receive exactly what the sender originated.

Common Methods

Goal: Detect (and ideally prevent) unauthorized changes and confirm the true sender.

Availability (the “A”)

Availability ensures that systems and data are accessible when needed. Security controls must not prevent legitimate use.

Common Methods

Goal: Keep legitimate users online and productive, even under failure or attack.

Putting It Together

The CIA (AIC) Triad provides a simple, memorable framework for designing and evaluating security controls. Real-world systems must balance all three objectives—Confidentiality, Integrity, and Availability—to meet business and user needs without creating unnecessary risk.

Encryption Access Control MFA Hashing Digital Signatures Certificates Nonrepudiation Redundancy Patching