CIA and Non-Repudiation

Key Takeaways

  • Confidentiality protects against unauthorized disclosure.
  • Integrity protects against unauthorized or unexpected modification.
  • Availability keeps systems, services, and data usable when needed.
  • Non-repudiation depends on identity, integrity, logging, time, and evidence preservation.
  • Security+ scenarios often ask which part of CIA is primarily affected, even when several are involved.
Last updated: April 2026

CIA as a Decision Tool

The CIA triad is not just vocabulary. It is a fast way to classify what went wrong, what risk is highest, and what control is most relevant.

PrincipleProtects againstCommon controlsScenario clue
ConfidentialityUnauthorized disclosureEncryption, access control, data masking, classification"Exposed", "read by unauthorized user", "leaked"
IntegrityUnauthorized or unexpected changeHashing, digital signatures, file integrity monitoring, input validation"Modified", "tampered", "unexpected hash", "altered records"
AvailabilityLoss of access or serviceRedundancy, failover, backups, capacity planning, DDoS protection"Unavailable", "outage", "latency", "ransomware lockout"
Non-repudiationCredible denial of an actionDigital signatures, audit logs, time stamps, strong identity proof"Cannot deny", "prove who approved", "signed transaction"

Scenario Classification

ScenarioPrimary principleWhy
A contractor downloads customer records from a folder they should not accessConfidentialityData was disclosed to an unauthorized user
A payment file hash does not match the known-good valueIntegrityThe evidence suggests unauthorized or accidental modification
A DDoS attack prevents customers from reaching a portalAvailabilityThe service cannot be used when needed
A manager disputes approving a high-risk firewall exceptionNon-repudiationThe business needs reliable proof of who approved the action

Non-Repudiation Requires More Than a Log

An audit log can support non-repudiation, but only if the identity and log integrity are trustworthy. A shared admin account with editable local logs is weak evidence. A named account with MFA, centralized append-only logging, time synchronization, and change ticket approval is stronger evidence.

Weak evidenceStronger evidence
Shared administrator accountNamed privileged account
Local log file on the same serverCentralized tamper-resistant logging
No time synchronizationNTP-backed time stamps
Verbal approvalSigned or ticketed approval with approver identity
Plain message contentDigital signature tied to a private key

Exam Trap: More Than One CIA Impact

Ransomware can affect confidentiality if data is stolen, integrity if files are modified, and availability if files are encrypted and unusable. Read the question stem. If it says "users cannot access files," availability is probably primary. If it says "sensitive files appeared on a public site," confidentiality is primary.

Fast Rule

Ask this in order:

QuestionIf yes, think
Did someone see data they should not see?Confidentiality
Did data or code change without authorization?Integrity
Can users or systems use the service when needed?Availability
Does the organization need proof that a party performed an action?Non-repudiation
Test Your Knowledge

A database table is changed so account balances are incorrect, but no data was exposed and the application remains online. Which security principle is primarily affected?

A
B
C
D
Test Your Knowledge

Which set of controls best supports non-repudiation for an executive approval workflow?

A
B
C
D
Test Your KnowledgeMatching

Match each scenario to the primary security principle.

Match each item on the left with the correct item on the right

1
Unauthorized user reads payroll records
2
File hash changes unexpectedly
3
Customer portal is down during business hours
4
Signer cannot credibly deny sending an approved contract