DEV Community

Cover image for Foundations of Cloud Security: CIA Triad, Zero Trust, and Modern Security Practices
Ibrahim S
Ibrahim S

Posted on

Foundations of Cloud Security: CIA Triad, Zero Trust, and Modern Security Practices

The CIA Triad is three non-negotiable pillars every secure system, process, or data strategy must prioritize.

Confidentiality – Keeping information safe from unauthorized access

Examples: Passwords, Encryption, Authentication (OTP, biometrics), Access control, HTTPS
Goal: Prevent unauthorized access.

Integrity – Making sure the data stays correct and unchanged

Examples: Hashing, Checksums, Digital signatures, File permissions, Version control
Goal: Prevent unauthorized modification of data.

Availability – Ensuring systems and data are accessible whenever needed

Examples: Backups, Redundancy, Load balancers, DDoS protection, Server uptime
Goal: Ensure data and services remain online.

Zero Trust Security operates on the principle of "never trust, always verify. It continuously authenticates and verifies all users, devices, and systems, assuming threats exist both inside and outside the network.

Zero Trust = “Never trust, always verify”

Authentication & Identity Verification – Strict checks before accessing the network.

Access Policy Enforcement – Assessing who, what, and where access is requested.

Continuous Monitoring – Real-time validation and threat detection.

Zero Trust ensures only authorized access, safeguarding your data and systems. Whether on campus or remote, stay protected.

Access + Control + Audit + Least Privilege = Zero Trust

The opposites of the CIA Triad is DAD (Disclosure, Alteration and Destruction).

Disclosure – Someone not authorized gets access to your information.

Alteration – Your data has been changed.

Destruction – Your Data or Systems has been Destroyed or rendered inaccessible.

Shared Responsibility Model: Security in the cloud is a shared task.

The Cloud Provider secures the infrastructure.

The Customer secures data, identity, configurations, and applications. Clear boundaries avoid mis configurations and reduce risk.

Identity Centric Security means securing cloud access using identity, not network boundaries ensuring only trusted users, devices, and apps can access your data.

Entra ID / IAM, Conditional Access, MFA, PIM,Passwordless, SSO...

Access + Control + Audit + Least Privilege + Continuous Monitoring = IAM Excellence

Least Privilege Access ensures every user, app, or service gets only the minimal permissions needed to perform their tasks reducing risk and improving security.

JIT, JEA, Role-based access control (RBAC)...

Continuous Monitoring & Logging means continuously watching and recording all cloud activities to detect threats, ensure compliance, and protect your environment in real time.

Cloud governance refers to the policies, rules, and controls that organizations establish to manage their services, resources, and operations within cloud environments.

Cloud Governance = Control & rules for secure, cost-efficient cloud usage

Cloud compliance with cloud security involves applying industry- and regulatory-based security policies. It guarantees data security from hazards and ensures that cloud settings are safe.

Cloud Compliance = Following laws, standards, and best practices to stay audit-ready and secure

Security Automation automatically detects, protects, and responds to security threats and misconfigurations — reducing risk and improving cloud security without manual effort.

Threat alerts, Anomalies, Misconfigurations , Policy violations

Security is not a product, but a process

Top comments (0)