CIA Triad

Confidentiality

Access Control

Encryption

Data Masking

Least Privilege

Integrity

Hashing

Checksums