Understanding of Security Principles
Confidentiality, Integrity, and Availability (CIA Triad):
Emphasize how you maintain the confidentiality of sensitive data, ensure its integrity, and guarantee system availability.
Least Privilege:
Describe how you implement role-based access controls and reduce attack surfaces by restricting user permissions to only those necessary.
Defense-in-Depth:
Illustrate how you layer multiple security controls (firewalls, IDS/IPS, endpoint security) to create comprehensive defense mechanisms.
Zero Trust:
Discuss how you adopt a “never trust, always verify” model by using strict identity verification and continuous monitoring.