The use of TLS (Transport Layer Security) is intended to encrypt data in transit, thereby preventing unauthorized interception and disclosure.
This is primarily a concern with Confidentiality (D), ensuring information is only accessible to authorized parties.
Identity (A) and Authorization (C) involve user verification and access control but are not the main purpose of TLS.
Availability (B) concerns system uptime.
Integrity (D) ensures data is not altered but encryption mainly addresses confidentiality.
GICSP aligns TLS usage with protecting data confidentiality in ICS communications.
[Reference:, , GICSP Official Study Guide, Domain: ICS Security Principles, , NIST SP 800-52 Rev 2 (Guidelines for TLS Use), , GICSP Training on Encryption and Data Protection, ]
Submit