The application must uphold confidentiality, integrity, and availability by using encryption, authentication, hashing, checksums, and trusted standards like REST and W3C. These measures protect data from unauthorised access, ensure accuracy, and maintain reliable access for users.