CISSP Domain 3: Security Architecture and Engineering — Complete Study Summary

Summary

CISSP Domain 3: Security Architecture and Engineering represents 13% of exam questions, teaching candidates to design secure systems through architectural principles rather than tactical implementation. Core topics include secure design principles with least privilege, defense in depth, fail securely, zero trust, Privacy by Design, formal security models like Bell-LaPadula for confidentiality, Biba and Clark-Wilson for integrity, and Brewer-Nash for conflict of interest. Domain emphasizes system security capabilities including TCB and Reference Monitor, vulnerability assessment across web applications and mobile iOS environments, cryptographic solutions with symmetric and asymmetric encryption, cryptanalytic attacks including man-in-the-middle and replay attacks, and physical security using CPTED principles. Candidates learn selecting security controls based on frameworks like COBIT, NIST SP 800-53, PCI-DSS, and ISO 27001. Mastering Domain 3 requires thinking like security architect balancing robust security with business functionality through structured application of principles, models, and controls for resilient, defensible systems.

What is covered in CISSP Domain 3: Security Architecture and Engineering?

CISSP Domain 3: Security Architecture and Engineering represents 13% of exam questions, teaching candidates to design secure systems through architectural principles rather than tactical implementation. Core topics include secure design principles with least privilege, defense in depth, fail securely, zero trust, Privacy by Design, formal security models like Bell-LaPadula for confidentiality, Biba and Clark-Wilson for integrity, and Brewer-Nash for conflict of interest. Domain emphasizes system security capabilities including TCB and Reference Monitor, vulnerability assessment across web applications and mobile iOS environments, cryptographic solutions with symmetric and asymmetric encryption, cryptanalytic attacks including man-in-the-middle and replay attacks, and physical security using CPTED principles. Candidates learn selecting security controls based on frameworks like COBIT, NIST SP 800-53, PCI-DSS, and ISO 27001. Mastering Domain 3 requires thinking like security architect balancing robust security with business functionality through structured application of principles, models, and controls for resilient, defensible systems.

Overview

Master CISSP Domain 3 covering security architecture, cryptography, secure design principles, and physical security. Accounts for 13% of exam with frameworks like Zero Trust, Bell-LaPadula, and CPTED.

CISSP Domain 3: Security Architecture and Engineering — Complete Study Summary

CISSP Domain 3: Security Architecture and Engineering — Complete Study Summary

By Manoj Sharma, CISSP #557313 | Cybernous — India's #1 CISSP Coaching | 98.4% First-Attempt Pass Rate

What is Covered in CISSP Domain 3: Security Architecture and Engineering?

CISSP Domain 3: Security Architecture and Engineering is the largest domain on the CISSP exam, accounting for 13% of all exam questions.

It trains you to think like a security architect — someone who designs systems that are secure from the ground up, not patched after the fact. This domain spans an unusually wide range of topics: from abstract security models and cryptographic theory, to hands-on vulnerability assessment, physical facility design, and the system development lifecycle.

The thread connecting all of it is a single mindset: security must be engineered in, not bolted on.

At Cybernous, Manoj Sharma's "Think Like a Manager" methodology is especially powerful here. Domain 3 is not about memorizing algorithm names or protocol numbers — it is about understanding why a design choice enforces confidentiality, integrity, or availability, and being able to justify that choice in a scenario. That is exactly what the CAT exam rewards.

3.1 Research, Implement, and Manage Engineering Processes Using Secure Design Principles

Security Architecture, in the context of the CISSP exam, refers to the design and organization of components, processes, and controls that work together to reduce security risks to an acceptable level. Engineering is the practical discipline of walking through structured phases to assemble those components so they function in harmony.

Every secure architecture begins with a set of foundational design principles. These are not theoretical ideals — they are actionable rules that guide every design decision a security professional makes.

Core Secure Design Principles

Principle

Exam-Focused Explanation

Least Privilege

Grant users and systems only the minimum permissions required to perform their functions. Nothing more.

Defense in Depth / Layering

"Use multiple, overlapping security controls so that the failure of one does not compromise the entire system."

Fail Securely / Fail Closed

"When a system fails, it must default to a denied, secure state — never to an open, permissive one."

Zero Trust

"Never implicitly trust any entity, regardless of network location. Every access request must be authenticated and continuously authorized."

Trust but Verify

Permits limited access based on established trust while requiring verification for sensitive actions and continuous monitoring.

Privacy by Design (PbD)

Proactively embed privacy into system design from the very beginning — not as an afterthought.

Secure Defaults

"Systems must ship and deploy in their most secure configuration. Reducing security should require explicit, deliberate action."

Separation of Duties (SoD)

"Divide critical tasks among multiple individuals or roles to prevent fraud, abuse, and single points of control."

Domain Separation

Logically group components that share similar security attributes and isolate them from components with different security requirements.

Encapsulation

"Access objects only through controlled, defined interfaces — enforcing privilege separation and preventing direct manipulation."

Redundancy

Eliminate single points of failure by deploying backup components, systems, or pathways.

Attack Surface Minimization

Reduce potential entry points by disabling all unnecessary services, ports, protocols, and software.

Threat Modeling

Identify threats and vulnerabilities early in the design phase so controls can be built in — not retrofitted later.

Zero Trust — The Modern Security Architecture

Zero Trust is built on a single philosophy: "Never trust, always verify." It assumes that a breach has already occurred or is inevitable. Therefore, no user, device, or network segment is automatically trusted — even if it is inside the corporate perimeter.

Zero Trust requires continuous verification of identity, device health, and access context before granting access to any resource. It directly counters the outdated "castle and moat" model where everything inside the network perimeter was trusted by default. For the CISSP exam, understand Zero Trust as both a design principle and an architectural model. It drives decisions about micro-segmentation, multi-factor authentication, and least-privilege access policies.

Privacy by Design — Seven Foundational Principles

Privacy by Design (PbD) is a framework for proactively embedding privacy into the design and architecture of IT systems and business processes. Privacy is not a compliance checkbox — it is a core design requirement. The seven principles of PbD are:

  • Proactive, not reactive — prevent privacy risks before they occur

  • Privacy as the default setting

  • Privacy embedded into design

  • Full functionality — positive-sum, not zero-sum (privacy AND security, not privacy OR security)

  • End-to-end security throughout the entire lifecycle

  • Visibility and transparency

  • Respect for user privacy — keep it user-centric

Cybernous Exam Tip: The CISSP exam frequently tests whether a candidate can distinguish between reactive and proactive privacy controls. PbD is always proactive — it is built in from day one, not added after a breach.

3.2 Understand the Fundamental Concepts of Security Models

A Security Model is a formal, mathematical representation of a security policy. For the CISSP exam, you are not expected to understand the mathematics behind these models. What you must know is: which security goal does each model enforce, and what are its defining rules?

Model

Primary Goal

Defining Rule

Bell–LaPadula

Confidentiality

"No Read Up, No Write Down"

Biba

Integrity

"No Read Down, No Write Up"

Clark–Wilson

Integrity

Well-formed transactions + Separation of Duties

Brewer–Nash (Chinese Wall)

Conflict of Interest Prevention

Dynamic access restrictions based on prior access history

How to Apply Security Models on the Exam

The CISSP exam will give you a scenario and ask which model applies. Use this decision framework:

  • The scenario involves preventing unauthorized disclosureBell–LaPadula

  • The scenario involves preventing unauthorized modificationBiba (rule-based) or Clark–Wilson (transaction-based with SoD)

  • The scenario involves preventing conflicts of interest in financial or consulting environments → Brewer–Nash

Lattice-Based vs. Rule-Based Models

Lattice-based models (Bell–LaPadula, Biba) operate on fixed security levels with defined information flow rules between levels. Access decisions are based on a subject's clearance level relative to an object's classification.

Rule-based models (Clark–Wilson, Brewer–Nash) operate on defined policies and rules that govern how access occurs, rather than simply whether a level permits it. Clark–Wilson, for example, enforces integrity through well-formed transactions and separation of duties.

Covert Channels

A covert channel is an unauthorized communication path that allows information to be transferred in violation of a system's security policy — not through normal access paths, but by exploiting shared system resources.

Type

How It Works

Storage Channel

"Two processes communicate by reading and modifying a shared object (e.g., a file, flag, or semaphore)"

Timing Channel

"One process signals information to another by manipulating the timing or speed of its operations, which the second process observes"

Exam Focus: Covert channels are a confidentiality threat. They do not require a subject to have authorized access to the communication channel — they exploit side effects of system operation.

3.2.1 System Evaluation: Certification and Accreditation

When building secure architectures, organizations rely on vendor products. But how can you trust a vendor's security claims? Formal evaluation processes provide the answer.

Certification is the comprehensive technical analysis of a system or product to confirm it meets its stated security requirements. This is a technical process performed by security engineers.

Accreditation is management's official authorization for a system to operate. It is the formal acceptance of residual risk by a designated authority, granted for a defined period.

The key distinction: Certification says "this system meets requirements." Accreditation says "management accepts the risk and authorizes operation."

3.3 Select Controls Based Upon Systems Security Requirements

Security control frameworks provide structured, best-practice guidance for selecting and implementing controls to meet system requirements. The CISSP exam does not require deep expertise in any single framework — it requires you to know each framework's primary purpose and scope.

Framework

Primary Purpose

COBIT

IT governance and management — aligns IT with business objectives

ITIL

IT service management (ITSM) — best practices for service delivery

NIST SP 800-53

Comprehensive catalog of security and privacy controls for U.S. federal information systems

PCI DSS

"Mandatory security standard for organizations that store, process, or transmit credit card data"

ISO 27001/27002

"International standard for establishing, maintaining, and improving an Information Security Management System (ISMS)"

SOX

U.S. federal law mandating financial record-keeping and reporting controls for public companies

FedRAMP

Standardized security assessment and authorization framework for cloud services used by the U.S. federal government

Cybernous Exam Tip: When a CISSP question asks which framework applies, look for the context clue: federal government = NIST or FedRAMP, financial reporting = SOX, payment cards = PCI DSS, international = ISO 27001.

3.4 Understand Security Capabilities of Information Systems

This section examines the core architectural components that enforce security policy at the hardware and system level. These concepts describe how a system protects itself from the processor and memory up through the application layer.

The Access Control Foundation

  • Subject: An active entity that initiates a request for access to a resource (e.g., a user or a process).

  • Object: A passive entity that a subject attempts to access (e.g., a file, database, or device).

  • Reference Monitor Concept (RMC): An abstract security concept defining the ideal mediator for all subject-object access decisions. For the exam, it must: always mediate every access, be protected from modification, be verifiable as correct, and never be bypassed.

  • Security Kernel: The real-world hardware, firmware, and software implementation of the Reference Monitor Concept. It must be complete (cannot be bypassed), isolated (tamper-resistant), and verifiable (testable for correctness).

  • Trusted Computing Base (TCB): The total combination of all protection mechanisms in a system — hardware, firmware, and software — that collectively enforce the security policy. The TCB is only as strong as its weakest component.

Processor and Memory Security

Modern operating systems enforce security through privilege separation and memory isolation. Understanding these mechanisms is essential for Domain 3.

  • User Mode vs. Kernel Mode: User mode restricts applications from directly accessing hardware or critical system resources. Kernel mode grants full system privileges and is reserved for the operating system and trusted components only.

  • Process Isolation: Each running process operates in its own protected memory space. This prevents one process from reading or modifying another process's data, limiting the blast radius of any compromise.

  • Privilege Rings: Hardware-enforced privilege levels (typically Ring 0 through Ring 3) separate trusted system functions (Ring 0, the kernel) from untrusted user applications (Ring 3). The wider the ring gap between a component and the kernel, the less privilege it holds.

Key Architectural Components

  • Firmware: Provides low-level control over hardware and executes before the operating system loads. Because firmware operates at a highly privileged level, compromise at this layer can bypass most traditional security controls — making secure boot and firmware integrity verification critical.

  • Abstraction: Hides underlying system complexity and separates implementation details from functionality. It simplifies design and supports security by limiting direct access to lower-level components.

  • Virtualization: Creates logical instances of operating systems or hardware resources, enabling workload isolation. Key risks include hypervisor compromise (which affects all hosted VMs) and inadequate isolation between virtual machines sharing the same physical host.

  • Trusted Platform Module (TPM): A hardware chip embedded in a device's motherboard that performs cryptographic operations and establishes a hardware root of trust. Supports secure boot, attestation, key storage, and disk encryption (e.g., BitLocker).

Exam Focus: The CISSP exam tests the concepts of privilege separation and isolation. You are not expected to understand processor scheduling algorithms or memory management internals.

3.5 Assess and Mitigate Vulnerabilities of Security Architectures, Designs, and Solution Elements

This is one of the most heavily tested sections in Domain 3. It requires you to think like a security professional diagnosing real-world problems across a range of modern and specialized system types.

Common Architectural Vulnerabilities

  • Single Point of Failure (SPOF): A component whose failure causes the entire system to stop functioning. Mitigation: Redundancy — deploy backup components (e.g., two firewalls in a high-availability pair, RAID storage, dual ISP connections).

  • Bypass Controls: An intentional mechanism that allows an administrator to circumvent normal security controls. Mitigation: Compensating controls — segregation of duties, robust audit logging, and physical access controls to prevent misuse.

  • Time-of-Check / Time-of-Use (TOCTOU) / Race Condition: A vulnerability exploiting the time gap between when a system checks a condition (e.g., authorization) and when it acts on that check. An attacker manipulates the resource in that gap. Mitigation: Reduce the window with more frequent re-authentication and atomic operations.

  • Emanations: Unintentional electromagnetic radiation from electronic equipment that can be intercepted and used to reconstruct sensitive data displayed or processed on a screen or device. Mitigation: TEMPEST shielding, generating electromagnetic white noise, and establishing controlled physical zones around sensitive equipment.

System Hardening

System hardening reduces the attack surface of individual system components. Core hardening practices include:

  • Disabling all unnecessary services, ports, and protocols

  • Installing and configuring endpoint protection and host-based firewalls

  • Implementing full-disk encryption

  • Enforcing strong authentication and password policies

  • Applying patches and security updates promptly

  • Removing default accounts and changing default credentials

Mobile Systems Security

Mobile devices introduce significant risk because they combine corporate data with personal use, operate across untrusted networks, and are frequently lost or stolen.

  • Key Risks: Data exposure from lost or stolen devices, malware from untrusted application sources, and insecure Wi-Fi connections.

  • Mitigations: Mobile Device Management (MDM) enforces security policies across a fleet of devices, including remote wipe capability. Mobile Application Management (MAM) controls which applications can access corporate data. Additional controls include mandatory VPN use for remote access and application whitelisting.

Web-Based Vulnerabilities

Vulnerability

Target

Description

Cross-Site Scripting (XSS)

User's browser

Attacker injects malicious script into a trusted website; the victim's browser executes it

Cross-Site Request Forgery (CSRF)

Web server

Attacker tricks an authenticated user into submitting a malicious request the server trusts

SQL Injection

Backend database

Attacker inserts malicious SQL code through application input; root cause is improper input validation

SQL Injection Mitigations: Strict server-side input validation, parameterized queries, and prepared statements that separate SQL code from user-supplied data.

Specialized Systems

  • Industrial Control Systems (ICS): ICS environments control physical processes in critical infrastructure (power grids, water treatment, manufacturing). They prioritize availability and safety over confidentiality. Air gapping — physically isolating ICS networks from corporate and public networks — is the primary protection mechanism. Because ICS systems often cannot be taken offline for patching, compensating controls include continuous monitoring, strict network zoning, and anomaly detection.

  • Internet of Things (IoT): IoT devices carry inherent risk due to limited built-in security, widespread use of default credentials, and constrained processing power that limits encryption. Key mitigations: immediately change default credentials on every device, and segment IoT devices onto isolated network zones separate from critical business systems.

3.6 Select and Determine Cryptographic Solutions

Cryptography is the mathematical science of transforming readable data (plaintext) into an unintelligible format (ciphertext) that can only be reversed by an authorized party holding the correct key. It is the foundational technology that enforces confidentiality, integrity, and authenticity across all modern systems.

A well-designed cryptosystem can provide five primary security services: Confidentiality, Integrity, Authenticity, Non-repudiation, and Access Control.

Symmetric vs. Asymmetric Cryptography

Feature

Symmetric (Private Key)

Asymmetric (Public Key)

Key Usage

Same key encrypts and decrypts

Public key encrypts; private key decrypts

Speed

Fast and efficient for large data sets

Slow due to complex mathematical operations

Key Exchange

Key must be shared securely out-of-band

Solves key exchange — public key can be shared openly

Primary Use Case

Bulk data encryption at rest and in transit

"Key exchange, digital signatures, encrypting small data"

Scalability

Poor — n(n-1)/2 keys needed for n users

Good — each user manages only their own key pair

Common Symmetric Algorithms: AES (128, 192, 256-bit), 3DES, Blowfish

Common Asymmetric Algorithms: RSA, ECC, Diffie-Hellman (key exchange), DSA (signatures)

Hashing and Digital Signatures

Hashing: Produces a fixed-length digest (fingerprint) of any input. A cryptographically strong hash function must be: one-way (cannot reverse the digest to recover input), deterministic (same input always produces same output), and collision-resistant (computationally infeasible to find two inputs producing the same digest).

Digital Signature: Created by hashing a message and encrypting the resulting hash with the sender's private key. Provides three critical security services: Integrity (any modification to the message invalidates the signature), Authenticity (only the holder of the private key could have signed it), and Non-repudiation (the sender cannot deny signing it).

Public Key Infrastructure (PKI): The comprehensive framework of technologies, policies, procedures, and trust relationships used to create, distribute, store, and revoke digital certificates. PKI binds a public key to a verified identity through a Certificate Authority (CA).

Cybernous Exam Tip: Remember the order for digital signatures: sender hashes the message, then encrypts the hash with their private key. The recipient decrypts with the sender's public key, then independently hashes the message and compares. If the hashes match — integrity, authenticity, and non-repudiation are confirmed.

3.7 Understand Methods of Cryptanalytic Attacks

Cryptanalytic attacks do not typically break modern encryption through brute force. Instead, they target weaknesses in implementation, key management, protocol design, or mathematical properties. For the CISSP exam, know what each attack exploits — not how to execute it.

Attack

What It Exploits

Man-in-the-Middle (MITM)

Intercepts and potentially alters communications between two parties without their knowledge

Replay Attack

Recaptures valid authentication data and retransmits it later to gain unauthorized access

Pass-the-Hash

Steals a stored password hash and uses it to authenticate without recovering the plaintext password

Side-Channel Attack

"Exploits information leaked by system implementation — timing, power consumption, or electromagnetic emissions"

Birthday Attack

Exploits the mathematical probability of hash collisions to find two inputs producing the same digest

Implementation Attack

Targets flaws in how a cryptographic algorithm is implemented in software or hardware — not flaws in the algorithm itself

Exam Focus: These attacks collectively demonstrate that cryptographic security depends on correct implementation, robust key management, and overall system security — not on encryption strength alone. A perfectly strong algorithm implemented poorly is completely vulnerable.

3.8 & 3.9 Apply and Design Site and Facility Security Controls

Physical security is not a secondary concern — it is the foundation upon which all other security controls are built. The overriding, non-negotiable primary goal of any physical security program is the protection of human life. All other objectives (asset protection, business continuity) are subordinate to this.

Five Goals of a Physical Security Program

A comprehensive physical security program must achieve five layered objectives:

  • Deterrence: Discourage potential intruders before they act (fences, warning signs, visible security personnel, lighting)

  • Delay: Slow an intruder down, buying time for a response (locks, reinforced barriers, mantrap/access control vestibules)

  • Detection: Identify and alert on intrusion attempts (motion detectors, CCTV, intrusion alarms)

  • Assessment: Determine the nature, severity, and credibility of the detected incident

  • Response: Take action to neutralize the threat (dispatching security personnel, notifying law enforcement)

Crime Prevention Through Environmental Design (CPTED)

CPTED is a design philosophy that reduces criminal activity by influencing human behavior through the physical environment itself. The goal is to make criminal activity both more difficult to execute and more likely to be detected.

  • Natural Access Control: Guide people through the environment using physical design (pathways, entry points) to reduce unauthorized access opportunities

  • Natural Surveillance: Design spaces to maximize visibility, making it difficult for criminals to act unobserved (open sight lines, adequate lighting)

  • Territorial Reinforcement: Create a clear sense of ownership and boundaries through design (landscaping, signage, defined spaces) that signals authorized vs. unauthorized zones

  • Legitimate Activity Support: Design spaces that attract and support legitimate use, increasing natural surveillance through occupancy

  • Image and Maintenance: Well-maintained environments signal active management and reduce the perception of easy criminal opportunity

Layered Facility Design (Defense in Depth)

Physical security, like logical security, is most effective when layered:

  • Perimeter Controls: Fences, gates, bollards, vehicle barriers, and lighting to deter and detect unauthorized entry at the outermost boundary

  • Access Control: Controlled entry points, badge readers, mantraps, and visitor management to enforce authorized access only

  • Surveillance: CCTV as both a deterrent and detective control — effectiveness depends entirely on proper placement, coverage, and active monitoring

  • Environmental Support: Facility design, lighting, and spatial organization that supports visibility, safety, and controlled movement throughout

CISSP Exam Tip: CPTED is a preventive, proactive strategy — it reduces crime through environmental design choices, not through reactive enforcement. The exam distinguishes clearly between CPTED and reactive physical security measures.

3.10 Manage the Information System Lifecycle

The System Development Life Cycle (SDLC) provides a structured, phased approach to managing information systems from initial concept through final decommissioning and disposal. For the CISSP exam, the emphasis is on when and how security controls are integrated — not on specific development methodologies.

SDLC Phase

Security Emphasis

Initiation / Concept

Identify security requirements and classify the system early

Development / Acquisition

Conduct risk assessments; select and design security controls into the architecture

Implementation

Test security controls; conduct security testing before deployment

Operations / Maintenance

Certification and Accreditation authorize operation; continuous monitoring maintains security posture

Disposal

Secure data sanitization and destruction; revoke access and decommission assets properly

The single most important principle for the CISSP exam regarding SDLC is this: the earlier security is integrated into the lifecycle, the less it costs and the more effective it is. Retrofitting security after development is exponentially more expensive and less reliable than designing it in from the start.

Cybernous Exam Tip from Manoj Sharma: Domain 3 questions will often describe a scenario where security was added after a system was built, resulting in a breach or a compliance failure. The correct answer will almost always involve moving security requirements to an earlier phase of the lifecycle — this is the architect's mindset in action.

Conclusion: Your Path to Mastering Domain 3

Domain 3 is the domain that separates security technicians from security architects. It demands a systematic, design-first mindset — the ability to look at any system, environment, or scenario and ask: "How was security engineered into this? Where are the gaps? What controls enforce confidentiality, integrity, and availability at the design level?"

From the abstract elegance of Bell-LaPadula's confidentiality rules, to the practical necessity of CPTED in a data center's physical design, to the mathematical certainty of AES-256 encryption — Domain 3 shows you that security is a discipline of deliberate, layered, proactive design choices.

At Cybernous, our students consistently report that Manoj Sharma's "Think Like a Manager" framework transforms Domain 3 from an intimidating collection of models and acronyms into a coherent body of knowledge. When you understand the why behind each principle, model, and control, the exam questions become significantly more navigable.

Keep studying systematically. Apply the frameworks. Think like an architect. You are on the right path.

Ready to test your Domain 3 knowledge? Explore Cybernous' 5,000+ CISSP CAT-format practice questions, including 60+ hours of live exam practice sessions with Manoj Sharma directly.

Explore the CISSP Success Toolkit →

Key Facts

  • The domain emphasizes developing a security architect's strategic mindset, beyond just exam preparation.
  • Security Architecture is defined as the design and organization of components, processes, and controls to mitigate security risks.
  • Core secure design principles include least privilege, defense in depth, fail securely, zero trust, and privacy by design.
  • The principle of least privilege involves granting users and systems only the minimum permissions needed for their functions.
  • Defense in depth uses multiple security controls to ensure that the failure of one does not compromise the entire system.
  • Fail securely means systems should default to a secure state that denies access when they fail.
  • Zero trust requires that no entity is implicitly trusted, and every access request must be authenticated and authorized.
  • Security integrated at the earliest SDLC phase costs the least and delivers the greatest protection — retrofitting security after development is exponentially more expensive and less effective.
  • The overriding primary goal of any physical security program is the protection of human life — all other objectives are secondary.
  • Bell-LaPadula enforces Confidentiality (No Read Up, No Write Down); Biba enforces Integrity (No Read Down, No Write Up) — know this distinction cold for exam day.
  • CISSP Domain 3: Security Architecture and Engineering accounts for 13% of exam marks, making it the largest single domain focusing on designing secure systems through architectural principles rather than tactical implementation
  • Core secure design principles include least privilege, defense in depth, fail securely, zero trust, Privacy by Design, and secure defaults - requiring systematic application throughout system lifecycle
  • Four formal security models tested: Bell-LaPadula (confidentiality: No Read Up, No Write Down), Biba (integrity: No Read Down, No Write Up), Clark-Wilson (integrity: well-formed transactions), Brewer-Nash (conflict of interest prevention)
  • Symmetric cryptography uses same key for encryption/decryption (fast, bulk data) while asymmetric uses key pairs (slower, key exchange and digital signatures) - hybrid systems combine both approaches
  • Zero Trust architecture assumes "never trust, always verify" requiring continuous authentication and authorization for every access request regardless of location, eliminating traditional perimeter-based trust assumptions
  • CPTED (Crime Prevention Through Environmental Design) reduces crime through physical environment design using natural access control, surveillance, territorial reinforcement, and legitimate activity support - foundation for all other security controls

Related Questions

  • What are the core secure design principles for CISSP Domain 3?