CISSP Domain 3 Security Architecture and Engineering Detailed Notes Part I

CISSP Domain 3 Security Architecture and Engineering Detailed Notes Part I


🎯 Purpose of Domain 3

This domain focuses on the foundational principles and practices needed to design, build, and maintain secure IT systems. It emphasizes how to integrate security throughout the system development life cycle (SDLC), evaluate architectures, and apply technical controls across various environments — from traditional IT to cloud and emerging technologies.

Considering the domain depth, i have summarized the notes in to two parts and this is the Part I. Happy Learning 1

📚 What You’ll Learn in This Domain -Part I

1. Secure Design Principles
Understand how to embed security early in system and software architecture using concepts like least privilege, defense in depth, fail-safe defaults, and zero trust.


2. Security Models and Architectures
Study formal security models such as Bell-LaPadula, Biba, Clark-Wilson, and how they apply to confidentiality, integrity, and access control.


3. Systems Security Requirements
Learn how to identify and select security controls based on the needs of the business and risk assessments.


4. Security Capabilities of Information Systems
Explore how components like memory protection, encryption, TPMs, and secure boot contribute to a secure computing environment.


5. Vulnerabilities in Architectures and Systems
Analyze the unique risks of servers, cloud systems, IoT, microservices, containers, and ICS, and how to mitigate them effectively.

🎯 Objective

To ensure systems and processes are secure by design. This involves embedding security principles into engineering and architectural decisions, from early planning to post-deployment.

🔍 Key Secure Design Principles — Deep Dive

1️⃣ Threat Modeling

Definition: A structured process used to identify and evaluate potential threats and vulnerabilities during the design and development stages of a system.

Common Methodologies:

  • STRIDE – Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege.
  • PASTA – Process for Attack Simulation and Threat Analysis.

Implementation:

  • Conduct during architectural reviews or sprint planning.
  • Involve development, security, and product teams.

Example:
A financial app applies STRIDE to its login service and identifies spoofing (fake credentials) and tampering (modification of tokens). As a result, they implement MFA and JWT signature validation.

2️⃣ Least Privilege

Definition: Users, processes, or systems should be granted only the minimum access necessary to perform their function.

Benefits:

  • Reduces attack surface.
  • Minimizes impact of insider threats or malware.

Examples:

  • A web server account has read-only access to static content folders.
  • A DevOps pipeline allows deploy scripts to access only staging, not production.

Real-World Scenario:
An attacker compromises a developer’s account. Since the account lacks admin rights and access to production secrets, damage is limited.

3️⃣ Defense in Depth

Definition: Employing multiple, layered security controls throughout a system to reduce risk if one control fails.

Layers of Defense:

  • Network layer (firewalls, VPNs)
  • Application layer (WAFs, input validation)
  • Endpoint layer (antivirus, EDR)
  • Data layer (encryption, access controls)
  • Administrative layer (policies, training)

Example:
A healthcare system protects patient records using:

  • MFA for users
  • WAF for public APIs
  • Encryption of data at rest
  • Monitoring via SIEM tools

4️⃣ Secure Defaults

Definition: Systems should ship and deploy with security-focused default configurations.

Why Important:

  • Most security breaches result from misconfigured defaults.
  • Users may not know how to securely configure features.

Examples:

  • Cloud storage (e.g., S3 buckets) are private by default.
  • Unused services are disabled in operating systems.

Real-World Scenario:
A company left a cloud database open to the public. If the default had been secure (private), the exposure would have been avoided.

5️⃣ Fail Securely

Definition: When a system experiences an error or failure, it should default to a secure state, not leave resources exposed.

Examples:

  • Login system locks account after 5 failed attempts instead of allowing unlimited tries.
  • If a firewall malfunctions, it drops all traffic instead of allowing all.

Real-World Scenario:
A bank ATM fails and displays a message. A “fail open” approach would allow access to the system — a major security risk. Instead, it locks and powers down.

6️⃣ Segregation of Duties (SoD)

Definition: No one person should have enough access or privileges to abuse the system on their own.

Types of SoD:

  • Development vs. Deployment roles
  • Payment initiation vs. approval
  • Backup creation vs. restoration

Example: In a finance system:

  • One employee can create an invoice.
  • A second employee must approve it.
  • A third issues payment.

7️⃣ Keep it Simple and Small (Economy of Mechanism)

Definition: Simplify system design so it’s easier to understand, test, and secure.

Benefits:

  • Fewer bugs and misconfigurations
  • Better maintainability and auditability

Examples:

  • Using standard APIs and frameworks.
  • Keeping authentication flows minimal and well-documented.

Real-World Scenario:
A startup rewrites its complex auth code using OAuth2 libraries. This reduces attack vectors and improves compliance.

8️⃣ Zero Trust / Trust But Verify

Zero Trust Concept:

  • No implicit trust for any user, device, or network — every request is verified.
  • Enforce least privilege access continuously.

Core Elements:

  • Identity verification (MFA, SSO)
  • Device health (MDM, posture assessment)
  • Microsegmentation (isolate network components)

Real-World Application:
Google’s BeyondCorp architecture enables employees to work securely from anywhere, by authenticating every session and verifying device status.

9️⃣ Privacy by Design

Definition: Embedding privacy and data protection principles into systems and processes from the start, not as an afterthought.

Core Privacy Practices:

  • Data minimization
  • Purpose limitation
  • User control and consent
  • Secure data storage and transfer

Example: A mobile health app collects only required medical information and encrypts all data both at rest and in transit. It also allows users to delete their data on demand.

Compliance Context:

  • Required by GDPR, CCPA, and global privacy laws.

🔟 Shared Responsibility Model (Cloud Security)

Definition: In cloud environments, security responsibilities are divided between the cloud provider and the customer.

Real-World Example:
In AWS, they secure the data center. You must:

  • Enable encryption for S3.
  • Patch EC2 instances.
  • Configure IAM properly.

Exam Insight: Know where responsibility lies in IaaS, PaaS, and SaaS models.

🔟Secure Access Service Edge (SASE)

Definition: A cloud-delivered architecture that converges networking and security functions into a single service.

Includes:

  • SD-WAN (for connectivity)
  • CASB (Cloud Access Security Broker)
  • FWaaS (Firewall-as-a-Service)
  • ZTNA (Zero Trust Network Access)
  • SWG (Secure Web Gateway)

Use Case:

  • Ideal for distributed workforces.
  • Unifies access, data protection, and policy enforcement across users and devices.

Example: A global company uses SASE to give employees secure access to internal tools, regardless of location, while applying centralized policies (e.g., block Dropbox uploads).

✅ Summary

🔍 What Are Security Models?

Security models are abstract frameworks that define how access control and information flow are handled within a computing system. They are critical in designing systems that enforce confidentiality, integrity, and availability (CIA) through forma2l policies and access restrictions.

They act as the blueprint for enforcing:

  • Who can access what information
  • Under what conditions
  • With what level of privilege

These models help ensure secure system behavior and form the basis of many modern access control mechanisms (MAC, DAC, RBAC).

🔐 Security Models by Objective

📘 1. Bell-LaPadula Model (BLP)Confidentiality First

🌟 Objective:

Prevent unauthorized disclosure of information.

🔑 Core Rules:

  • Simple Security Property (“No Read Up”): A subject can’t read data at a higher classification level.
  • *-Property (“No Write Down”): A subject can’t write information to a lower classification level.
  • Discretionary Security Property: Allows using Access Control Lists (ACLs) for more flexible control.

🛡️ Real-World Example:

A government worker with “Secret” clearance cannot read “Top Secret” files (no read up) and cannot write sensitive data into “Confidential” reports (no write down).

📌 Summary:

  • Enforces Mandatory Access Control (MAC)
  • Prevents information leakage
  • Used in military, intelligence, defense systems

📗 2. Biba ModelIntegrity First

🌟 Objective:

Ensure data remains uncorrupted by untrusted sources.

🔑 Core Rules:

  • Simple Integrity Property (“No Read Down”): Prevents a subject from reading lower-integrity data.
  • *-Integrity Property (“No Write Up”): Prevents lower-integrity subjects from writing to higher-integrity objects.

🛡️ Real-World Example:

A junior employee cannot write data to the general ledger (no write up), and a senior accountant won’t read error-prone data from unverified sources (no read down).

📌 Summary:

  • Prevents unauthorized modification
  • Often used in financial or clinical systems
  • Opposite of Bell-LaPadula in terms of flow control

📙 3. Clark-Wilson ModelCommercial Integrity & Transactions

🌟 Objective:

Ensure that data modifications are:

  • Authorized
  • Auditable
  • Done via validated programs

🔑 Core Components:

  • Well-formed Transactions: Only specific programs can manipulate critical data.
  • Separation of Duties (SoD): No single user can execute all parts of a critical task.
  • Enforced via:
    • CDIs – Constrained Data Items
    • TPs – Transformation Procedures
    • UDIs – Unconstrained Data Items

🛡️ Real-World Example:

In an enterprise resource system (ERP), a purchase order must be entered by one person, approved by another, and fulfilled by a third.

📌 Summary:

  • Ensures data integrity and traceability
  • Emphasizes auditing and accountability
  • Applied in finance, ERP, audit-heavy systems

📕 4. Brewer-Nash ModelDynamic Access Control / Conflict of Interest Model

🌟 Objective:

Prevent conflicts of interest by dynamically adjusting user access.

🔑 Concept:

  • Access is granted based on a user’s previous actions.
  • A user accessing one client’s data is barred from accessing a competitor’s data.

🛡️ Real-World Example:

A cybersecurity consultant analyzing data for Company A will be automatically blocked from viewing Company B’s data in the same industry.

📌 Summary:

  • Implements context-aware, dynamic control
  • Used in law firms, financial auditing, consulting
  • Prevents information bleeding between clients

📓 5. Graham-Denning ModelAccess Control Management

🌟 Objective:

Define secure rules for subject-object interactions (users, processes, and resources).

🔑 Features:

  • 8 rules for actions like:
    • Creating/deleting subjects/objects
    • Granting or removing access rights
  • Uses an access control matrix

🛡️ Real-World Example:

A user creates a file, sets read-only access for a colleague, and later revokes it using OS-level access controls.

📌 Summary:

  • Foundation for access control mechanisms
  • Used in operating systems, file systems
  • Underpins Discretionary Access Control (DAC)

📔 6. Harrison-Ruzzo-Ullman (HRU) ModelTheoretical Access Verification

🌟 Objective:

Mathematically analyze if a system’s access control policy can maintain security over time.

🔑 Features:

  • Extension of Graham-Denning
  • Uses access control matrices
  • Demonstrates if rights can leak via subject-object interactions

🛡️ Real-World Example:

Used in academia or research to prove whether a security policy can become insecure through a chain of user actions.

📌 Summary:

  • Focused on state transitions
  • More theoretical, less commonly implemented directly

📊 Summary

🛡️ 3.3: Select Controls Based Upon System Security Requirements

🎯 Objective:

Understand how to analyze security requirements for systems and apply appropriate security controls—technical, physical, and administrative—to mitigate risk, ensure compliance, and support CIA (Confidentiality, Integrity, Availability) goals.

🔍 What Are Security Controls?

Security controls are safeguards or countermeasures implemented to:

  • Prevent, detect, or respond to threats
  • Minimize risk to assets
  • Enforce security policies and regulatory requirements

They are chosen based on system needs, risk profiles, data sensitivity, and business impact.

📂 Categories of Security Controls

🔁 Functional Types of Controls

🔄 Security Control Lifecycle

1️⃣ Identify Security Requirements

  • Analyze CIA needs of the system
  • Consider asset sensitivity, threat actors, operating environment
  • Evaluate legal/compliance drivers (e.g., GDPR, HIPAA, PCI DSS)

📘 Example: A healthcare SaaS must meet HIPAA requirements for confidentiality and auditability.

2️⃣ Conduct Risk Assessment

  • Identify assets, threats, vulnerabilities, and risks
  • Calculate risk using qualitative or quantitative methods
  • Prioritize risks by likelihood and impact

📘 Example: SCADA systems have high risk from cyber threats—availability becomes top priority.

3️⃣ Select Appropriate Controls

Match controls to:

  • Mitigate specific threats
  • Address risk levels
  • Satisfy compliance or business continuity

Use control frameworks like:

  • NIST SP 800-53 (for federal systems)
  • ISO/IEC 27001 & 27002 (international standard)
  • CIS Controls (practical implementation)
  • COBIT (IT governance)
  • PCI DSS (for payment card data)

📘 Example: Choose disk-level encryption to meet GDPR’s data protection mandate.

4️⃣ Implement Controls

Deploy controls based on roles, systems, and sensitivity

  • Use secure configuration tools (e.g., Ansible, GPOs)
  • Assign ownership for accountability

📘 Example: Enforcing RBAC in Azure AD for least privilege.

5️⃣ Monitor & Validate Effectiveness

  • Test controls through vulnerability scanning, audits, and penetration testing
  • Use KPIs, log analytics, and SIEM to monitor real-time performance
  • Conduct periodic control reassessments during change management

🛠️ CIA Objective–Control Mapping

🎯 Objective

To identify, analyze, and understand the built-in security features of modern information systems (IS) that ensure confidentiality, integrity, and availability (CIA) — by leveraging both hardware and software mechanisms such as memory protection, secure boot, TPM, encryption, and sandboxing.

🧠 Key Capabilities of Secure Information Systems

1️⃣ Memory Protection

Purpose: Prevent one process from accessing or corrupting another process’s memory space.

🔧 Techniques:

  • Virtual Memory: Each process gets isolated address space.
  • Segmentation & Paging: Breaks memory into protected regions.
  • DEP (Data Execution Prevention): Prevents code execution in memory marked as non-executable.
  • ASLR (Address Space Layout Randomization): Randomizes memory addresses to thwart predictable exploits.

💡 Real-World Use: Operating systems like Windows and Linux apply DEP + ASLR to stop malware from exploiting buffer overflows.

2️⃣ Trusted Platform Module (TPM)

Purpose: Hardware chip used to ensure platform integrity, secure key storage, and enable hardware-rooted trust.

🔐 Functions:

  • Secure Boot & Measured Boot: Ensures only trusted firmware/OS loads.
  • Cryptographic Key Generation & Sealing: Hardware-based key security.
  • Platform Configuration Registers (PCRs): Store integrity measurements.

💡 Example: BitLocker leverages TPM to encrypt disk contents and verify system integrity during boot.

3️⃣ Encryption & Decryption

Purpose: Ensure data confidentiality and integrity, in storage and transit.

🔒 Encryption Types:

  • Symmetric (e.g., AES): One key used for encryption/decryption. Fast, efficient.
  • Asymmetric (e.g., RSA): Public/private key pairs for secure exchange, authentication.
  • Hybrid (e.g., TLS): Combines both for secure sessions.
  • Hashing (e.g., SHA-2): Provides integrity, not confidentiality.

💡 Examples:

  • HTTPS uses TLS (RSA + AES).
  • Disk encryption uses AES-256.
  • PGP/GPG protects sensitive emails.

4️⃣ Hardware Security Module (HSM)

Purpose: Dedicated physical device for secure cryptographic key generation, protection, and processing.

🔐 Capabilities:

  • Tamper-resistant key storage
  • Secure certificate and digital signature processing
  • Offloads crypto operations from hosts

💡 Example: Banks and payment processors use HSMs to protect keys used in card processing or SWIFT communications.

5️⃣ Secure Boot & Measured Boot

Secure Boot: Ensures only signed and trusted firmware/OS components are loaded at startup.

Measured Boot: Captures and records the hash of each component during boot for integrity validation via TPM.

💡 Example: On Windows, Secure Boot verifies UEFI and kernel drivers; Measured Boot ensures boot chain integrity.

6️⃣ Hardware Root of Trust

Purpose: Establishes a trusted starting point at the hardware level, enabling verification of the bootloader and OS integrity.

💡 Examples:

  • Intel Boot Guard
  • AMD Platform Security Processor (PSP)

Used in environments requiring strong tamper protection and chain-of-trust validation.

7️⃣ Trusted Execution Environment (TEE)

Purpose: A secure enclave within the CPU where code and data are isolated and protected during execution.

🔐 Features:

  • Protected from OS and apps
  • Used for biometrics, key storage, DRM, and mobile payments

💡 Examples:

  • ARM TrustZone
  • Intel SGX (Software Guard Extensions)

Used by smartphones and cloud providers for secure workloads.

8️⃣ Sandboxing

Purpose: Run untrusted or semi-trusted code in restricted, isolated environments to prevent access to system resources.

💻 Applications:

  • Web browsers (Chrome, Edge)
  • Mobile OSs (Android, iOS)
  • Application containers (Docker)

💡 Example: Each browser tab in Chrome runs in a sandbox to isolate crashes and limit exploit propagation.

9️⃣ Hypervisor Security (Virtualization Layer)

Purpose: Enforces isolation between virtual machines (VMs) on the same hardware.

🔧 Types:

  • Type 1 (bare-metal): Directly on hardware (e.g., VMware ESXi, Hyper-V)
  • Type 2 (hosted): Runs on top of another OS (e.g., VirtualBox)

🔐 Security Features:

  • Inter-VM isolation
  • Encrypted VM snapshots
  • Secure virtual networking

💡 Example: Cloud providers use hypervisors to isolate tenants in IaaS platforms.

🔟 Access Control Enforcement Mechanisms

Purpose: Define and enforce who can access what resources, and how.

🔒 Models:

  • Discretionary Access Control (DAC): File owners define access.
  • Mandatory Access Control (MAC): Based on classification labels.
  • Role-Based Access Control (RBAC): Permissions tied to job roles.
  • Attribute-Based Access Control (ABAC): Uses policies and user attributes.

💡 Example: Linux systems use SELinux (MAC) to control daemon privileges beyond standard Unix permissions.

📊 Summary

3.5: Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements

🎯 Objective

To identify and mitigate vulnerabilities across a diverse set of system architectures and solution elements by applying secure design principles and security controls appropriate to each system type.

These systems include:

  • Traditional IT (clients, servers, databases)
  • Modern and emerging platforms (cloud, microservices, containers)
  • Specialized systems (ICS, IoT, HPC, embedded)

🔍 Detailed Vulnerability Assessment & Mitigation by Architecture

1️⃣ Client-Based Systems

Common Risks:

  • Local data leakage (unencrypted temp files)
  • Keylogging and malware
  • Insecure browser plugins
  • Unpatched software vulnerabilities

Mitigation Strategies:

  • Endpoint protection (EDR, anti-malware)
  • Host-based firewalls and hardening
  • Disk encryption (BitLocker, FileVault)
  • Auto-update and patch management
  • Least privilege with user separation (standard vs. admin accounts)

Real-World Example:
Corporate laptops configured with BitLocker, restricted USB access, and monitored using CrowdStrike Falcon.

2️⃣ Server-Based Systems

Common Risks:

  • Misconfigured services and open ports
  • OS-level vulnerabilities
  • Weak admin authentication (e.g., exposed SSH)

Mitigation Strategies:

  • Apply CIS hardening benchmarks
  • Role separation and administrative boundaries
  • Patch automation and configuration management (Ansible, Puppet)
  • Multi-factor authentication (MFA) for remote access

Real-World Example:
Hardened Linux web servers configured with Fail2Ban, SELinux, and 2FA-enabled SSH.

3️⃣ Database Systems

Common Risks:

  • SQL Injection
  • Excessive privileges (over-permissioned accounts)
  • Poor auditing/logging

Mitigation Strategies:

  • Input validation and parameterized queries
  • Database Activity Monitoring (DAM)
  • RBAC/ABAC enforcement
  • Encrypt data at rest and in transit

Real-World Example:
Secure PostgreSQL setup with pgAudit, TLS encryption, and access limited via roles.

4️⃣ Cryptographic Systems

Common Risks:

  • Use of deprecated ciphers (MD5, RC4)
  • Poor key lifecycle management
  • Hardcoded keys or keys in plaintext

Mitigation Strategies:

  • Use strong algorithms (AES-256, RSA 2048+, ECC)
  • Employ HSMs or cloud KMS
  • Rotate keys regularly; enforce expiration
  • Implement certificate pinning and revocation checks

Real-World Example:
TLS 1.3 enforced on web servers with HSTS, AES-GCM encryption, and Let’s Encrypt automation.

5️⃣ Industrial Control Systems (ICS)

Common Risks:

  • Legacy, unauthenticated protocols (Modbus, DNP3)
  • No native encryption
  • Flat networks (no segmentation)

Mitigation Strategies:

  • Segment networks (zones and conduits)
  • Use jump servers and unidirectional gateways
  • Passive traffic monitoring
  • Restrict USB and physical access

Real-World Example:
An energy utility segments its OT and IT networks and monitors ICS traffic using Nozomi Guardian.

6️⃣ Cloud-Based Systems (SaaS, IaaS, PaaS)

🟠 SaaS Risks:

  • Shadow IT
  • Inadequate data governance
  • Multi-tenancy exposure

Mitigations:

  • CASB for visibility
  • SSO with MFA
  • DLP & access control enforcement

🔵 IaaS Risks:

  • Misconfigured buckets/firewalls
  • VM snapshot exposure
  • Weak IAM policies

Mitigations:

  • Security groups and network ACLs
  • IAM least privilege
  • Cloud-native monitoring (AWS Config, Azure Defender)

🟣 PaaS Risks:

  • Vulnerable libraries in code
  • Misconfigured runtime environments

Mitigations:

  • Secure coding & dependency scanning (e.g., Snyk)
  • Isolated environments per tenant/app
  • Runtime security controls

Real-World Example:
AWS Lambda with strict IAM, encrypted environment variables, and integrated GuardDuty alerting.

7️⃣ Distributed Systems

Common Risks:

  • Insecure communication between nodes
  • Lack of authentication or encryption
  • Inconsistent configuration across nodes

Mitigation Strategies:

  • Enforce mTLS for all services
  • Apply zero trust principles
  • Distributed logging and consistent state validation
  • Consensus protocols (e.g., Raft) for integrity

Real-World Example:
A Kubernetes-based distributed app using SPIFFE identities and mTLS between pods.

8️⃣ Internet of Things (IoT)

Common Risks:

  • Default/hardcoded passwords
  • Lack of firmware updates
  • No encryption or authentication

Mitigation Strategies:

  • Require strong authentication
  • Signed firmware and OTA updates
  • Encrypted data transfer
  • Network segmentation per device class

Real-World Example:
Smart home hubs using certificate-based authentication and encrypted MQTT communication.

9️⃣ Microservices / APIs

Common Risks:

  • API abuse (excessive access, lack of auth)
  • Insecure inter-service communications
  • Lack of throttling or validation

Mitigation Strategies:

  • Use OAuth 2.0 / JWT for access control
  • API gateways with rate limiting and logging
  • Enforce input/output validation (OpenAPI)

Real-World Example:
REST APIs behind AWS API Gateway, integrated with Cognito for auth and CloudWatch for logs.

🔟 Containerization

Common Risks:

  • Container escape to host
  • Over-permissioned containers (e.g., root)
  • Insecure images

Mitigation Strategies:

  • Use signed, scanned images
  • Drop root privileges in Docker
  • Enforce runtime controls (Seccomp, AppArmor)

Real-World Example:
Containers scanned with Trivy, run as non-root, and isolated using PodSecurityPolicies.

1️⃣1️⃣ Serverless

Common Risks:

  • Over-scoped permissions
  • Trigger abuse (e.g., S3 events)
  • No input sanitation

Mitigation Strategies:

  • IAM scoping per function
  • Event source validation
  • Logging, throttling, structured exception handling

Real-World Example:
GCP Cloud Functions limited by least privilege and validated by Cloud Endpoints.

1️⃣2️⃣ Embedded Systems

Common Risks:

  • Static credentials
  • Inability to patch/update
  • Limited crypto or logging

Mitigation Strategies:

  • Design for OTA updates and rollback
  • Secure boot and signed firmware
  • Simplified code base with memory safety

Real-World Example:
Medical device using ARM TrustZone and signed firmware for integrity.

1️⃣3️⃣ High-Performance Computing (HPC) Systems

Common Risks:

  • Shared memory risks
  • Weak tenant isolation
  • Research or IP theft

Mitigation Strategies:

  • Job-based RBAC
  • Disk/network encryption
  • Strong tenant segmentation

Real-World Example:
University HPC clusters using Slurm scheduler with user quotas and encryption of scratch space.

1️⃣4️⃣ Edge Computing Systems

Common Risks:

  • Physical tampering
  • Latency in policy enforcement
  • Limited local logging/storage

Mitigation Strategies:

  • Tamper-resistant hardware
  • Remote attestation and device health checks
  • Synchronize edge-to-core policies securely

Real-World Example:
Retail kiosks using Intel TPM, auto-patching, and encrypted disk for offline operation.

 1️⃣5️⃣ Virtualized Systems

Common Risks:

  • VM escape
  • Host compromise
  • Unmonitored internal traffic

Mitigation Strategies:

  • Hypervisor patching
  • VM isolation (vSwitch, VLAN)
  • Secure snapshots & disk encryption
  • Monitor east-west traffic (virtual firewalls)

Real-World Example:
Enterprise uses VMware NSX to inspect VM traffic and isolate PCI-compliant systems.

📌 Summary

📘 Final CISSP Study Tips

3.1

  • Design principles are scenario-based in the exam — know how to apply them.
  • Understand trade-offs: security vs. usability, cost vs. protection.
  • Expect questions about cloud models, identity verification, and access control.
  • Pair this with threat modeling methods and architecture frameworks (TOGAF, SABSA) for complete preparation

3.2

  • BLP = Confidentiality, Biba = Integrity. Easy to confuse—memorize by function.
  • Know the difference between static models (BLP, Biba) and dynamic models (Brewer-Nash).
  • Clark-Wilson focuses on business rules, not classifications.

3.3

  • Understand how to choose controls based on the risk, asset type, and security objective
  • Know the difference between preventive, detective, corrective, and compensating
  • Expect scenario questions where you must select the most effective or feasible control
  • Be familiar with control frameworks like NIST, ISO, and CIS

3.4

  • Understand the difference between hardware and software controls (e.g., TPM vs. sandboxing)
  • Match capabilities to goals (e.g., confidentiality → encryption, integrity → TPM)
  • Know where and how controls like TPM, HSM, TEE fit into system architecture
  • Expect scenario-based questions where you’re asked to secure boot processes or key storage

3.5

  • Understand which threats map to which architecture
  • Know specific mitigations for modern platforms (cloud, containers, APIs)
  • Pay attention to legacy vs. modern attack surfaces
  • Focus on real-world risks like misconfigurations, access control gaps, or lack of encryption

1 Comment

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.