CISSP Playbook – Domain 3: Security Architecture & Engineering

CISSP Playbook – Domain 3: Security Architecture & Engineering


Purpose of Domain 3

Domain 3 validates your ability to design, evaluate, and reason about secure systems. It is not about tools or configurations—it is about architectural decisions that withstand failure, attack, and business pressure.

CISSP mindset:
“If security is not designed in, it will eventually be broken out.”

1. Core Security Principles

Every architectural decision must trace back to these principles.

  • Confidentiality – Prevent unauthorized disclosure
  • Integrity – Prevent unauthorized modification
  • Availability – Ensure systems remain usable when needed

Supporting principles:

  • Least Privilege
  • Defense in Depth
  • Separation of Duties
  • Secure Defaults
  • Fail Secure / Fail Safe
  • Economy of Mechanism
  • Complete Mediation

Exam lens:
If a control violates one principle to improve another, assess risk acceptance, not “right vs wrong.”

2. Security Models

Security models explain how rules are enforced, not merely defined.

Confidentiality Models

  • Bell–LaPadula – No Read Up, No Write Down
  • Used in classified / military systems

Integrity Models

  • Biba – No Read Down, No Write Up
  • Clark–Wilson – Well-formed transactions, separation of duties
  • Preferred for commercial systems

Access Control Models

  • DAC – Owner-controlled
  • MAC – Centrally controlled
  • RBAC – Role-based (enterprise default)
  • ABAC – Attribute-based (cloud-native)

Exam pattern:
Military → MAC / Bell–LaPadula
Commercial → Clark–Wilson / RBAC

3. Security Architecture Core Concepts

Trusted Computing Base (TCB)

  • All components enforcing security
  • Must be small, protected, and verifiable

Security Perimeter

  • Boundary where trust changes
  • All access must be mediated

Reference Monitor

  • Always invoked
  • Tamper-proof
  • Verifiable

4. Architecture Views & Control Placement

Security architecture must be understood across multiple views:

  • Logical architecture – Trust relationships, data flows
  • Physical architecture – Hardware, facilities, geography
  • Layered architecture – Presentation, application, data layers

CISSP rule:
Controls must be placed as close as possible to the asset, not just at the perimeter.

5. Secure Design vs Secure Implementation

  • Secure design answers what must be protected and why
  • Secure implementation answers how controls are applied

Exam bias:
CISSP penalizes design flaws more than implementation flaws.

Example:

  • Weak crypto algorithm → implementation issue
  • Storing secrets in plaintext → design failure

6. Hardware Security & Root of Trust

Security begins below the operating system.

  • Privileged vs user mode
  • Memory protection, segmentation, paging
  • ASLR, DEP, NX bit

Hardware Trust Anchors

  • TPM – Secure boot, integrity attestation
  • HSM – Key protection, cryptographic assurance

Side-Channel & Physical Attacks

  • Power analysis
  • Timing attacks
  • Fault injection

7. Cryptography Engineering

Cryptography supports:

  • Confidentiality
  • Integrity
  • Authentication
  • Non-repudiation

Key principles:

  • Approved algorithms only
  • Strong key management lifecycle
  • Separation of encryption vs hashing vs signing
  • Never roll your own crypto

8. System Components & Virtualization

Operating Systems

  • Kernel vs user mode
  • Ring architecture
  • OS hardening baselines

Virtualization & Containers

  • Type 1 vs Type 2 hypervisors
  • VM escape risks
  • Container isolation limits

Databases

  • Access control
  • Encryption
  • Auditing

9. Physical & Environmental Architecture

  • Site selection
  • Zoning
  • HVAC, fire suppression
  • Power redundancy
  • Mantraps, CCTV, guards

CISSP axiom:
Logical security collapses without physical security.

10. Evaluation, Assurance & Trust

Security ≠ Assurance.

  • Common Criteria (CC) – Evaluation framework
  • EAL levels (1–7) – Assurance depth, not security strength
  • Certification vs Accreditation
  • Assurance = confidence that controls operate as intended

Exam trap:
Higher EAL does not mean more secure—only more rigorously evaluated.

11. Supply Chain & Firmware Trust

  • Secure boot chains
  • Firmware integrity validation
  • Trusted updates and patch authenticity
  • Hardware and software supply chain risks

Why this matters:
Modern attacks bypass software and target trust foundations.

12. Vulnerabilities & Architectural Weaknesses

  • Race conditions
  • TOCTOU
  • Buffer overflows
  • Injection flaws
  • Improper error handling

Architect mindset:
Ask “How can this be abused?”, not “Does this work?”

13. Resilience, Availability & Fault Tolerance

  • Redundancy (N+1)
  • Load balancing
  • Graceful degradation
  • Failover vs fail-safe

Availability is recoverability under stress, not uptime.

14. Architecture Trade-Offs

Every design involves compromise:

  • Security vs usability
  • Security vs performance
  • Security vs cost
  • Security vs speed

CISSP expects risk-based decisions, not absolutism.

Final CISSP Domain 3 Mindset

“Security architecture is the discipline of deciding
where trust begins, where it ends,
and how failure is contained.”

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.