Site icon TheCyberThrone

CISSP Playbook – Domain 3: Security Architecture & Engineering

Advertisements

Purpose of Domain 3

Domain 3 validates your ability to design, evaluate, and reason about secure systems. It is not about tools or configurations—it is about architectural decisions that withstand failure, attack, and business pressure.

CISSP mindset:
“If security is not designed in, it will eventually be broken out.”

1. Core Security Principles

Every architectural decision must trace back to these principles.

Supporting principles:

Exam lens:
If a control violates one principle to improve another, assess risk acceptance, not “right vs wrong.”

2. Security Models

Security models explain how rules are enforced, not merely defined.

Confidentiality Models

Integrity Models

Access Control Models

Exam pattern:
Military → MAC / Bell–LaPadula
Commercial → Clark–Wilson / RBAC

3. Security Architecture Core Concepts

Trusted Computing Base (TCB)

Security Perimeter

Reference Monitor

4. Architecture Views & Control Placement

Security architecture must be understood across multiple views:

CISSP rule:
Controls must be placed as close as possible to the asset, not just at the perimeter.

5. Secure Design vs Secure Implementation

Exam bias:
CISSP penalizes design flaws more than implementation flaws.

Example:

6. Hardware Security & Root of Trust

Security begins below the operating system.

Hardware Trust Anchors

Side-Channel & Physical Attacks

7. Cryptography Engineering

Cryptography supports:

Key principles:

8. System Components & Virtualization

Operating Systems

Virtualization & Containers

Databases

9. Physical & Environmental Architecture

CISSP axiom:
Logical security collapses without physical security.

10. Evaluation, Assurance & Trust

Security ≠ Assurance.

Exam trap:
Higher EAL does not mean more secure—only more rigorously evaluated.

11. Supply Chain & Firmware Trust

Why this matters:
Modern attacks bypass software and target trust foundations.

12. Vulnerabilities & Architectural Weaknesses

Architect mindset:
Ask “How can this be abused?”, not “Does this work?”

13. Resilience, Availability & Fault Tolerance

Availability is recoverability under stress, not uptime.

14. Architecture Trade-Offs

Every design involves compromise:

CISSP expects risk-based decisions, not absolutism.

Final CISSP Domain 3 Mindset

“Security architecture is the discipline of deciding
where trust begins, where it ends,
and how failure is contained.”

Exit mobile version