This is the content of Security Architecture and engeneering of CISSP®

This domain 3 is worth 13% of the grade to be achieved

Domaine 3 of CISSP®

Content updated according to the new official programme for 2024

Description
3.1Research, implement and manage engineering processes using secure design principles
3.1.1Threat modeling
3.1.2Least privilege
3.1.3Defense in Depth
3.1.4Secure defaults
3.1.5Fail securely
3.1.6Separation of Duties (SoD)
3.1.7Keep it simple
3.1.8Zero Trust
3.1.9Privacy by design
3.1.10Trust but verify
3.1.11Shared responsibility
3.2Understand the fundamental concepts of security models (eg, Biba, Star Model, Bell-LaPadula)
3.3Select controls based upon Systems Security requirements
3.4Understand security capabilities of Information Systems (IS) (eg, memory protection, Trusted Platform Module (TPM), encryption/decryption)
3.5Assess And mitigate the vulnerabilities of security Architectures, designs and solution elements
3.5.1Client-based systems
3.5.2Server-based Systems
3.5.3Database systems
3.5.4Cryptographic systems
3.5.5Industrial Control Systems (ICS)
3.5.6Cloud-based systems (eg, Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS))
3.5.7Distributed systems
3.5.8Internet of Things (IoT)
3.5.9Microservices
3.5.10Containerization
3.5.11Serverless
3.5.12Embedded systems
3.5.13High-Performance Computing (HPC) systems
3.5.14Edge computing systems
3.5.15Virtualized systems
3.6Select and determine cryptographic Solutions
3.6.1Cryptographic lifeCycle (eg, keys, algorithm selection)
3.6.2Cryptographic methods (eg, symmetric, asymmetric, ellipticCurves, quantum)
3.6.3Public Key Infrastructure (PKI)
3.6.4Key management practices
3.6.5Digital signatures and Digital certificates
3.6.6Nonrepudiation
3.6.7Integrity (eg, hashing)
3.7Understand methods of cryptanalytic attacks
3.7.1Brute force
3.7.2Ciphertext only
3.7.3Known plaintext
3.7.4Frequency analysis
3.7.5Chosen PlainText/Ciphertext
3.7.6Implementation attacks
3.7.7Side-channel attacks
3.7.8Fault injection
3.7.9Timing
3.7.10Man-in-the-Middle (MITM)
3.7.11Pass the hash
3.7.12Kerberos exploitation
3.7.13Ransomware
3.8Apply security principles to site and facility design
3.9Design site and facility security controls
3.9.1Wiring closets/intermediate distribution facilities
3.9.2Server rooms/data centers
3.9.3Media storage facilities
3.9.4Evidence storage
3.9.5Restricted and work area security
3.9.6Utilities and Heating, Ventilation, and Air Conditioning (HVAC)
3.9.7Environmental issues
3.9.8Fire prevention, detection, and suppression
3.9.9Power (eg, redundant, backup)

Ready to Start?