This domain covers the fundamental principles and practices for designing, implementing, and managing secure systems. It's crucial for CISSPs as it lays the groundwork for all other security domains. Here's a breakdown of the key areas:
1. Security and Risk Management:
- Security Governance: This involves establishing a framework for security decision-making, including policies, standards, procedures, and guidelines. It also covers roles and responsibilities, risk appetite, and compliance. Key concepts include:
- Compliance: Demonstrating adherence to laws, regulations, and industry standards. This involves audits, assessments, and reporting.
- Business Continuity and Disaster Recovery (BC/DR): Planning for disruptions and ensuring business operations can continue or be restored quickly. Key aspects include:
2. Engineering Life Cycle:
- Secure Software Development Lifecycle (SSDLC): Integrating security into every stage of software development, from requirements gathering to testing and deployment. Key practices include:
- Change Management: Controlling changes to systems and infrastructure to minimize the risk of introducing new vulnerabilities or disrupting operations.
- Configuration Management: Maintaining a consistent and secure configuration for systems and devices.
3. Security Architecture Models and Concepts:
- Defense in Depth: Implementing multiple layers of security controls to protect assets.
- Least Privilege: Granting users only the minimum necessary access rights.
- Separation of Duties: Dividing sensitive tasks among multiple individuals to prevent fraud and errors.
- Fail-Safe Defaults: Designing systems to fail securely in case of an error or attack.
- Economy of Mechanism: Keeping security mechanisms simple and easy to understand and manage.
- Open vs. Closed Systems: Understanding the security implications of different system architectures.
- Security Domains: Dividing a network into smaller, more manageable security zones.
- Trusted Computing Base (TCB): The hardware and software components that are responsible for enforcing security policies.
4. Security Evaluation and Assurance:
- Vulnerability Scanning: Using automated tools to identify known vulnerabilities in systems and applications.
- Penetration Testing: Simulating real-world attacks to identify security weaknesses.
- Security Audits: Reviewing security controls and practices to ensure compliance and effectiveness.
- Certification and Accreditation: Formal processes for evaluating and approving systems.
5. Security in IT Operations:
- Data Security: Protecting data throughout its lifecycle, including data at rest, in transit, and in use. Key concepts include:
- Network Security: Protecting network infrastructure from unauthorized access and attacks. Key components include:
- Endpoint Security: Protecting individual devices (laptops, desktops, mobile devices) from malware and other threats.
- Cloud Security: Securing data and applications in cloud environments. Key considerations include:
- Physical Security: Protecting physical assets from unauthorized access, theft, and damage.
- Incident Response: Handling security incidents in a timely and effective manner.
Key Study Tips for Domain 3:
- Focus on the "why" behind security controls. Don't just memorize definitions; understand how different concepts relate and how they contribute to overall security.
- Think like a manager. The CISSP exam emphasizes risk management and decision-making. Be prepared to evaluate different security options and choose the best course of action based on risk and business impact.
- Understand the software development lifecycle and secure coding practices. This is a critical area for the exam.
- Be familiar with different security architectures and models. Defense in depth, least privilege, and separation of duties are fundamental concepts.
- Stay up-to-date on the latest security threats and vulnerabilities. The security landscape is constantly evolving, so continuous learning is essential.