Back to Domains
🏗️Domain 3

Security Architecture and Engineering

13%Exam Weight
10Subdomains
3.1

Research, implement and manage engineering processes using secure design principles

Key Concepts

Threat modelingLeast privilegeDefense in depthSecure defaultsFail securelySegregation of DutiesKeep it simpleZero trustPrivacy by designShared responsibilitySASE
3.2

Understand the fundamental concepts of security models

Key Concepts

BibaStar ModelBell-LaPadula
3.3

Select controls based upon systems security requirements

Key Concepts

Control selectionSecurity requirements
3.4

Understand security capabilities of Information Systems

Key Concepts

Memory protectionTPMEncryption/decryption
3.5

Assess and mitigate vulnerabilities of security architectures

Key Concepts

Client-based systemsServer-based systemsDatabase systemsCryptographic systemsICSCloud-based systemsDistributed systemsIoTMicroservicesContainerizationServerlessEmbedded systemsHPCEdge computingVirtualized systems
3.6

Select and determine cryptographic solutions

Key Concepts

Cryptographic life cycleKeysAlgorithm selectionSymmetricAsymmetricElliptic curvesQuantumPKI
3.7

Understand methods of cryptanalytic attacks

Key Concepts

Brute forceCiphertext onlyKnown plaintextFrequency analysisChosen ciphertextImplementation attacksSide-channelFault injectionTimingMITMPass the hashKerberos exploitationRansomware
3.8

Apply security principles to site and facility design

Key Concepts

Site designFacility design
3.9

Design site and facility security controls

Key Concepts

Wiring closetsServer roomsData centersMedia storageEvidence storageRestricted areasHVACEnvironmental issuesFire suppressionPower redundancy
3.10

Manage the information system lifecycle

Key Concepts

Requirements analysisArchitectural designDevelopmentIntegrationVerificationValidationDeploymentOperationsMaintenanceRetirementDisposal