CISSP Domain 3 · Teaching Web Page

Security Architecture and Engineering

Designing and building secure systems using models, cryptography, trusted components, and resilient architectures.

Domain introduction

This domain focuses on designing and engineering secure systems. It includes security models, cryptographic systems, hardware protections, and architectural principles such as defense in depth and least privilege.

For ICT students, the key insight is that security must be embedded in system design from the beginning rather than added afterward as a patch or workaround.

Outcome 1

Secure design

Apply architectural principles to build systems that resist attacks.

Outcome 2

Cryptography

Understand how encryption and hashing protect data.

Outcome 3

System trust

Identify trusted components and enforce boundaries.

Figures and mental models

Defense in depth

PerimeterFirewalls and gateways filtering traffic
NetworkSegmentation and monitoring controls
HostHardening and endpoint protection
ApplicationSecure coding and validation
DataEncryption and integrity checks

CIA in architecture

ConfidentialityEncryption and access control mechanisms protect sensitive data from unauthorized disclosure.
IntegrityValidation, hashing, and controls ensure data remains accurate and unaltered.
AvailabilityRedundancy and failover systems ensure continuous access to services.

Case examples

Case 1 — Secure banking system

A banking platform must protect financial transactions and sensitive customer data.

  • Controls: encryption, strong authentication, logging, and secure architecture.
  • Design: layered security and strict separation of components.

Case 2 — IoT environment

Smart devices communicate over insecure networks.

  • Risk: weak firmware security and lack of updates.
  • Controls: secure boot, encryption, and device isolation.

Glossary — 50 core terms

#TermDefinition
1Security ArchitectureStructured design of security controls across systems, networks, and applications to ensure consistent protection aligned with organizational policies and risk management objectives.
2Security EngineeringDiscipline that applies engineering principles to design, implement, and maintain secure systems capable of resisting attacks while meeting performance and reliability requirements.
3Defense in DepthSecurity strategy that uses multiple layers of controls so that failure of one mechanism does not result in complete system compromise.
4Security ModelFormal representation of security policies that defines how subjects access objects while maintaining confidentiality, integrity, or other security goals.
5Trusted Computing BaseSet of hardware, software, and controls responsible for enforcing security policy and therefore must be protected from tampering or compromise.
6Reference MonitorConcept ensuring every access request is validated against security policy and that the mechanism enforcing it is tamper-proof and always invoked.
7Security KernelCore component of an operating system that implements access control and enforces security policies reliably and securely.
8Bell-LaPadulaSecurity model focused on confidentiality that prevents unauthorized data disclosure by restricting read and write operations across classification levels.
9Biba ModelIntegrity-focused model that prevents data corruption by restricting how subjects read and write information based on integrity levels.
10Clark-Wilson ModelIntegrity model that enforces well-formed transactions and separation of duties to ensure data remains accurate and consistent.
11CryptographyPractice of securing information using mathematical techniques such as encryption and hashing to ensure confidentiality, integrity, and authenticity.
12Symmetric EncryptionEncryption method using a single shared key for both encryption and decryption, providing efficient protection for large amounts of data.
13Asymmetric EncryptionEncryption method using a public and private key pair, commonly used for secure key exchange and digital signatures.
14Hash FunctionMathematical function that converts data into a fixed-length value used to verify data integrity without revealing original content.
15Digital SignatureCryptographic mechanism that verifies authenticity and integrity of data using private key encryption and public key verification.
16PKIPublic Key Infrastructure manages digital certificates and keys to support secure communication and identity verification across systems.
17Certificate AuthorityTrusted organization that issues and manages digital certificates linking public keys with identities.
18Secure BootProcess ensuring that only trusted and verified software is loaded during system startup to prevent malware execution.
19TPMHardware component that securely stores cryptographic keys and supports platform integrity verification mechanisms.
20HSMDedicated hardware device that securely generates, stores, and manages cryptographic keys while performing encryption operations.
21Least PrivilegePrinciple that users and systems should only be granted permissions necessary to perform their tasks, reducing potential damage from misuse.
22Zero TrustSecurity model requiring continuous verification of identity and context, assuming no implicit trust based on network location.
23VirtualizationTechnology allowing multiple virtual systems to run on a single physical machine, requiring isolation to maintain security.
24HypervisorSoftware layer that manages virtual machines and ensures separation between them to prevent cross-VM attacks.
25ContainersLightweight virtualization method packaging applications and dependencies, requiring isolation and runtime security controls.
26SandboxingTechnique for executing code in a restricted environment to prevent it from affecting the rest of the system.
27Memory ProtectionMechanism that isolates process memory spaces to prevent unauthorized access or modification by other processes.
28ASLRSecurity technique that randomizes memory addresses to make exploitation of vulnerabilities more difficult.
29Fault ToleranceCapability of a system to continue operating despite failures in hardware or software components.
30RedundancyDuplication of system components or data to improve reliability and availability in case of failure.
31ResilienceAbility of a system to recover quickly from disruptions and maintain essential operations.
32Secure DesignApproach that integrates security considerations into system architecture from the beginning of development.
33Secure HardwareHardware designed to resist tampering, unauthorized access, and physical attacks.
34Embedded SystemsSpecial-purpose computing systems requiring security controls tailored to limited resources and specific operational contexts.
35ICSIndustrial Control Systems manage industrial processes and require high availability and specialized security protections.
36SCADASupervisory Control and Data Acquisition systems monitor and control large-scale industrial operations and infrastructure.
37IsolationSeparation of systems or components to prevent unauthorized interaction or spread of compromise.
38AbstractionDesign principle that simplifies complex systems by separating layers, aiding security management and control.
39Platform SecurityProtection of operating systems, firmware, and hardware to ensure a trusted computing environment.
40Trusted PathSecure communication channel between user and system for sensitive operations such as authentication.
41Secure FirmwareFirmware designed with protections against unauthorized modification or exploitation.
42Side-Channel AttackAttack exploiting physical characteristics like timing or power consumption to extract sensitive information.
43Trusted ComputingConcept ensuring systems operate as expected by verifying integrity of hardware and software components.
44Secure PrinciplesGuidelines such as least privilege and defense in depth used to design secure systems.
45Fail SecureSystem behavior that defaults to a secure state when a failure occurs.
46Security BoundaryLogical or physical separation that defines trust limits between systems or components.
47Root of TrustTrusted component that establishes the basis for system security and integrity verification.
48Secure Architecture PatternReusable design solutions addressing common security challenges within system architectures.
49Threat ModelingProcess of identifying and evaluating potential threats during system design.
50Attack SurfaceTotal set of points where an attacker can attempt to exploit vulnerabilities within a system.

Review questions

  1. Why is defense in depth more effective than a single security control?
  2. How do confidentiality and integrity models differ?
  3. What role does cryptography play in system design?
  4. Why is hardware-based security important?
  5. How does secure design reduce long-term risk?