TrailBlaze Adventures · CISSP Domain 4 Case

Communication and Network Security

A classroom and workshop case about secure data transmission, network zoning, remote access, wireless risks, and monitoring across TrailBlaze’s global operations.

Scenario — TrailBlaze Global Connectivity Problem

TrailBlaze Adventures depends on constant communication between customers, headquarters, remote guides, partner operators, payment services, and safety systems spread across many countries.

Its network environment includes:

Operational pressure

  • Field teams need fast and reliable access from unpredictable networks.
  • Customers expect secure booking and messaging from anywhere in the world.
  • Critical alerts and location updates must arrive without delay.
  • Regional growth increases dependence on APIs and external services.

Network concerns

  • Remote and public networks may expose traffic to interception.
  • Internal segmentation is uneven between environments and regions.
  • Some services rely on broad network trust instead of stricter access validation.
  • Visibility into partner and wireless traffic is incomplete.
Management request: “Improve TrailBlaze’s network and communication security so that global operations remain connected, monitored, and protected against interception, lateral movement, and misuse.”

Student assignment

1

Investigate the case

Analyze the TrailBlaze scenario and identify key challenges related to communication and network security.

  • Where does sensitive data travel across insecure or shared networks?
  • Which network zones need stronger separation?
  • How should remote guides and partners connect securely?
  • Which traffic needs stronger monitoring or filtering?
  • How can network design limit the impact of a compromised system?
2

Identify Domain 4 challenges

Group findings under segmentation, secure protocols, remote access, wireless security, monitoring, traffic filtering, and network architecture.

3

Link challenges to Domain 4 concepts

Connect each identified challenge to CISSP Domain 4 concepts and explain why that concept is relevant in the TrailBlaze environment.

Deliverable: A structured list of at least 10 communication and network security challenges, each linked to one or more Domain 4 concepts.

Domain 4 challenges to investigate

Network Architecture

  • Public web systems, internal tools, and partner integrations need clearer zoning.
  • Some regions use inherited network designs that do not match current risk.
  • Critical services may be reachable from broader network segments than necessary.

Data in Transit

  • Guide devices and partner systems use varied networks with different trust levels.
  • Traffic between services must be protected against interception and tampering.
  • TLS deployment and certificate assurance may differ by platform.

Monitoring & Detection

  • Network visibility is weaker for remote, wireless, and third-party traffic.
  • Security teams need stronger logging, correlation, and alerting.
  • Suspicious lateral movement may go unnoticed without segmented monitoring.

Remote Access

  • Guides and support staff connect from airports, hotels, and field locations.
  • Traditional VPN trust may be too broad for distributed operations.
  • Endpoint health and user identity should affect access decisions.

Segmentation & Containment

  • Booking, admin, payment, and support systems need stronger separation.
  • Compromise in one network zone should not expose all internal systems.
  • APIs and partner links require tighter boundaries and filtering.

Wireless & Partner Networks

  • TrailBlaze depends on Wi-Fi, mobile networks, and partner infrastructure.
  • Untrusted networks create interception and rogue-access risks.
  • Wireless usage policies and secure communication standards are inconsistent.

Link challenges to Domain 4 concepts

Students must connect each identified challenge to CISSP Domain 4 concepts.

ChallengeDomain 4 ConceptExplanation
Public and internal services are not clearly separatedSegmentation / DMZ / Network ZoningSeparating network zones limits exposure and reduces the spread of compromise.
Guides connect from untrusted networks worldwideVPN / Zero Trust Network Access / Secure Remote AccessRemote access should be encrypted and tightly controlled based on identity and device context.
Service-to-service traffic is inconsistentTLS / Encryption in TransitSensitive communications should be protected against interception and tampering across all paths.
Partner APIs increase external exposureProxying / Filtering / Secure GatewaysIntermediary controls help validate, restrict, and monitor traffic to external parties.
Remote and wireless traffic is hard to inspectMonitoring / IDS / IPS / LoggingEffective detection depends on visibility into traffic flows and suspicious patterns.
One compromised system could move laterallyContainment through SegmentationInternal segmentation and access rules reduce attacker movement across network boundaries.
Hotel or field Wi-Fi may expose communicationsWireless Security / Secure ProtocolsUntrusted wireless environments require strong encryption and safer connection patterns.
Critical alerts must remain reliableAvailability / Network ResilienceCommunication paths need reliability and redundancy for safety-related functions.
Certificate assurance varies across systemsPKI / Trust ValidationTrusted certificates and proper validation are necessary for secure network communications.
Legacy network trust is too broadModern Network Architecture / Least TrustModern designs reduce implicit trust and enforce narrower access between systems.

Learning outcomes

Outcome 1

Map communication paths

Identify where sensitive data travels and where communication channels need stronger protection.

Outcome 2

Design secure networks

Apply zoning, segmentation, and secure remote access principles to global operations.

Outcome 3

Protect traffic

Understand how secure protocols, filtering, and certificate trust protect data in transit.

Outcome 4

Improve visibility

Evaluate how monitoring and detection controls support incident response and containment.

Instructor tip

Use this case in three phases:

Phase 1

Trace

Students map network flows between users, guides, partners, and core systems.

Phase 2

Expose

Students identify weak points in segmentation, remote access, and communication security.

Phase 3

Harden

Students propose improved zoning, secure protocols, and monitoring controls.