security systems, personnel and organizational sub-units, so that these
practices and processes align with the organization’s core goals and strategic
direction.
3. The Security Engineering domain contains the concepts, principles,
structures, and standards used to design, implement, monitor, and secure,
operating systems, equipment, networks, applications, and those controls
used to enforce various levels of confidentiality, integrity, and availability.
Information security architecture and design covers the practice of applying a
comprehensive and rigorous method for describing a current and/or future
structure and behavior for an organization’s security processes, information
security systems, personnel and organizational sub-units, so that these
practices and processes align with the organization’s core goals and strategic
direction.
4. The Communication and Network Security domain encompasses the
structures, transmission methods, transport formats, and security measures
used to provide confidentiality, integrity, and availability for transmissions
over private and public communications networks and media. Network
security is often described as the cornerstone of IT security. The network is a
central asset, if not the most central, in most IT environments. Loss of
network assurance (the combined properties of confidentiality, integrity,
availability, authentication, and non-repudiation) on any level can have
devastating consequences, while control of the network provides an easy and
consistent venue of attack. Conversely, a well-architected and well-protected
network will stop many attacks in their tracks.
5. Although Identity and Access Management is a single domain within the
CISSP Common Body of Knowledge (CBK), it is the most pervasive and
omnipresent aspect of information security. Access controls encompass all
operational levels of an organization:
Facilities – Access controls protect entry to, and movement around,
an organization’s physical locations to protect personnel, equipment,
information, and, other assets inside that facility.
Support Systems – Access to support systems (such as power,
heating, ventilation and air conditioning (HVAC) systems; water; and
fire suppression controls) must be controlled so that a malicious entity
is not able to compromise these systems and cause harm to the
organization’s personnel or the ability to support critical systems.
Information systems – Multiple layers of access controls are