CISSP Domain 1: Security and Risk Management
- Home
- IT Certifications Hub
- ISC2 Certifications
- ISC2 CISSP Certification: Security Leadership Credential & Career Guide 2026
- CISSP Study Guide — Interactive Domain Lessons
- CISSP Domain 1: Security and Risk Management
Domain 1: Security and Risk Management
The foundation everything else sits on. Master the managerial mindset that separates a CISSP from a technician.
Eight Ideas That Drive Every Question
These concepts appear across almost every Domain 1 question. Know them cold.
CIA + AN
The 5 security objectives every control maps back to
"Your CEO asks: what are we actually protecting? This is the answer. Every firewall rule, every policy, every access control exists to serve one of these five."
Deep dive in 1.2 Security Concepts →Risk Analysis
Threats x Vulnerabilities x Impact. The central decision mechanism.
"The CFO won't approve your budget because you said 'we need better security.' Run the numbers: what's the asset worth, how likely is the threat, what's the annual loss? Now you're speaking their language."
Deep dive in 1.9 Risk Management →Due Care vs. Diligence
Care = doing what's reasonable. Diligence = verifying it works.
"You installed a firewall (due care). You tested it quarterly and reviewed the logs (due diligence). If you skip the second part and get breached, that's negligence — even though you bought the tool."
Deep dive in 1.3 Security Governance →Policy Hierarchy
Business objectives drive policies drive standards drive procedures
"Teams are using 3 different encryption methods because nobody wrote a standard. The fix isn't mandating AES-256 — it's writing the policy first, then deriving the standard from it. Top down, never bottom up."
Deep dive in 1.6 Security Policy →BIA
Identifies critical functions, acceptable downtime, recovery priorities
"The data center is down. What gets restored first — email or payment processing? The BIA already answered this. Business decides what's critical, IT decides how to recover it."
Deep dive in 1.7 Business Continuity →Threat Modeling
STRIDE (software), OCTAVE (org), VAST (agile)
"Your dev team uses STRIDE to find app-level threats. Your CISO uses OCTAVE to assess enterprise risk. Different scopes, different frameworks — the exam tests whether you know which fits where."
Deep dive in 1.10 Threat Modeling →SCRM
Supply chain: SBOMs, silicon root of trust, vendor assessment
"Your SaaS vendor can't tell you what open-source libraries are in their product. No SBOM means you can't assess component-level vulnerabilities. Your security is only as strong as your weakest supplier."
Deep dive in 1.11 Supply Chain Risk →Quantitative Risk
SLE = AV x EF | ALE = SLE x ARO
"A $200K server with 25% exposure to fire, fires once every 4 years. SLE = $50K, ALE = $12,500. If a suppression system costs $10K/year and cuts risk 80%, the math says buy it. This is how CISOs justify budgets."
Try the Risk Calculator →See It, Don't Just Read It
Interactive diagrams for the concepts that show up in every practice exam.
The 5 Pillars of Information Security
Documentation Hierarchy — What Drives What
Interactive practice — Coming Soon
TJS Platform will have drag-and-drop ordering, matching exercises, and scenario branching for every domain.
Find Out Where to Start
Now that you've seen the landscape, let's find out where you stand. 5 questions across Domain 1 — see which subtopics need the most work.
Focus on these subtopics
You've got these
12 Subtopics — Pick Your Path
Each lesson teaches through real scenarios — concept, textbook, hard choice, exam signal. Start anywhere or go in order. Completed lessons show a checkmark.
Four canons in priority order. When your employer and society conflict, society wins.
CIA plus Authenticity and Nonrepudiation. The exam tests all five, not three.
Align security with business objectives. Due care is action, due diligence is verification.
GDPR, CCPA, Schrems II, transborder data flow. The strongest scenario content in Domain 1.
Administrative, criminal, civil, and regulatory investigations. Chain of custody and evidence handling.
Policy hierarchy: objectives drive policies drive standards drive procedures. Never backwards.
BIA, RPO, RTO, MTD. Know which metric answers which business question.
Hiring, termination, separation of duties, mandatory vacation. People are the biggest risk vector.
SLE, ALE, MATA. Where finite resources get allocated. You will calculate these on exam day.
STRIDE for software, OCTAVE for organizations, VAST for agile. Know which model fits which context.
SBOMs, silicon root of trust, vendor assessment. Expanded in the 2024 exam update.
Awareness changes behavior, training builds skills, education provides understanding. Different goals, different methods.
Learn It, Test It, Lock It In
Each card has 3 layers. Click to advance: mnemonic → scenario challenge → answer + exam tip.
A developer digitally signs a code release. Which pillar proves they can’t deny signing it?
Nonrepudiation — the N in “CIA Agents Never rest.” Digital signatures provide integrity + authenticity + nonrepudiation. MFA only gives authenticity.
Teams are using 3 different encryption methods. The CTO says “mandate AES-256 everywhere.” What should you create FIRST?
An encryption policy — the P in the hierarchy. Business objectives → Policies → Standards → Procedures → Guidelines. Always top-down, never technology first.
Your employer is secretly collecting user data beyond the privacy policy. Canon III says serve your employer. Canon I says protect society. Which wins?
Canon I always wins. Society → Honor → Service → Profession. When canons conflict, higher beats lower. No exceptions. Escalate through proper channels.
A vulnerability has an ALE of $75K. The only fix costs $100K/year. What should you do?
Accept the risk (the A in MATA) or find a cheaper compensating control. Mitigate, Accept, Transfer, Avoid. A control should never cost more than the loss it prevents. $100K to save $75K = bad business.
Your org is shifting to Agile with 2-week sprints. You need threat modeling that integrates into sprint planning. Which framework?
VAST — Visual, Agile, Simple Threat modeling. STRIDE is for software (developers). OCTAVE is for enterprise risk (management). VAST is designed for Agile/DevOps with outputs for both devs and executives.
An earthquake hits your data center. What is your absolute FIRST priority: activate the DR site, assess server damage, or ensure employee safety?
Ensure employee safety. People first, always. No server, no contract, no SLA is worth a human life. Activate DR after everyone is safe. Assess damage after that.
Risk Formulas (Memorize)
ALE = SLE × ARO
Control justified when: Cost < (ALEbefore − ALEafter)
The 50/50 Rule — Exam Strategy
Eliminate 2 obviously wrong answers. Between the remaining 2, choose the one that is more managerial, more governance-focused, or more encompassing.
The CISSP Tests How You Decide
Corporate Merger
- ×Run a vulnerability scanTechnical before business context
- ×Conduct a penetration testPremature, possibly illegal
- ×Merge Active Directory domainsImplementation detail
- ✓Perform a comprehensive risk analysisUnderstand what you're inheriting before spending resources.
Inconsistent Encryption
- ×Mandate AES-256 everywhereRight tech, wrong approach
- ×Shut down custom encryptionReactive, no root cause
- ×Hire a crypto consultantDoesn't fix governance gap
- ✓Develop enterprise-wide encryption policyThe problem is absent policy, not wrong algorithm.
Data Center Earthquake
- ×Activate DR siteNot first
- ×Assess server damageProperty after safety
- ×Contact insuranceFinancial comes later
- ✓Ensure employee safetyHuman life supersedes everything.
Adaptive practice drills — Coming Soon
TJS Platform will track your weak areas and generate focused drills. AI Study Buddy will explain why you got it wrong.
The Tempting Wrong Answer
Thinking like a technician
Exam wants the managerially appropriate solution.
Fixing problems not processes
Address the process failure, not the symptom.
Technology before policy
No policy → adding tech = adding unmanaged tech.
Trying to eliminate risk
"Eliminate the risk" is always wrong. Goal: acceptable level.
Overlooking human safety
Human life supersedes financial, operational, and technical.
Missing the umbrella answer
When all seem right, pick the one that encompasses the others.
Risk Formula Calculator
Plug in your own values. See ALE and cost-benefit computed live.
Calculate ALE & Control Cost-Benefit
Control Cost-Benefit Analysis
5 Practice Scenarios
Select an answer, then click Check. Full adaptive quiz engine with 200+ questions coming soon on TJS Platform.
- A Yes — $15k < SLE of $50k
- B Yes — $15k cost < $20k ALE reduction
- C No — doesn't eliminate risk
- D No — residual risk exceeds cost
ALE = $25k. Control reduces to $5k. Saves $20k at $15k cost.
- A Automated pipeline with gates
- B Discipline the developers
- C Check if change management policy exists and is communicated
- D Risk-assess deployed apps
Verify governance foundation before enforcement. No policy = nothing to enforce.
- A Move all data to EU servers
- B Implement SCCs with supplementary measures
- C Obtain consent from each EU customer
- D Encrypt at rest — risk mitigated
SCCs are the established post-Schrems II mechanism for lawful EU–US transfers.
- A Resign to avoid liability
- B Prioritize protecting society, escalate through channels
- C Follow employer per Canon III
- D Report anonymously
Canon I (society) trumps Canon III (service). Higher canon wins.
- A Outdated UI frameworks
- B Can't assess component-level vulnerability exposure
- C Pricing not transparent
- D No DR plan
No SBOM = blind spot in supply chain vulnerability assessment.
Continue Your Prep
Choose how you want to study. All paths lead to the same goal — passing the CISSP on exam day.
All 8 domains, 200+ adaptive questions, AI Study Buddy, timed exams, and certificate of completion.
Printable desk reference with key concepts, mnemonics, and quick-reference tables for all 8 domains.
Domain 1 key concepts on one page. Mnemonics, traps, and the formulas you need to memorize.
Stay Current on Certifications
Get updates when salary data, exam changes, or new cert guides are published.