Explain CIA triad in the context of CSSLP. define the CIA triad and explain why each element matters to secure software. (Domain 1)
Confidentiality prevents unauthorized disclosure; Integrity prevents unauthorized alteration; Availability ensures timely, reliable access. All three must be balanced across the SDLC.
Explain Authentication, Authorization, and Accounting and how they relate to accountability. (Domain 1)
Authentication confirms identity; Authorization grants permitted actions; Accounting records activity. Together they enable traceable, responsible system use.
Explain Non-repudiation in the context of CSSLP. describe non‑repudiation and how a software system can provide it. (Domain 1)
It ensures a party cannot deny an action. Achieved via strong identity binding and tamper‑evident logs or signatures with time correlation.
Explain Security models overview in the context of CSSLP. differentiate Bell‑LaPadula, Biba, and Clark‑Wilson at a high level. (Domain 1)
Bell‑LaPadula prioritizes confidentiality; Biba prioritizes integrity; Clark‑Wilson enforces integrity with well‑formed transactions and separation of duties.
Explain Design principles in the context of CSSLP. list and explain the purpose of least privilege and separation of duties. (Domain 1)
Least privilege limits permissions to the minimum necessary; separation of duties splits critical tasks to reduce fraud or error.
Explain defense‑in‑depth and give a simple example in an application. (Domain 1)
Multiple independent controls at different layers; e.g., input validation, parameterized queries, and WAF together against injection.
Explain Fail‑safe defaults in the context of CSSLP. define fail‑safe defaults and when they are most important. (Domain 1)
Systems should default to deny on failure or uncertainty, critical during errors and outages to avoid unintended access.
Explain open design vs. security by obscurity. (Domain 1)
Security should not depend on secrecy of design; rely on proven mechanisms and protect secrets like keys, not algorithms.
Explain Complete mediation in the context of CSSLP. describe complete mediation in access control. (Domain 1)
Every access to every object is checked each time to prevent stale or bypassed authorizations.
Explain psychological acceptability and its effect on control bypass. (Domain 1)
Usable controls reduce workarounds; security that aligns with user workflow is more likely to be followed.
Explain the weakest‑link concept and its implication for testing. (Domain 1)
Overall security equals the least secure part, so testing must include low‑visibility components and processes.
Explain Risk concepts in the context of CSSLP. define risk, threat, vulnerability, and impact in the software context. (Domain 1)
Risk is the potential for loss when a threat exploits a vulnerability causing impact to objectives.
Explain Security objectives vs requirements in the context of CSSLP. differentiate security objectives and security requirements. (Domain 1)
Objectives express desired protection outcomes; requirements specify verifiable conditions to meet those outcomes.
Explain trust vs assurance in software. (Domain 1)
Trust is confidence in a component; assurance is evidence that the trust is justified (e.g., process rigor, testing).
Explain Secure session management in the context of CSSLP. describe key properties of secure session management. (Domain 1)
Strong token entropy, rotation, timeout, binding to context, and invalidation on logout or privilege change.
Explain Data states in the context of CSSLP. identify data states and why they matter. (Domain 1)
Data at rest, in transit, and in use; each state requires tailored protections within the SDLC.
Explain the role of organizational policy in software projects. (Domain 1)
Policy defines required behaviors and controls; projects derive standards, procedures, and requirements from it.
Explain Threat landscape awareness in the context of CSSLP. describe why understanding the current threat landscape matters to teams. (Domain 1)
It informs prioritized requirements, testing focus, and design trade‑offs during planning and sprints.
Explain Security vs safety in the context of CSSLP. contrast security with safety in software systems. (Domain 1)
Security defends against intentional misuse; safety protects against accidental harm. Some controls serve both.
Explain why measuring security outcomes helps in the SDLC. (Domain 1)
Metrics reveal trends, validate control effectiveness, and guide improvement activities.
Describe CIA triad in the context of CSSLP. define the CIA triad and explain why each element matters to secure software. (Domain 1)
Confidentiality prevents unauthorized disclosure; Integrity prevents unauthorized alteration; Availability ensures timely, reliable access. All three must be balanced across the SDLC.
Describe AAA in the context of CSSLP. explain Authentication, Authorization, and Accounting and how they relate to accountability. (Domain 1)
Authentication confirms identity; Authorization grants permitted actions; Accounting records activity. Together they enable traceable, responsible system use.
Describe non‑repudiation and how a software system can provide it. (Domain 1)
It ensures a party cannot deny an action. Achieved via strong identity binding and tamper‑evident logs or signatures with time correlation.
Describe Security models overview in the context of CSSLP. differentiate Bell‑LaPadula, Biba, and Clark‑Wilson at a high level. (Domain 1)
Bell‑LaPadula prioritizes confidentiality; Biba prioritizes integrity; Clark‑Wilson enforces integrity with well‑formed transactions and separation of duties.