Domain 3: Security Architecture
Chapter 10, Compare and contrast security implications of different architecture models, compares security implications in different architecture models like cloud, IaC, serverless, microservices, and network infrastructure.
Chapter 11, Given a scenario, apply security principles to secure enterprise infrastructure, focuses on applying security principles in different infrastructure scenarios including device placement, security zones, and network appliances.
Chapter 12, Compare and contrast concepts and strategies to protect data, discusses strategies and concepts for data protection including data types, classifications, and methods to secure data.
Chapter 13, Explain the importance of resilience and recovery in security architecture, highlights the importance of resilience and recovery, covering high availability, site considerations, testing, backups, and power management.