SecurityCAS-004

CASP+ Advanced Security: Enterprise Architecture, Risk, and Incident Response

CASP+ (CompTIA Advanced Security Practitioner, now branded SecurityX) is the expert-level counterpart to Security+. Where Security+ asks what controls exist, CASP+ asks which control you choose for a specific enterprise context — and how you implement, integrate, and validate it. This exam is built for senior security engineers and architects who move beyond identifying threats to designing resilient enterprise security programmes. If you hold Security+ and want to prove operational depth without moving into management (like CISSP), CASP+ is your path.

13 min
5 sections · 10 exam key points

Enterprise Security Architecture and Design Principles

CASP+ expects you to design security architectures that balance risk, business requirements, and technical constraints. Key frameworks: SABSA (Sherwood Applied Business Security Architecture) — a risk-driven framework that starts with business attributes and derives security requirements top-down; TOGAF (The Open Group Architecture Framework) — enterprise architecture framework used to align IT and security with business goals; DoDAF (Department of Defense Architecture Framework) — used in government and defence contexts. Zero Trust Architecture: verify every user, device, and connection regardless of network location. Components: identity provider (MFA-enforced), device posture assessment (MDM compliance), micro-segmentation (east-west traffic control), continuous monitoring (UEBA, SIEM). Software-defined perimeter (SDP) implements Zero Trust by making the network invisible to unauthorised users — you cannot attack what you cannot see.

Cryptography and PKI Implementation

CASP+ tests practical cryptography implementation decisions. Algorithm selection: AES-256-GCM for symmetric encryption (GCM mode provides authenticated encryption — integrity built in), RSA-4096 for key exchange and signatures (being replaced by ECC in modern systems), ECDSA/ECDH for elliptic-curve operations (same security as RSA with smaller key sizes — critical for IoT and mobile), SHA-256 minimum for hashing (SHA-1 deprecated, MD5 broken). PKI architecture for enterprises: root CA (offline, hardware security module, air-gapped), intermediate CA (online, issues end-entity certificates), OCSP stapling (real-time certificate validity without privacy leakage), certificate transparency logs (public audit trail of issued certificates, prevents mis-issuance). Key management: HSMs protect private keys at rest, key escrow enables recovery, key ceremony documents key generation procedures, certificate lifecycle management automates renewal before expiry.

Vulnerability and Threat Management at Enterprise Scale

Enterprise vulnerability management is not just running a scanner — it is a programme with defined policies, SLAs, exception processes, and executive reporting. Phases: Asset discovery (know your attack surface — passive network scanning, CMDB integration, cloud asset APIs), Vulnerability scanning (authenticated scans for accurate results, CVSS scoring, false positive triage), Risk prioritisation (CVSS + threat intelligence + asset criticality = risk score — CISA KEV list for actively exploited vulnerabilities), Remediation (patching, compensating controls, risk acceptance with documentation), Verification (rescan to confirm fix). Threat modelling methodologies: STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege — good for application design), PASTA (Process for Attack Simulation and Threat Analysis — risk-centric, business impact focus), ATT&CK-based threat modelling (map controls to adversary TTPs).

Security Operations and Incident Response

At the CASP+ level, incident response is about building and running a programme, not just following a checklist. IR programme components: IR policy (legal authority and scope), IR plan (high-level process and roles), IR procedures (step-by-step for specific incident types — malware, data breach, insider threat), playbooks (automated or semi-automated response workflows in SOAR platforms). NIST SP 800-61 IR lifecycle: Preparation > Detection and Analysis > Containment, Eradication, and Recovery > Post-Incident Activity. Evidence handling: chain of custody documentation from first responder onwards, forensic imaging (dd or FTK Imager — bit-for-bit copy, hash-verified), memory acquisition before shutdown (volatile data: running processes, network connections, encryption keys in RAM), legal hold procedures. Threat hunting: hypothesis-driven search for adversaries that bypassed automated detection, using TI feeds, anomaly baselines, and ATT&CK TTPs as hunting hypotheses.

Cloud Security and Emerging Technology Risks

CASP+ covers cloud security at an architectural depth: shared responsibility matrix (IaaS — you own OS and above; PaaS — you own application and data; SaaS — you own identity and data configuration), cloud security posture management (CSPM — continuously checks cloud resource configs against benchmarks), cloud workload protection platforms (CWPP — runtime protection for VMs, containers, serverless), CASB (Cloud Access Security Broker — visibility and control for SaaS shadow IT). Container security: image scanning (registry vulnerability scan before deployment), runtime protection (Falco, Aqua — detect anomalous syscalls), Kubernetes RBAC (ClusterRole and ClusterRoleBinding), network policies (namespace isolation, pod-to-pod traffic control), secrets management (HashiCorp Vault, Kubernetes Secrets with encryption at rest). IoT security risks: default credentials, unencrypted protocols, long patch cycles, physical tampering — remediate with network segmentation, firmware verification, and certificate-based authentication.

Key exam facts — CAS-004

  • SABSA derives security requirements from business attributes top-down
  • Zero Trust: verify every connection — identity, device posture, and authorisation before access
  • AES-256-GCM provides authenticated encryption (confidentiality + integrity in one operation)
  • CASP+ IR uses NIST 800-61: Prepare, Detect/Analyse, Contain/Eradicate/Recover, Post-Incident
  • CSPM checks cloud configuration continuously; CWPP protects workloads at runtime
  • CVSS score + threat intelligence + asset criticality = risk-based vulnerability priority
  • Forensic memory acquisition must occur before powering down (volatile data lost on shutdown)
  • PKI: offline root CA + online intermediate CA + OCSP stapling for scalable certificate validation
  • STRIDE covers: Spoofing, Tampering, Repudiation, Information Disclosure, DoS, Elevation of Privilege
  • Kubernetes RBAC and network policies are primary container security controls

Common exam traps

CASP+ is just an advanced version of Security+ with harder questions

CASP+ is a performance-based exam testing architectural decision-making in enterprise contexts. It requires selecting and justifying controls for specific scenarios, not just identifying that a control exists.

CVSS score alone determines remediation priority

CVSS measures severity in isolation. Real priority requires CVSS + exploitability (is it in KEV?), asset criticality (prod vs dev?), and compensating controls already in place.

Container security is handled by the underlying OS security

Containers share the host kernel, so OS hardening helps, but containers introduce additional attack surfaces: image vulnerabilities, misconfigured RBAC, inter-pod network paths, and secret exposure. Each layer needs its own controls.

Encrypting data at rest protects against all data breach scenarios

Encryption at rest protects against physical theft of storage media. It does not protect against breaches through running applications, compromised keys, or insider access with valid credentials.

Practice this topic

Test yourself on CASP+ Advanced Security

JT Exams routes you to questions in your exact weak areas — automatically, after every session.

No credit card · Cancel anytime

Related certification topics