Objective 3.2Medium9 min

Failure Modes

Understanding fail-open versus fail-closed configurations for security devices. Covers the security implications of device failure behavior, when to use each mode, and how to balance security with availability requirements.

Understanding Failure Modes

When security devices fail, they must choose: continue allowing traffic (fail-open) or block all traffic (fail-closed). This decision has profound implications for both security and availability.

Failure mode options:Fail-open (fail-safe) — Device failure allows traffic to continue • Fail-closed (fail-secure) — Device failure blocks all traffic

In 2018, a major airline's firewall failure was configured to fail-open, allowing unrestricted traffic for several hours. While this maintained operations, it exposed their network to potential attacks during that window—a calculated business risk that prioritized availability over security.

The right choice depends on what's being protected and the business context. Security-critical systems typically fail-closed; availability-critical systems may fail-open.

Why This Matters for the Exam

Failure modes are tested on SY0-701 because every inline security device needs a failure plan. Questions cover when to use each mode and understanding the trade-offs.

Understanding failure modes helps with security architecture, disaster recovery, and risk management. The wrong failure mode can cause either security breaches or business outages.

The exam tests scenario-based decisions about which failure mode is appropriate.

Deep Dive

What Is the Difference Between Fail-Open and Fail-Closed?

Fail-Open vs Fail-Closed
Fail-Open (Availability Priority)
Traffic
Firewall
FAILED
Passes
Traffic continues • Security gap
Fail-Closed (Security Priority)
Traffic
Firewall
FAILED
Blocked
Traffic stops • No security gap
Life safety → Fail-open • Financial/classified → Fail-closed

When Should Each Failure Mode Be Used?

Use Fail-Open When:

ScenarioReason
Hospital networkPatient care requires connectivity
Emergency services911 systems must function
Life safety systemsFire alarms must communicate
E-commerce during peakRevenue loss exceeds risk

Use Fail-Closed When:

ScenarioReason
Financial transactionsSecurity breach costs more than downtime
Classified networksData protection is paramount
Payment processingPCI compliance requires protection
Critical infrastructureAttack could cause physical harm

How Do Different Security Devices Handle Failure?

Device Failure Behaviors:

DeviceTypical DefaultReason
FirewallFail-closedSecurity boundary must hold
IPS (inline)ConfigurableDepends on environment
IDS (passive)N/ANot inline, no traffic impact
Load balancerFail-openAvailability focused
Proxy serverFail-closedSecurity inspection required
WAFConfigurableBalance security/availability
IPS Failure Mode Considerations
Fail-Open IPS
• Attack detection stops
• Traffic continues
• Attacker has window
Fail-Closed IPS
• All traffic stops
• No attacks possible
• Business impact immediate
Life safety → Fail-open • Financial data → Fail-closed

What Are Fail-Safe vs Fail-Secure in Physical Security?

These terms have opposite meanings in physical vs network security contexts:

Physical Security:

  • Fail-safe = Door unlocks when power fails (allows exit for fire safety)
  • Fail-secure = Door locks when power fails (keeps intruders out)

Network Security:

  • Fail-open ≈ Fail-safe (traffic flows)
  • Fail-closed ≈ Fail-secure (traffic blocked)

Physical Security Examples:

DeviceFail-SafeFail-Secure
Emergency exitUnlocks (egress)N/A for exits
Server room doorN/AStays locked
Perimeter gateVariesStays locked
Mantrap inner doorN/AStays locked

How Do You Mitigate Failure Mode Risks?

For Fail-Open Systems:

MitigationPurpose
RedundancyFailover to backup device
MonitoringDetect failure immediately
Automatic failoverMinimize exposure window
Incident proceduresRapid response plan

For Fail-Closed Systems:

MitigationPurpose
High availabilityRedundant devices
Hot standbyImmediate failover
Out-of-band managementAccess when primary down
Change proceduresPrevent misconfiguration
Redundancy Eliminates the Dilemma
Without Redundancy
[Device fails]
Choose: fail-open OR fail-closed
With Redundancy
[Device 1 fails]
[Device 2 takes over]
No failure mode triggered
Best answer is often "add redundancy" to avoid choosing between security and availability

What Factors Determine Failure Mode Selection?

Decision Framework:

FactorFail-OpenFail-Closed
Data sensitivityLowHigh
Compliance requirementsFlexibleStrict
Availability SLAHigh (99.99%+)Lower acceptable
Recovery timeCan waitMust be instant
Business impact of outageSevereManageable
Security breach impactManageableSevere

How CompTIA Tests This

Example Analysis

Scenario: A hospital network has an inline IPS protecting both the patient records system and the life-critical monitoring systems in the ICU. The IPS experiences a hardware failure. How should the failure mode be configured?

Analysis - Fail Mode Decision:

Conflicting Requirements:

SystemRequirementIdeal Fail Mode
Patient recordsHIPAA complianceFail-closed
ICU monitorsLife safetyFail-open

The Problem:

  • Single IPS protecting both systems creates impossible choice:
  • Fail-closed: ICU monitors lose connectivity → patient safety risk
  • Fail-open: Patient records exposed → HIPAA violation

Proper Architecture Solution:

Segmented Failure Mode Architecture
ICU Monitors
IPS - Fail-Open
Critical Network
Patient Records
IPS - Fail-Closed
Records Network
Different systems need different failure modes • Segment by requirement

Implementation:

  • 1.Segment networks by failure mode requirements
  • 2.Life-critical systems: Fail-open with strong monitoring
  • 3.Compliance systems: Fail-closed with high availability
  • 4.Add redundancy to minimize actual failures

Additional Controls for Fail-Open Segment:

  • Immediate alerting on failure
  • Manual monitoring during outage
  • Rapid response procedures
  • Backup inspection capability

Key insight: When systems have conflicting failure mode requirements, the answer is segmentation—not choosing one mode for everything. Architecture should align failure modes with system requirements.

Key Terms

fail-openfail-closedfailure modesfail-safefail-securesecurity device failureavailability vs security

Common Mistakes

One failure mode for entire network—different systems have different requirements. Segment by failure mode needs.
Ignoring failure modes until failure occurs—determine and test failure behavior BEFORE production deployment.
Confusing physical and network terminology—fail-safe has opposite meanings in physical (unlock) vs network (allow traffic) contexts.
No redundancy to avoid the choice—with proper HA, you rarely face the fail-open vs fail-closed dilemma.

Exam Tips

Fail-open = traffic FLOWS during failure (availability). Fail-closed = traffic STOPS during failure (security).
When a question mentions "life safety" or "hospital/emergency," fail-open is often correct—lives depend on connectivity.
When a question mentions "financial data" or "classified information," fail-closed is typically correct—security is paramount.
IPS failure mode is commonly tested: inline IPS must choose fail-open or fail-closed. IDS is passive, so no traffic impact.
Best answer is often "add redundancy" because it eliminates the need to choose between security and availability.
Physical security "fail-safe" = doors UNLOCK (for evacuation). Network "fail-open" = traffic FLOWS. Don't confuse them.

Memory Trick

Fail-Open vs Fail-Closed:

"OPEN door lets people through" Fail-Open = Traffic flows through

"CLOSED door blocks people" Fail-Closed** = Traffic blocked

When to Use Which - "LIFE vs DATA":

Life safety systems → Fail-Open ICU monitors → Fail-Open Fire systems → Fail-Open Emergency services → Fail-Open

Databases → Fail-Closed Accounting systems → Fail-Closed Top secret data → Fail-Closed Access control → Fail-Closed

The Best Answer: "Redundancy Removes the dilemma" With HA, you don't have to choose—backup device takes over.

Physical Security Warning: "In physical security, safe means escape" Fail-safe door = UNLOCKS for fire evacuation (Opposite of network fail-safe/fail-open behavior)

Test Your Knowledge

Q1.A hospital's life-critical patient monitoring system is protected by an inline IPS. How should the IPS failure mode be configured?

Q2.A firewall protecting a payment processing system experiences hardware failure. What is the MOST appropriate failure mode for this environment?

Q3.What is the BEST solution when different systems require different failure modes?

Want more practice with instant AI feedback?

Continue Learning

Ready for the Exam?

See exactly where you stand on this concept and 182 others.

99% pass rate · Pass guarantee