Domain 112% of exam

Security+ Domain 1: General Security Concepts

Security+ Domain 1 establishes the foundational security principles that underpin the entire exam. This domain covers the CIA triad, security controls, cryptographic concepts, and authentication methods that form the core vocabulary and frameworks used throughout all other domains.

Questions

~10-11 questions

Concepts

43 total

Difficulty

Foundation

Study Time

1-2 weeks

Objectives

4 objectives

Overview

General Security Concepts is your entry point into the Security+ certification. While it only accounts for 12% of the exam, mastering this domain is critical because these concepts appear repeatedly throughout the other four domains. Think of Domain 1 as learning the language of cybersecurity—without fluency here, the rest of the exam becomes significantly harder. This domain emphasizes conceptual understanding over hands-on implementation. You'll need to understand why certain controls exist, how different security models compare, and when to apply specific cryptographic solutions. CompTIA tests your ability to think like a security professional, not just memorize definitions. The SY0-701 version places increased emphasis on zero trust architecture, gap analysis, and change management processes—reflecting the evolution of enterprise security practices. Expect scenario questions that ask you to identify the appropriate control type, explain why a specific cryptographic algorithm should be used, or analyze the security implications of a change management decision.

Key Topics

CIA TriadZero Trust ArchitectureSecurity ControlsAAA FrameworkGap AnalysisCryptographic ConceptsChange ManagementDefense in Depth

Exam Objectives

1.1High

Compare and contrast various types of security controls

Understand the categories and types of security controls used to protect assets.

Key Concepts

Security Controls Overview

Introduction to security controls as safeguards designed to reduce risk and protect confidentiality, integrity, and availability. Understanding the dual classification system of categories and control types.

Technical Controls

Hardware and software mechanisms that enforce security automatically. Includes firewalls, encryption, access control lists, IDS/IPS, and endpoint protection.

Managerial Controls

Administrative and governance controls established by management to define policy, procedure, and oversight. Includes security policies, risk assessments, and compliance management.

Operational Controls

Day-to-day procedures relying on human activity to maintain security. Includes incident response, change management, configuration management, and separation of duties.

Physical Controls

Controls protecting tangible infrastructure and physical access. Includes locks, fences, security guards, surveillance cameras, and environmental controls.

Preventive Controls

Controls designed to stop security incidents before they occur. First line of defense including firewalls, MFA, access restrictions, and security training.

Deterrent Controls

Controls that discourage malicious or negligent behavior through psychological effect. Includes warning signs, login banners, visible cameras, and disciplinary policies.

Detective Controls

Controls that identify security events as they occur or after the fact. Includes SIEM alerts, IDS, audit logs, and security monitoring.

Corrective Controls

Controls that restore systems and processes after an incident. Includes patching, backups, system reimaging, and applying security fixes.

Compensating Controls

Alternative controls that substitute for primary controls when they are infeasible. Must provide equivalent protection and be documented.

Directive Controls

Controls that guide or mandate security behavior through rules and expectations. Includes policies, acceptable use agreements, and standard operating procedures.

Defense in Depth

Layering multiple control types across categories to create comprehensive protection. Understanding how controls work together to provide overlapping security.

Exam Tip

Expect scenario questions asking you to identify which type of control addresses a specific security concern. Know the difference between control categories (technical, managerial, operational, physical) and control types (preventive, detective, corrective, deterrent, compensating, directive).

1.2Critical

Summarize fundamental security concepts

Core security principles including the CIA triad, authentication, authorization, and zero trust.

Key Concepts

CIA Triad

The three core principles of information security: Confidentiality (preventing unauthorized disclosure), Integrity (preventing unauthorized modification), and Availability (ensuring authorized access).

Non-repudiation

Ensuring that a party cannot deny having performed an action. Achieved through digital signatures, audit logs, and other accountability mechanisms.

Authentication Fundamentals

The process of verifying identity. Understanding authentication of people vs systems, and the factors used (something you know, have, are, somewhere you are).

Authorization Models

Methods for determining what authenticated users can access. Includes understanding of permissions, access levels, and authorization decisions.

Accounting and Auditing

Tracking and recording user activities for security monitoring, compliance, and forensics. Includes logging, monitoring, and audit trail maintenance.

Gap Analysis

Comparing current security posture against desired state or standards to identify deficiencies. Used to prioritize security improvements and compliance efforts.

Zero Trust Overview

Security model based on "never trust, always verify" principle. Eliminates implicit trust and requires continuous verification regardless of network location.

Zero Trust Control Plane

The decision-making components of zero trust architecture. Includes adaptive identity, threat scope reduction, policy-driven access control, policy administrator, and policy engine.

Zero Trust Data Plane

The enforcement components of zero trust architecture. Includes implicit trust zones, subject/system identification, and policy enforcement points.

Physical Security Mechanisms

Physical barriers and access controls including bollards, access control vestibules (mantraps), fencing, and security guards.

Physical Security Monitoring

Surveillance and detection systems including video surveillance, access badges, lighting, and various sensors (infrared, pressure, microwave, ultrasonic).

Deception and Disruption Technology

Security tools designed to detect, deceive, and analyze attackers. Includes honeypots, honeynets, honeyfiles, and honeytokens.

Exam Tip

The CIA triad appears constantly throughout the exam. For any scenario, ask yourself: "Is this protecting confidentiality, integrity, or availability?" Zero trust is heavily emphasized in SY0-701—understand its control plane and data plane components thoroughly.

1.3Medium

Explain the importance of change management processes and the impact to security

Understanding how changes to systems and processes should be controlled and documented.

Key Concepts

Change Management Overview

Structured process for implementing changes to IT systems while minimizing risk and maintaining security. Understanding why uncontrolled changes create vulnerabilities.

Change Approval Process

Formal procedures for reviewing and approving changes including ownership, stakeholder involvement, and approval workflows.

Impact Analysis and Testing

Evaluating potential effects of changes on security and operations. Includes impact analysis, test results review, and validation procedures.

Backout Plans and Maintenance Windows

Planning for change reversal if issues occur and scheduling changes during appropriate timeframes to minimize business impact.

Technical Change Implications

Understanding technical impacts including allow/deny lists, restricted activities, downtime, service/application restarts, legacy applications, and dependencies.

Documentation and Version Control

Maintaining accurate records of changes including updating diagrams, policies, procedures, and using version control systems.

Exam Tip

Change management questions often appear as scenarios where something goes wrong. Focus on understanding the proper sequence: request → review → approve → test → implement → document → review.

1.4Critical

Explain the importance of using appropriate cryptographic solutions

Understanding when and how to apply different cryptographic methods.

Key Concepts

PKI Fundamentals

Public Key Infrastructure components and concepts including public keys, private keys, and key escrow. Foundation for understanding digital certificates and encryption.

Symmetric vs Asymmetric Encryption

Understanding the two main encryption approaches: symmetric (same key for encrypt/decrypt) and asymmetric (public/private key pairs). When to use each.

Encryption Levels

Different scopes of encryption: full-disk, partition, file, volume, database, and record-level encryption. Understanding appropriate use cases for each.

Transport Encryption

Encrypting data in transit to protect communications. Understanding TLS, IPSec, and other transport-layer security protocols.

Encryption Algorithms and Key Length

Common encryption algorithms (AES, RSA, etc.) and the importance of key length in determining encryption strength.

Cryptographic Hardware

Hardware components for cryptographic operations including TPM, HSM, key management systems, and secure enclaves.

Obfuscation Techniques

Methods to hide or obscure data including steganography, tokenization, and data masking. Different from encryption but provides protection.

Hashing and Salting

One-way cryptographic functions for integrity verification and password storage. Understanding hash functions, collision resistance, and salt usage.

Digital Signatures

Using asymmetric cryptography to verify authenticity and integrity. How digital signatures provide non-repudiation and authentication.

Key Stretching

Techniques to strengthen weak passwords or keys by applying cryptographic functions multiple times. Includes PBKDF2, bcrypt, scrypt.

Blockchain and Public Ledger

Distributed ledger technology using cryptographic hashing for integrity. Understanding blockchain structure and open public ledger concept.

Certificate Authorities and Trust

Entities that issue and manage digital certificates. Understanding root of trust, certificate chains, and third-party vs self-signed certificates.

Certificate Management

Lifecycle management of certificates including CSR generation, revocation (CRL, OCSP), wildcard certificates, and renewal processes.

Exam Tip

Know which algorithms belong to which category and their typical use cases. Understand key lengths—AES-256 for symmetric, RSA-2048+ or ECC for asymmetric. SY0-701 introduces quantum cryptography concepts.

Common Mistakes to Avoid

  • Confusing control categories (technical, managerial) with control types (preventive, detective)
  • Mixing up symmetric vs asymmetric encryption use cases
  • Not understanding that zero trust applies to internal users too
  • Forgetting that hashing is one-way and cannot be "decrypted"
  • Confusing authentication (who you are) with authorization (what you can do)

PBQ Practice Areas

Performance-based questions (PBQs) for this domain typically cover:

Matching security controls to scenarios
Identifying the correct cryptographic solution for a use case
Analyzing change management process steps
Classifying controls by category and type

Frequently Asked Questions

How much of the exam is Domain 1?

Domain 1 accounts for 12% of the exam, roughly 10-11 questions out of 90. However, these foundational concepts are referenced throughout questions in other domains, making it more important than the percentage suggests.

Should I memorize all cryptographic algorithms?

Focus on understanding the categories (symmetric, asymmetric, hashing) and knowing the most common algorithms in each: AES for symmetric, RSA/ECC for asymmetric, and SHA-256/SHA-3 for hashing. Understand use cases rather than memorizing every algorithm.

What is the difference between authentication and authorization?

Authentication verifies identity (proving who you are), while authorization determines permissions (what you're allowed to do). Authentication always comes first—you must prove your identity before the system can determine your access rights.

How deep should I study zero trust for the exam?

Zero trust is heavily emphasized in SY0-701. Understand its core principles: never trust/always verify, least privilege access, micro-segmentation, continuous validation, and that it applies to all users including internal employees.

Study Strategy

Start here. These concepts appear throughout all other domains. Master the CIA triad, control types, and cryptographic basics before moving forward.

Master this domain

Get personalized practice questions and track your progress.

99% of students who reach 95% concept mastery pass

Start Free Assessment

Domain Stats

Exam Weight12%
Questions~10-11
Concepts43
Study Time1-2 weeks
DifficultyFoundation

Ready to master Security+ Domain 1: General Security Concepts?

Our adaptive learning system identifies your weak spots and creates a personalized study plan.

99% of students who reach 95% concept mastery pass the exam