CISSP · · 6 min read

Network Security Fundamentals: Seeing Your Network the Way Attackers Do

If you cannot draw your network, you cannot secure it. Learn the core concepts and components behind CISSP Domain 4 communication and network security.

Hook / Why this matters

CISSP Lens: Pick answers that align business risk, governance intent, and practical control execution.

If you cannot draw your network, you cannot secure it. Most major breaches start with simple weaknesses in routing, segmentation, or basic controls. When you understand how data actually moves, you can place defenses where they have the most impact and explain your design to both engineers and executives.

Core concept explained simply

At its core, network security is about protecting data in motion. Every time a user opens a web page, sends an email, or connects to a cloud app, data moves through many devices and layers. Understanding those layers and devices is the first step in securing them.

OSI and TCP/IP models

Security teams still use the OSI and TCP/IP models because they provide a shared language.

You do not need to memorize every detail for the CISSP exam, but you must know roughly which protocols live where and which controls can see or influence them.

How a packet really moves

When a laptop sends a packet to a cloud service, several things happen:

  1. The operating system wraps the data in transport and network headers (for example TCP over IP).
  2. The packet is sent to the local switch, which forwards it based on MAC addresses.
  3. A router (often the default gateway) forwards it based on IP routing tables.
  4. Firewalls, proxies, and load balancers may inspect, filter, or redirect it.
  5. The packet eventually reaches the destination service, which unwraps and processes it.

Each step is an opportunity to apply controls that protect confidentiality, integrity, and availability.

Core building blocks

Most enterprise networks use a common set of components:

You rarely need to configure these devices in detail as a CISSP, but you must understand their role in a secure design.

Network zones and trust boundaries

Modern networks are divided into logical zones, for example:

The lines between these zones are trust boundaries. These are the most important places to apply controls and to think like an attacker. If someone compromises a device in one zone, how easily can they cross into another?

Defense in depth on the network

Defense in depth means no single control is responsible for protection. On the network this usually looks like:

When attackers encounter multiple independent controls, they are more likely to be contained or detected.

CISSP lens

For CISSP Domain 4, you are expected to think like a security manager who understands networks at a conceptual level.

Key expectations include:

Domain 4 questions frequently combine design, protocol, and control placement. Having a mental model of the network, not just a list of devices, will help you eliminate wrong answers quickly.

Real-world scenario

A mid size company grew over many years. Each new application team requested servers, VPNs, or firewall rules directly from the network team. There was no single, up to date network diagram.

After a minor incident involving unauthorized access to an internal web tool, the CISO asked three different teams to draw "the network" for an incident review.

Each diagram was technically correct but incomplete. Nobody had a shared picture of how data flowed from the internet, through the DMZ, into internal applications, and back.

The CISO sponsored a short project with three objectives:

  1. Create a single high level logical network diagram. Zones were defined (internet, DMZ, internal user, server, management, partner, and guest) along with the main paths between them.
  2. Mark trust boundaries. Every place where traffic crossed between zones was highlighted, along with existing controls such as firewalls, proxies, and VPN gateways.
  3. Identify gaps. The team noted where sensitive systems shared networks with general users, where management interfaces were reachable from user networks, and where there was insufficient logging.

Within a few weeks, the teams agreed on a target state:

This did not require new products. It required shared understanding and deliberate design.

Common mistakes and misconceptions

Security leaders frequently run into the same network pitfalls:

As a CISSP, your role is to recognize these patterns and push for designs that reduce unnecessary trust.

Actionable checklist

Use this checklist to strengthen network fundamentals in your environment:

Key takeaways

Optional exam-style reflection question

During an assessment, you discover that application servers and user workstations share the same VLAN with no filtering between them. From a network security perspective, what is the primary concern?

Answer: A flat network allows a compromise of any workstation to lead quickly to high value servers with little resistance. Proper segmentation would place servers in separate, more restricted zones so that lateral movement requires crossing monitored and controlled boundaries.

Read next

© 2025 Threat On The Wire. All rights reserved.