CISSP · · 4 min read

Secure Protocols and Encrypted Communications: Choosing TLS, IPsec, SSH, and More

Encryption is not one size fits all. Learn when to use TLS, IPsec, SSH, and other secure protocols and how to configure them correctly for CISSP Domain 4.

Hook / Why this matters

CISSP Lens: Pick answers that align business risk, governance intent, and practical control execution.

Checking a box that says "encrypted" does not guarantee secure communication. You need the right protocol in the right place, configured correctly. Domain 4 expects you to know when to use TLS, IPsec, SSH, and other secure protocols, and what protections each provides.

Core concept explained simply

Secure communication protocols aim to protect data as it moves between systems. They focus on four key properties:

Different protocols operate at different layers of the stack and protect different parts of the path.

TLS basics

Transport Layer Security (TLS) protects application layer traffic, most famously HTTPS.

TLS is widely supported and is the default choice for securing web based applications and many other services.

IPsec fundamentals

IPsec protects traffic at the network layer.

Key use cases include:

IPsec can provide confidentiality, integrity, and authentication for all IP traffic between endpoints, without requiring application changes.

SSH for secure remote management

Secure Shell (SSH) is a protocol used primarily for secure remote command line access and file transfers.

From a security perspective, SSH is the standard for managing Unix and Linux systems and many network devices.

Secure email protocols at a high level

Email security can use several layers of protection:

For CISSP purposes, know that TLS protects the link between servers, while S/MIME and PGP protect the content itself.

Common pitfalls

Even when secure protocols are in use, misconfigurations can undermine them:

Secure protocols are only as strong as their configuration and key management.

CISSP lens

For Domain 4, you should be able to:

When evaluating options, ask what is being protected, at which layer, and whether the control meets the stated requirement.

Real-world scenario

A company connected two offices using IPsec tunnel mode between edge firewalls. Inside each office, internal traffic between servers and applications remained unencrypted.

An attacker exploited a vulnerability in one firewall and gained access to the device's memory. From there, the attacker could observe decrypted traffic and capture sensitive credentials and data flowing between the two sites.

In the aftermath, the security team made several changes:

The combination of TLS at the application layer and IPsec at the network layer provided defense in depth. A compromise of one control no longer exposed all data in transit.

Common mistakes and misconceptions

Organizations often stumble on these points:

A CISSP must understand that design, configuration, and process are at least as important as the choice of protocol.

Actionable checklist

To strengthen secure communications in your environment:

Key takeaways

Optional exam-style reflection question

An organization wants to protect all traffic between two office routers across the internet without modifying applications on the endpoints. Which technology is most appropriate?

Answer: IPsec in tunnel mode between the routers is most appropriate. It encrypts and authenticates all IP traffic between the sites at the network layer without requiring changes to individual applications.

Read next

© 2025 Threat On The Wire. All rights reserved.