CAS-005 security architecture questions focus on how controls behave inside real enterprise designs. The exam expects you to reason about traffic paths, cloud and SaaS boundaries, federation trust, software release pipelines, policy enforcement points, and resilience evidence. A good architecture answer places the control where it can actually inspect, decide, or prove state, rather than naming a familiar product that sits outside the operational path.
Official Objective Mapping: Security architecture; related CAS-005 objective areas: resilient architecture, network and application control placement, cloud capabilities, availability, monitoring, segmentation, load balancing, and recovery considerations.
Plain-English Understanding: This topic tests whether you can place the right control in the traffic path and prove it works. A firewall, WAF, IDS, load balancer, proxy, or logging pipeline is useful only if the relevant packets, requests, health signals, and events actually reach it.
Key Concepts: control placement; request path; inline vs passive inspection; health probe; failover; centralized logging; time synchronization.
Exam Focus: traffic path, application-layer inspection, health checks, sensor visibility, and evidence correlation.
Practice Question: A WAF is enabled, but SQL injection attempts still reach the backend. Traffic enters through a CDN and a separate API endpoint bypasses the WAF listener. What should be corrected?
A. Increase server CPU capacity B. Route all relevant application traffic through the WAF or API security enforcement point before backend access C. Disable application logging D. Add an IDS sensor on an unrelated management subnet
Correct Answer: B
Explanation: B is correct because the WAF cannot protect traffic that bypasses its listener. The fix is to place enforcement in every relevant application path. CPU capacity does not inspect requests, disabling logs removes evidence, and an unrelated sensor will not see the bypassed API flow.
Practice Question: After a node failure, users keep reaching the failed server. Which evidence best identifies the architectural issue?
A. A list of installed desktop antivirus agents B. A password policy report C. Load-balancer backend pool health-probe status and active member list D. A code-signing certificate inventory
Correct Answer: C
Explanation: C is correct because the symptom is failed traffic distribution. Backend health-probe status and active pool membership show whether the load balancer still considers the node eligible. The other evidence sources belong to endpoint, identity, or software integrity, not failover behavior.
Exam Takeaway: If a control appears enabled but attacks or failures continue, trace the production path and fix the point where traffic, health checks, or logs bypass enforcement.
What this topic really tests: can you trace a request or packet through the architecture and place controls where they can enforce or observe? A WAF belongs in the HTTP request path; an IPS must be inline for prevention; an IDS must receive mirrored or routed traffic for detection; a load balancer needs valid health probes; logs need time sync and parser support. The exam punishes answers that name a good tool but put it in the wrong place.
Beginner-friendly grounding: A security control only works on traffic or events it can actually see. Before choosing WAF, IDS, IPS, load balancer, or logging changes, trace the request path and find where inspection or failover really occurs.
Exam transformation: wrong options usually appear as using a network firewall for application-layer attacks; placing a sensor where it cannot see traffic; fixing availability without checking health probes; replacing application logs with perimeter logs. These options can sound professional, but they solve the wrong layer or skip the state that must be proven. The correct option matches the security property, operational phase, and evidence requirement described by the stem.
| Object | Attribute | Value Range | Default State | Dependency | Failure State |
|---|---|---|---|---|---|
| WAF policy | Application-layer inspection point | Inline, reverse proxy, CDN-integrated | Not deployed | Application traffic path | Layer 7 attacks bypass network-only controls |
| IDS/IPS sensor | Visibility and enforcement mode | Out-of-band IDS, inline IPS | Misplaced or blind | Tap, span, route, or inline segment | False negatives rise because traffic never reaches the sensor |
| Load balancer | Availability distribution | Active-active, active-passive, geo-aware | Single endpoint | Health probes and persistence design | A failed node remains in rotation or session state breaks during failover |
| Central logging collector | Detection evidence path | Endpoint, network, application, cloud | Partial ingestion | Time sync and retention | Incident analysis lacks complete event sequence |
Command and evidence confidence: Use vendor-supported consoles, management APIs, SIEM/EDR views, GRC workflow evidence, repository settings, cloud audit views, or version-aware CLI verification for the deployed platform. Treat generic shell snippets, sample queries, and tabletop rehearsals as lab rehearsal unless they are validated against the organization's active tool version.
The chain starts with a client request, routing decision, proxy or WAF handling, load-balancer selection, backend processing, and logging. Each component either changes traffic flow, inspects content, measures health, or records evidence. If the control is bypassed, the backend receives uninspected traffic. If health checks are wrong, failed nodes stay active. If logs are incomplete, incident reconstruction breaks. The correct answer restores the flow that makes the control effective.
A strong exam answer follows this chain without skipping layers. First identify the event or requirement, then the object that controls it, then the dependency that must be valid, then the evidence source that proves the state. If the option jumps straight to remediation while the controlling dependency is unknown, it is usually a distractor.
| Task | Precise Command or Path | Verification Standard |
|---|---|---|
| Verify application inspection path | WAF or reverse-proxy console: listener > policy association > backend route | Application traffic passes through the WAF policy before reaching backend servers |
| Check sensor visibility | IDS/IPS console: sensor health > interface traffic > rule hit counters | Sensor receives expected segment traffic and rule counters move during authorized test events |
| Validate load-balancer failover | Load balancer console: backend pool > health probe status > active members | Unhealthy nodes are removed and healthy nodes remain eligible |
| Review event correlation | SIEM query: application, WAF, load balancer, and host events by request ID or timestamp window | Events show a complete path without parser failures or missing critical sources |
Official Objective Mapping: Security architecture; related CAS-005 objective areas: secure software development lifecycle, CI/CD pipeline controls, container security, software supply chain controls, SBoM, SCA, branch protection, signing, and deployment governance.
Plain-English Understanding: This topic tests whether you can identify which lifecycle control catches which type of failure. Source-code scanning, dependency scanning, artifact signing, branch protection, SBoM, container scanning, and deployment gates solve different parts of the release chain.
Key Concepts: SAST; DAST; IAST; RASP; SCA; SBoM; artifact signing; branch protection; container image provenance.
Exam Focus: match the failing release stage to the correct assurance control: source, dependency, artifact, container image, branch, or deployment gate.
Practice Question: A container image deployed to production contains an outdated base image and an unsigned application layer. Which control combination best addresses the release weakness?
A. More comments in the source code B. A network firewall rule for developer workstations C. Container image scanning, SBoM generation, artifact signing, and enforced CI/CD status checks D. Disabling the issue tracker
Correct Answer: C
Explanation: C is correct because the failure is in the release artifact and container supply chain. Image scanning finds vulnerable layers, the SBoM records components, signing proves artifact integrity, and CI/CD checks enforce the gate. Comments, firewall rules, and issue tracker changes do not prove release trust.
Practice Question: Developers can push directly to the production branch during emergencies. Which risk is most direct?
A. DNSSEC validation will fail automatically B. Kerberos tickets will expire faster C. SIEM retention will increase D. Required reviews, security scans, and provenance checks can be bypassed
Correct Answer: D
Explanation: D is correct because unprotected production branches let changes skip the controls that create release assurance. DNSSEC, Kerberos, and SIEM retention are real technologies, but they do not describe the branch-governance failure in the stem.
Exam Takeaway: Match the failed release stage to the control that proves it: SAST for source patterns, SCA/SBoM for dependencies, signing for artifacts, and branch protection for change governance.
What this topic really tests: can you locate the weak link in the build-to-release chain? SAST looks at custom code, SCA and SBoM expose dependencies, DAST and IAST inspect behavior during testing, signing proves artifact integrity, branch protection controls change authorization, and container scanning validates image layers. A mature answer connects the tool to the exact failure mode rather than saying 'scan more'.
Beginner-friendly grounding: A release pipeline is a chain of trust. Code review, SAST, SCA, SBoM, signing, image scanning, and branch protection each guard a different link, so the right answer depends on where trust was lost.
Exam transformation: wrong options usually appear as using SAST to prove dependency provenance; using runtime protection as the only build control; allowing direct pushes to release branches; keeping an SBoM outside the artifact lifecycle. These options can sound professional, but they solve the wrong layer or skip the state that must be proven. The correct option matches the security property, operational phase, and evidence requirement described by the stem.
| Object | Attribute | Value Range | Default State | Dependency | Failure State |
|---|---|---|---|---|---|
| Security requirement | Functional or non-functional constraint | Mandatory, conditional, compensating | Late-stage request | Design review and backlog traceability | Testing finds issues too late for architecture correction |
| SCA result | Dependency risk signal | Known CVE, license issue, abandoned package | Not scanned | Build pipeline and SBoM | Vulnerable third-party code ships because source code scanning missed it |
| SBoM artifact | Component inventory | Package name, version, hash, supplier | Absent or stale | Software supply chain process | Incident response cannot identify affected builds after a dependency disclosure |
| Branch protection rule | Merge control | Required review, signed commit, status checks | Direct push allowed | CI/CD governance | Unreviewed changes bypass testing and provenance controls |
Command and evidence confidence: Use vendor-supported consoles, management APIs, SIEM/EDR views, GRC workflow evidence, repository settings, cloud audit views, or version-aware CLI verification for the deployed platform. Treat generic shell snippets, sample queries, and tabletop rehearsals as lab rehearsal unless they are validated against the organization's active tool version.
The chain begins with a requirement and code change, then moves through branch control, build pipeline, security tests, dependency resolution, artifact creation, SBoM generation, signature, repository storage, and deployment approval. If direct pushes are allowed, governance is bypassed. If SCA is missing, vulnerable dependencies survive source review. If signing is absent, artifact integrity cannot be proven. The correct answer restores assurance at the stage where the failure enters.
A strong exam answer follows this chain without skipping layers. First identify the event or requirement, then the object that controls it, then the dependency that must be valid, then the evidence source that proves the state. If the option jumps straight to remediation while the controlling dependency is unknown, it is usually a distractor.
| Task | Precise Command or Path | Verification Standard |
|---|---|---|
| Inspect pipeline assurance gates | CI/CD console: pipeline > security stages > required status checks | SAST, SCA, test, and artifact stages must pass before release approval |
| Validate SBoM availability | Artifact repository: release artifact > SBoM attachment or metadata | SBoM lists package names, versions, hashes, and supplier details for the released build |
| Check branch protection | Repository settings: branch protection > required reviews > required checks | Release branches block direct pushes and require security-relevant status checks |
| Review dependency exposure | SCA tool: project > critical vulnerabilities > affected versions | Critical findings are blocked, remediated, or formally excepted before deployment |
Official Objective Mapping: Security architecture; related CAS-005 objective areas: access architecture, cloud security capabilities, federation, PKI, CASB, conditional access, microsegmentation, Zero Trust, policy decision and enforcement points.
Plain-English Understanding: This topic tests whether you can design access around subject, object, context, and policy enforcement instead of trusting a network location. SSO is only the start; the scenario often asks whether device state, risk, SaaS exposure, cloud boundary, and workload identity are validated continuously.
Key Concepts: federation trust; claims and audience; conditional access; CASB; microsegmentation; policy decision point; policy enforcement point; cloud shared responsibility.
Exam Focus: separate authentication from authorization, then validate context, SaaS control, workload identity, and enforcement logs.
Practice Question: Users authenticate through SSO, but unmanaged devices can download sensitive SaaS files. Which design evidence matters most?
A. Conditional access result, device compliance signal, CASB policy, and SaaS session control logs B. The number of VPN concentrators C. A shared administrator account for the SaaS tenant D. A public folder containing federation certificates
Correct Answer: A
Explanation: A is correct because the problem is not login; it is contextual authorization and SaaS data control. Conditional access, device compliance, CASB policy, and session logs show whether unmanaged devices are restricted. VPN capacity, shared accounts, and exposed certificates do not solve the access decision.
Practice Question: A workload in one cloud segment can call an internal API it does not need. What Zero Trust control is most relevant?
A. Broader network trust for the cloud VPC B. Microsegmented subject-object policy with workload identity and enforcement logs C. Disabling API authentication because traffic is internal D. Moving the API documentation to a private wiki
Correct Answer: B
Explanation: B is correct because the issue is unnecessary workload-to-API access. Microsegmentation tied to workload identity limits the subject-object path and provides enforcement evidence. Broad VPC trust and disabled authentication preserve the weakness, while documentation location is not an access control.
Exam Takeaway: Do not treat VPN origin or SSO success as authorization; verify subject, object, device state, risk, data sensitivity, and enforcement logs.
What this topic really tests: can you separate authentication, authorization, context, and enforcement? Federation proves who the subject is; claims and token audience tell the application what was asserted; conditional access adds risk and device context; CASB sees SaaS behavior; microsegmentation controls workload-to-object communication. The exam distractor is often a perimeter answer that ignores continuous validation.
Beginner-friendly grounding: Zero Trust does not mean users log in more often; it means every subject-object request is checked with identity, device, risk, data sensitivity, and enforcement evidence. Successful SSO is only one signal.
Exam transformation: wrong options usually appear as trusting VPN origin as proof of authorization; using shared local accounts; ignoring device compliance; treating SSO as a complete Zero Trust design. These options can sound professional, but they solve the wrong layer or skip the state that must be proven. The correct option matches the security property, operational phase, and evidence requirement described by the stem.
| Object | Attribute | Value Range | Default State | Dependency | Failure State |
|---|---|---|---|---|---|
| Federation trust | Identity provider to service provider relationship | SAML, OIDC, OAuth-based | Local identity silo | Certificate, metadata, claims, and audience | Users authenticate but receive wrong claims or invalid token audience |
| Conditional access policy | Context decision logic | Device, location, risk, time, configuration | Allow all | Signal quality and enforcement point | Access is granted without meeting device or risk requirements |
| CASB integration | Cloud application control mode | API-based, proxy-based, hybrid | No discovery | SaaS logs and identity integration | Shadow IT or data exposure remains invisible |
| Zero Trust segment | Subject-object boundary | User, device, workload, data object | Network location trust | Policy decision and enforcement points | A trusted network zone allows lateral access without continuous validation |
Command and evidence confidence: Use vendor-supported consoles, management APIs, SIEM/EDR views, GRC workflow evidence, repository settings, cloud audit views, or version-aware CLI verification for the deployed platform. Treat generic shell snippets, sample queries, and tabletop rehearsals as lab rehearsal unless they are validated against the organization's active tool version.
The chain starts when a user, device, or workload requests access. The identity provider authenticates the subject, issues claims or tokens, policy engines evaluate context, and enforcement points allow, block, restrict, or log the session. In cloud and SaaS environments, shared responsibility means the provider supplies capability while the customer configures identity, policy, logging, and data controls. The correct answer proves access at the enforcement point, not merely at login.
A strong exam answer follows this chain without skipping layers. First identify the event or requirement, then the object that controls it, then the dependency that must be valid, then the evidence source that proves the state. If the option jumps straight to remediation while the controlling dependency is unknown, it is usually a distractor.
| Task | Precise Command or Path | Verification Standard |
|---|---|---|
| Validate token and claim behavior | Identity provider logs: sign-in event > token claims > audience and application | Claims, issuer, audience, and certificate trust match the service provider requirements |
| Inspect conditional access decision | Identity portal: sign-in logs > conditional access tab > policy result | Sensitive app access requires compliant device or approved compensating control |
| Review CASB discovery | CASB console: discovered apps > risk score > sanctioned status | Unsanctioned SaaS and sensitive data movement are visible and policy-addressed |
| Check microsegmentation policy | Segmentation console: subject group > object rule > enforcement logs | Only approved subject-object flows are allowed, and denied lateral attempts are logged |
How should architects decide where to place segmentation controls in a resilient application environment?
Place segmentation at meaningful trust boundaries and verify that required application traffic, management access, monitoring, and failover paths still function.
Segmentation reduces blast radius only when it matches real application flows and trust levels. Poor placement can block recovery paths, hide telemetry, or leave important lateral movement paths open. CAS-005 architecture questions often test control placement rather than control names alone.
Demand Score: 91
Exam Relevance Score: 97
What should be checked when a highly available application still fails because one shared service becomes unavailable?
Identify the shared dependency, redesign or harden it for redundancy, and test failover across the full transaction path.
High availability fails when a hidden dependency remains centralized. Identity, DNS, secrets, storage, database, logging, and network services can all become single points of failure. CAS-005 expects architects to validate the complete service chain, not only the front-end load balancer.
Demand Score: 89
Exam Relevance Score: 96
Which controls are most important for protecting a CI/CD pipeline from software supply chain compromise?
Use protected branches, least-privilege runners, secret isolation, dependency scanning, artifact signing, SBoM generation, deployment approvals, and build provenance.
Modern supply chain attacks often target source dependencies, build agents, pipeline credentials, or unsigned artifacts. CAS-005 secure lifecycle architecture requires controls across code, build, test, release, and deployment rather than only production runtime protection.
Demand Score: 93
Exam Relevance Score: 98
How should Zero Trust principles be applied to sensitive internal applications?
Require explicit verification using identity, device posture, request context, least privilege, policy enforcement points, logging, and continuous evaluation.
Zero Trust is not just MFA or network segmentation. It requires each access request to be evaluated based on identity, device state, resource sensitivity, session context, and policy. The design should minimize implicit trust and continuously validate access conditions.
Demand Score: 90
Exam Relevance Score: 96
When is a cloud-native or SaaS-aware security control more appropriate than a traditional perimeter control?
Use cloud-native or SaaS-aware controls when enforcement must follow identities, APIs, cloud workloads, SaaS sharing activity, or data movement outside the corporate network.
Traditional perimeter tools may not see cloud console actions, SaaS file sharing, workload identities, or provider API activity. CAS-005 expects the selected control to match the architecture and the point where policy can actually be enforced.
Demand Score: 87
Exam Relevance Score: 94
What should be considered when placing WAF, load balancer, TLS termination, and monitoring controls for an internet-facing application?
Consider attack exposure, TLS inspection needs, routing paths, health checks, session handling, logging visibility, failover behavior, and whether each control sees the right traffic.
Control placement determines whether enforcement and visibility are effective. A WAF cannot protect traffic it cannot inspect, and monitoring cannot support incident response if failover paths bypass logging. Architecture answers should align controls with traffic flow and resilience requirements.
Demand Score: 86
Exam Relevance Score: 93