Physical & virtual infrastructure, secure data center design, risk analysis, security controls, and BC/DR planning — 2026 Exam Study Guide
You can't secure what you don't understand — this domain covers the hardware and virtual infrastructure underpinning every cloud service
| Domain | Topic | Weight | ~Questions |
|---|---|---|---|
| 1 | Cloud Concepts, Architecture & Design | 17% | ~17 |
| 2 | Cloud Data Security | 20% | ~20 |
| ★ 3 | Cloud Platform & Infrastructure Security (this page) | 17% | ~17 |
| 4 | Cloud Application Security | 16% | ~16 |
| 5 | Cloud Security Operations | 17% | ~17 |
| 6 | Legal, Risk & Compliance | 13% | ~13 |
Total = 100%. CAT format: 100–150 questions, 3 hours, passing score 700/1000. Testing via Pearson VUE.
Deep-dive into every subdomain tested in Domain 3 — August 2026 outline
Six high-impact mnemonics and mental models to lock in Domain 3 concepts on exam day
Tier I = 99.671% · Tier II = 99.741% · Tier III = 99.982% · Tier IV = 99.995%
The quality of each tier maps directly to its description. Tier III is "concurrently maintainable" — no shutdown needed for maintenance. Tier IV is "fault tolerant" — withstands any single failure.
RTO = Recovery Time Objective — how fast can you come back? (measured in hours of downtime)
RPO = Recovery Point Objective — how much data can you afford to lose? (measured in hours of data lost)
Think: Time = how long offline; Point = the last safe backup point in time.
Type 1 (Bare Metal) = runs directly on hardware, no OS beneath it. Used by cloud providers (VMware ESXi, Hyper-V, KVM).
Type 2 (Hosted) = runs on top of a host OS — it "has something underneath." Used for desktop virtualization (VirtualBox, VMware Workstation).
Hot = ready right now, instantly usable (like fresh-brewed coffee — no wait)
Warm = needs a little time to heat up (like tea steeping — hours to days)
Cold = you have to do everything from scratch (like fetching water from a well — days to weeks)
Mitigate — implement controls to reduce risk
Accept — document and live with residual risk
Transfer — shift to insurer or third party
Avoid — eliminate the activity creating the risk
On the exam, "transfer" options often mention cyber insurance or contractual indemnification.
Whoever controls the management plane controls all VMs, storage, and networking in the environment.
This is why management plane compromise is the most critical cloud attack vector. Protect it with: MFA, IP allowlisting, API authentication, comprehensive audit logging, and JIT privileged access.
10 scenario-based questions — select the best answer, then review the explanation
Click any card to flip it and reveal the answer
RTO = Recovery Time Objective — maximum acceptable time to restore operations (measures downtime tolerance).
RPO = Recovery Point Objective — maximum acceptable data loss measured in time (measures backup frequency needed).
Low RTO → hot site. Low RPO → continuous replication.
Type 1 (Bare Metal): runs directly on physical hardware; no host OS beneath it. Examples: VMware ESXi, Hyper-V, KVM. Used by cloud providers.
Type 2 (Hosted): runs on top of a host OS. Examples: VirtualBox, VMware Workstation. Used for desktop virtualization.
An attack where malicious code running inside a guest virtual machine exploits a hypervisor vulnerability to break out of the VM isolation boundary and gain access to the hypervisor or other VMs on the same physical host.
Mitigation: keep hypervisor software patched, minimize hypervisor attack surface.
Concurrently Maintainable
Uptime: 99.982% (~1.6 hours downtime/year)
Redundancy: N+1 — no single point of failure
Components can be maintained without shutting down the facility
Most enterprise cloud providers use Tier III or Tier IV facilities.
Fine-grained network policy enforcement that isolates individual workloads (VMs or containers) rather than just network segments.
Primary benefit: limits lateral movement — even if an attacker breaches one workload, they cannot easily reach others.
Implemented via security groups, network policies (Kubernetes), or micro-segmentation platforms (VMware NSX).
The orchestration layer that provides API-accessible control over all cloud resources: compute, storage, networking, and identity.
Why it's a crown jewel: compromise grants an attacker control over the entire cloud environment — provision/delete VMs, modify firewall rules, disable logging, exfiltrate data.
Protect with: MFA, JIT access, IP allowlisting, audit logging.
Hot Site: Fully operational, real-time mirror. Instant failover. Highest cost.
Warm Site: Pre-configured hardware, partial data replication. Hours to days to activate. Moderate cost.
Cold Site: Basic infrastructure only. Days to weeks to activate. Lowest cost.
Risk transfer shifts the financial impact of a risk to a third party — the risk itself is not eliminated, but the organization is compensated if it occurs.
Examples: cyber liability insurance, contractual indemnification clauses, outsourcing to a CSP (shared responsibility model).
Part of MATA: Mitigate, Accept, Transfer, Avoid.
Select the subdomains you feel confident about to get a readiness estimate and targeted study tips
Physical environment, SDN, compute types, hypervisors, storage, management plane
Logical/physical/environmental design, data center tier classifications (I–IV)
VM escape, hyperjacking, container escape, misconfiguration, MATA risk treatment
RBAC, ABAC, MFA, JIT access, least privilege, audit mechanisms, encryption
Hot/warm/cold sites, RTO vs. RPO, tabletop, parallel, full interruption tests
Official sources for CCSP Domain 3 preparation
| Item | Value | Context |
|---|---|---|
| Domain 3 weight | 17% | ~17 of 100–150 adaptive questions |
| Tier I uptime | 99.671% | ~28.8 hrs downtime/year |
| Tier II uptime | 99.741% | ~22 hrs downtime/year |
| Tier III uptime | 99.982% | ~1.6 hrs downtime/year; N+1; concurrently maintainable |
| Tier IV uptime | 99.995% | ~26 min downtime/year; 2N+1; fault tolerant |
| CCSP passing score | 700/1000 | CAT format, Pearson VUE |
| Exam outline effective | August 1, 2026 | Includes container/serverless in Domain 3 |