Secure communication protocols are the technical mechanisms that protect data in transit. For the CISSP exam, Domain 4 tests whether candidates understand how the major secure protocols work, what security properties they provide, and when to use each. The exam also tests knowledge of insecure protocols and their secure replacements — a pattern that appears in multiple question types.

IPSec: Network-Layer Security Protocol Suite

IPSec (Internet Protocol Security) is a suite of protocols that provides security at the IP network layer (Layer 3). Because it operates below the application layer, IPSec is transparent to applications — any application that sends IP traffic can benefit from IPSec without modification.

IPSec uses two protocols to provide security services.

Authentication Header (AH) provides data origin authentication, data integrity, and anti-replay protection. It does not provide confidentiality (encryption). AH creates a cryptographic hash of the entire IP packet (including the IP header) and includes it in the AH header. This allows the recipient to verify that the packet has not been modified in transit and genuinely originated from the claimed source. However, because AH authenticates the IP header, it is incompatible with Network Address Translation (NAT) — NAT modifies IP headers, breaking the AH integrity check.

Encapsulating Security Payload (ESP) provides confidentiality (encryption), data origin authentication, data integrity, and anti-replay protection. ESP is the more commonly used IPSec protocol because it provides both confidentiality and integrity. ESP encrypts the payload (the data portion) of the IP packet using symmetric encryption (AES). Unlike AH, ESP can be used with NAT because it does not authenticate the outer IP header in tunnel mode.

IPSec operates in two modes:

Transport mode encrypts only the payload of the original IP packet, leaving the original IP header intact. The original source and destination IP addresses are visible. Transport mode is used for host-to-host communications where the two endpoints are the actual source and destination. It provides security for the data but not for routing information.