Chapter 7 of the document discusses various measures to protect a cybersecurity domain, including defending systems and devices, server hardening, network hardening, and physical security. It emphasizes the importance of technologies, processes, and procedures in securing systems while detailing physical security measures such as perimeter barriers and biometric authentication systems. Additionally, it highlights the role of surveillance in monitoring and managing access to sensitive areas.