Using domain to apply security policies

Do you think one domain is more challenging than the others as far as applying security policies? Explain your answer.