ISC2 CISSP Domain-1 Study Notes
ISC2 CISSP Domain-1 Study Notes
Glass-Steagall Act: passed in 1933 and separated investment and commercial banking activities in response to
involvement in stock market investment
o The Gramm-Leach-Bliley Act eliminated the Glass-Steagall Act's restrictions against affiliations between
management, operational and security control within an information system, with the purpose of
validation of the requirement of a control, correct implementation, operationally being followed as
intended, and result is as desired
basically a formal evaluation of a defined set of controls, which may be conducted with the
Security Test and Evaluation (ST&E); NIST Special Publication 800-53A Security and Privacy
Controls for Federal Information Systems and Organizations ensure the security requirements and
enforcement of appropriate security controls 1.1 Understand, adhere to, and promote
professional ethics (OSG-9 Chpts 1,19)
As a CISSP, you must understand and follow the (ISC)² code of ethics, as well as your organization’s own code
o (ISC)² Code of Professional Ethics -- take the time to read the code of ethics
Protect society, the common good, necessary public trust and confidence, and the
infrastructure
this is “do the right thing”; put the common good ahead of yourself
ensure that the public can have faith in your infrastructure and security
o You must also support ethics at your organization; this can be interpreted to mean evangelizing ethics
throughout the organization, providing documentation and training around ethics, or looking for ways to
enhance the existing organizational ethics
some organizations might have slightly different ethics than others, so be sure to familiarize
yourself with your org’s ethics and guidelines
Concept of measures used to ensure the protection of the secrecy of data, objects, and resources
Confidentiality protections prevent disclosure while protecting authorized access
Preserving authorized restrictions on information access and disclosure, including the means for
protecting personal privacy and proprietary information
Sensitive data, including personally identifiable information (PII) must be kept confidential;
confidentiality is different from secrecy
Preserving confidentiality means protecting an asset or data, even if it's not a secret
o Integrity:
Concept of protecting the reliability and correctness of data; guarding against improper info
modification/destruction; includes ensuring non-repudiation and authenticity
Integrity protection prevents unauthorized alterations of data
o Availability:
o Authenticity: ensuring a transmission, the recipient of a message can be confident that the message
Ensures that the subject of activity or who caused an event cannot deny that the event occurred
Nonrepudiation is made possible through identification, authentication, authorization,
accountability, and auditing
Sender role
Recipient role
o AAA Services:
Authorization: defining the needed resources, permissions (i.e. allow/grant and/or deny) to a
resource, and object access for a specific identity or subject
Auditing: recording a log of the events and activities related to the system and subjects
Accounting: (aka accountability) access control process which records info about attempts by all
entities to access resources; reviewing log files to check for compliance and violations in order to
hold subjects accountable for their actions, especially violations of organizational security policy
tightly interconnected
o There are numerous security frameworks and governance guidelines, including the National Institute of
The security function: the aspect of operating a business that focuses on the task of evaluating and improving
security over time
o To manage security, an org must implement proper and sufficient security governance
o The act of performing a risk assessment to drive the security policy is the clearest and most direct
Third-party governance: external entity oversight that may be mandated by law, regulation, industry standards,
contractual obligation, or licensing requirement; outside investigator or auditors are often involved
1.3.1 Alignment of security function to business strategy, goals, mission, and objectives
o Security Management Planning: ensures proper creation/implementation/enforcment of a security
policy, and alignment with org strategy, goals, mission, and objectives
o Strategic Plan: a strategic plan is a long-term plan (useful for 5 years); it defines the org's security
purpose
A strategic plan should include risk assessment
o Tactical Plan: mid-term plan (1 year or less) developed to provide more details on accomplishing the
o Operational Plan: a short-term, highly detailed plan based on strategic or tactical plans
Missions: represent a collection of objectives, and one or more missions lead to goals; when you
reach your goals, you are achieving the strategy
o A security framework must closely tie to mission and objectives, enabling the business to complete its
objectives and advance the mission while securing the environment based on risk tolerance
due diligence is key) and divestitures (how to split the IT infrastructure and what to do with identities and
credentials)
o Understand the value of governance committees (vendor governance, project governance, architecture
governance, etc.)
o Executives, managers and appointed individuals meet to review architecture, projects and incidents
on-site assessment
document exchange and review
process/policy review
third-party audit
value
o Security Professional: has the functional responsibility for security, including writing the security policy
and implementing it
o Asset Owner: responsible for classifying information for placement or protection within the security
solution
o Custodian: responsible for the task of implementing the proscribed protection defined by the security
o Auditor: responsible for reviewing and verifying that the security policy is properly implemented
processes, procedures, and solutions used; it is important in planning the structure of an org's security
solution; many frameworks to choose from, such as:
Control Objectives for Information Technology (COBIT) ("moderately referenced" on the
exam)
Business focused. Aiming to bridge gap between control, technical issues and business
risk
COBIT is a documented set of best IT security practices by ISACA
Six key principles:
provide stakeholder value
holistic approach
detect
respond
recover
protect
detect
respond
recover
diligence is about understanding your security governance principles (policies and procedures) and the
risks to your organization; actions taken by a vendor to demonstrate or provide due care
Due diligence often involves:
gathering information through discovery, risk assessments and review of existing
documentation
developing a formalized security structure containing a security policy, standards,
baselines, guidelines, and procedures
o Due care: practicing the individual activities that maintain the due diligence effort; due care is about your
legal responsibility within the law or within org policies to implement your org’s controls, follow security
policies, do the right thing and make reasonable choices
o After establishing a framework for governance, security awareness training should be implemented,
including all new hires, who complete the security awareness training as they come on board, and existing
employees who should recertify regularly (typically yearly)
Criminal law: protects society against acts that violate the basic principles we believe in;
violations of criminal law are prosecuted by federal and state governments
Civil law: provides the framework for the transaction of business between people and
organizations; violations of civil law are brought to the court and argued by the two affected
parties
Administrative law: used by government agencies to effectively carry out their day-to-day
business
o Personal Identifiable Information (PII) – an information that can be traced back to an individual
o Personal Health Information (PHI) – individual’s healthcare record governed under HIPAA
o Compliance: Organizations may find themselves subject to a wide variety of laws, and regulations
Gramm-Leach-Bliley Act (GLBA) - affects banks, insurance companies, and credit providers;
included a number of limitations on the types of information that could be exchanged even
among subsidiaries of the same corp, and required financial institutions to provide written privacy
policies to all their customers
Health Insurance Portability and Accountability Act (HIPAA) - privacy and security regulations
requiring strict security measures for hospitals, physicians, insurance companies, and other
organizations that process or store private medical information about individuals; also clearly
defines the rights of individuals who are the subject of medical records and requires organizations
that maintain such records to disclose these rights in writing
Computer Fraud and Abuse Act (CFAA) (as amended) - protects computers used by the
government or in interstate commerce from a variety of abuses
Electronic Communications Privacy Act (ECPA) - passed in 1986 to expand and revise federal
wiretapping and electronic eavesdropping provisions, making it a crime to intercept or procure
electronic communications, and includes important provisions that protect a person’s wire and
electronic communications from being intercepted by another private individual
(DPD), purpose is to provide a single, harmonized law that covers data throughout the EU
Lawfulness, fairness, and transparency
Purpose Limitation
Data Minimization
Accuracy
Storage Limitation
Security
Accountability
o ALL the above operate very similar to GDPR with a lot of similarities.
o Be familiar with the requirements around healthcare data, credit card data and other PII data as it relates
1.5 Understand legal and regulatory issues that pertain to information security in a holistic context (OSG-9 Chpt 4)
o California's SB 1386 implemented the first statewide requirement to notify individuals of a breach of their
personnel information; all other states eventually followed suit with similar laws
o Currently, federal law only requires notification of individuals when a HIPAA-covered entity breaches their
o Before an org expands to other countries, perform due diligence to understand legal systems and what
changes might be required to the way that data is handled and secured
In the US, the Health Information Technology for Economic and Clinical Health (HITECH) Act
requires notification of a data breach in some cases, such as when the personal health
information was not protected as required by HIPAA
GLBA (Gramm-Leach-Bliley Act) applies to insurance and financial orgs, requiring notification to
federal regulators, law enforcement agencies and customers when a data breach occurs
Certain states also impose their own requirements concerning data breaches
the EU and other countries have their own requirements, for instance, the GDPR has very strict
data breach notification requirements: A data breach must be reported to the competent
supervisory authority within 72 hours of its discovery
Communications Assistance to Law Enforcement Act (CALEA): requires all communication
carriers make wiretaps possible for law enforcement officials who have an appropriate court order
o Licensing: a contract between the software producer and the consumer which limits the use and/or
Enterprise License Agreement (ELAs) – detailed contract negotiated between the software
vendor and the customer.
End User License Agreement (EULAs) – agreement presented to the user as they install or
activate the software.
Perpetual Licenses – allow indefinite use of the software for a one-time fee.
Concurrent Use Licenses – allow a specific number of users to access the software
simultaneously.
Named User Licenses – allow specifically named users to access the software (login credentials)
Open-Source Software – software that may be freely used, distributed and modified under the
terms described.
o Intellectual property: intangible assets (e.g. software, data)
o Trademarks: words, slogans, and logos used to identify a company and its products or services
o Patents: protects inventions. Granting the inventor exclusion use of the invention for a period.
Software: area of on-going controversy; Google vs Oracle; given to rise of "patent trolls"
o Copyright: protects creative work, for example: books, web content, music, or other written from
The organization not required to make public disclosure. But the organization has to maintain
the secrecy for itself.
restrictions around the export of cryptographic technology, and Russia requires a license to import
encryption technologies manufactured outside the country.
1.5.4 Transborder data flow
o Orgs should adhere to origin country-specific laws and regulations, regardless of where data resides.
o Also be aware of applicable laws where data is stored, and systems are used.
1.5.5 Privacy
The EU’s GDPR has strong privacy rules that apply to any org anywhere that stores or processes
the personal data of EU residents; these individuals must be told how their data is collected and
used, and they must be able to opt out.
o The privacy guidelines of the Organization for Economic Co-operation and Development
(OECD) require orgs to avoid unjustified obstacles to trans-border data flow, set limits to personal data
collection, protect personal data with reasonable security and more.
o Fourth Amendment to the US Constitution: the right of the people to be secure in their persons, houses,
o Electronic Communication Privacy Act (ECPA): as amended, protects wire, oral, and electronic
communications while those communications are being made, are in transit, and when they are stored on
computers; makes it a crime to invade electronic privacy of an individual, and it broadened the Federal
Wiretap Act
For-profit businesses that collect consumers’ personal information (or have others collect
personal information for them),
Determine why and how the information will be processed,
get 50% or more of their annual revenue from selling or sharing California residents’
personal information.
The CCPA imposes separate obligations on service providers and contractors (who contract with
businesses to process personal info) and other recipients of personal information from
businesses.
The CCPA does not generally apply to nonprofit orgs or government agencies
COPPA makes a series of demands on websites that cater to children or knowingly collect
information from children:
Websites must have a privacy notice that clearly states the types of info they collect and
what it's used for (including whether information is disclosed to third parties); must also
include contact information for site operators
Parents must be able to review any info collected from children and permanently delete it
from the site's records
Parents must give verifiable consent to the collection of info about children younger than
the age of 13 prior to any such collection
o US Patriot Act of 2002: enacted following the September 11 attacks with the stated goal of tightening U.S.
increased penalties for terrorism crimes and an expanded list of activities which would
qualify for terrorism charges
o Family Education Rights and Privacy Act (FERPA): Grants privacy rights to students over 18, and the
data minimization
accuracy
storage limitation
security
accountability
o The EU-US Privacy Shield (formerly the EU-US Safe Harbor agreement): controls data flow from the EU to
the United States; the EU has more stringent privacy protections and without the Privacy Shield, personal
data flow from the EU to the United States would not be allowed
1.6 Understand requirements for investigation types (i.e., administrative, criminal, civil, regulatory, industry standards)
(OSG-9 Chpt 19)
An investigation will vary based on incident type; e.g. for a financial services company, a financial system
compromise might cause a regulatory investigation; a system breach or website compromise might cause a
criminal investigation; each type of investigation has special considerations:
o Administrative: an administrative investigation has a primary purpose of providing the appropriate
authorities with incident information; thereafter, authorities will determine the proper action, if any
Administrative investigations are often tied to HR scenarios, such as when a manager has been
accused of improprieties
o Criminal: a criminal investigation occurs when a crime has been committed and you are working with a
law enforcement agency to convict the alleged perpetrator; in such a case, it is common to gather
evidence for a court of law, and to share the evidence with the defense
You need to gather and handle the information using methods that ensure the evidence can be
used in court
In a criminal case, a suspect must be proven guilty beyond a reasonable doubt; a higher bar
compared to a civil case, which is showing a preponderance (most) of evidence
o Civil: in a civil case, one person or entity sues another; e.g. one company could sue another for a
trademark violation
A civil case is typically about monetary damages, and doesn't involve criminality
In a civil case, a preponderance of evidence is required to secure a victory; differing from criminal
cases, where a suspect is innocent until proven guilty beyond a reasonable doubt
adhering to a specific industry standard or set of standards, such as logging and auditing failed logon
attempts
Because industry standards represent well-understood and widely implemented best practices,
many orgs try to adhere to them even when they are not required to do so in order to improve
security, and reduce operational and other risks
o Regulatory: A regulatory investigation is conducted by a regulatory body, such as the Securities and
Exchange Commission (SEC) or Financial Industry Regulatory Authority (FINRA), against an org suspected
of an infraction
Here the org is required to comply with the investigation, e.g., by not hiding or destroying
evidence
1.7 Develop, document, and implement security policy, standards, procedures and guidelines (OSG-9 Chpt 1)
The top tier of a formalized hierarchical organization security documentation is the security policy
o Policy: docs created by and published by senior management describing organizational strategic goals
o A security policy is a document that defines the scope of security needed by the org, discussing assets
that require protection and the extent to which security solutions should go to provide the necessary
protections
o It defines the strategic security objectives, vision, and goals and outlines the security framework of the
organization
Acceptable User Policy: the AUP is a commonly produced document that exists as part of the overall security
documentation infrastructure
o This policy defines a level of acceptable performance and expectation of behavior and activity; failure to
comply with the policy may result in job action warnings, penalties, or termination
Security Standards, Baselines and Guidelines: once the main security policies are set, the remaining security
documentation can be crafted from these policies
o Policies: these are high-level documents, usually written by the management team; policies are
mandatory, and a policy might provide requirements, but not the steps for implementation
o Standards: specific mandates explicitly stating expectations of performance/conformance; more
descriptive than policies, standards define compulsory requirements for the homogenous use of
hardware, software, technology, and security controls, uniformly implemented throughout the org
o Baseline: defines a minimum level of security that every system throughout the organization must meet;
baselines are usually system specific and refer to industry / government standards
e.g. a baseline for server builds would be a list of configuration areas that should be applied to
every server that is built
A Group Policy Object (GPO) in a Windows network is sometimes used to comply with standards;
configuration management solutions can also help you establish baselines and spot
configurations that are not in alignment
o Guideline: offers recommendations on how standards and baselines should be implemented & serves as
the exact actions necessary to implement a specific security mechanism, control, or solution
1.8 Identify, analyze, and prioritize Business Continuity (BC) requirements (OSG-9 Chpt 3)
Business Continuity Planning (BCP): involves assessing the risk to organizational processes and creating policies,
plans, and procedures to minimize the impact those risks might have on the organization if they were to occur
o BCP is used to maintain the continuous operation of a business in the event of an emergency, with a goal
Resilience: (e.g. within a data center and between sites or data centers)
Recovery: if a service becomes unavailable, you need to recover it as soon as possible
BCP vs DR:
o BCP activities are typically strategically focused at a high level and center themselves on business
fault tolerance
The overall goal of BCP is to provide a quick, calm, and efficient response in the event of an emergency and to
enhance a company's ability to quickly recover from a disruptive event
o The BCP process has four main steps (Project scope and planning, Business Impact Analysis,
testing
o Business impact analysis (BIA): Identify the systems and services that the business relies on and assess
the impacts that a disruption or outage would cause, including the impacts on business processes like
accounts receivable and sales
Also decide which systems and services you need to get things running again (think foundational
IT services such as the network and directory, which many other systems rely on)
Finally, prioritize the order in which critical systems and services are recovered or brought back
online.
As part of the BIA, establish:
recovery time objectives (RTO) (how long it takes to recover)
recovery point objectives (RPO) (the maximum tolerable data loss)
maximum tolerable downtime (MTD), (how long an org can survive an interruption of
critical functions) along with the costs of downtime and recovery; AKA MTD (maximum
tolerable downtime)
o Continuity planning: The first two phases of the BCP process (project scope and planning and the
business impact analysis) focus on determining how the BCP process will work and prioritizing the
business assets that need to be protected against interruption
The next phase of BCP development, continuity planning, focuses on the development and
implementation of a continuity strategy to minimize the impact realized risks might have on
protected assets
There are two primary subtasks involved in continuity planning:
Strategy development
Provisions and processes
The goal of this process is to create a continuity of operations plan (COOP), which focuses on
how an org will carry out critical business functions starting shortly after a disruption occurs and
extending up to one month of sustained operations
BCP plan now needs sr. management buy-in (should be endorsed by the org's top exec)
BCP team should create an implementation schedule, and all personnel involved should receive
training on the plan
The top priority of BCP and DRP is people: Always prioritize people's safety; get people out of harm's way, and
then address IT recovery and restoration issues
1.9 Contribute to and enforce personnel security policies and procedures (OSG-9 Chpt 2)
People are often considered the weakest element in any security solution; no matter what physical or logical
controls are deployed, humans can discover ways of to avoid them, circumvent/subvert them, or disable them
o Malicious actors are routinely targeting users with phishing and spear phishing campaigns, social
o People can also become a key security asset when they are properly trained and are motivated to protect
Candidate screening and hiring: To properly plan for security, you should have standards in
place for job descriptions, job classification, work tasks, job responsibilities, prevention of
collusion, candidate screening, background checks, security clearances, employment agreements,
and nondisclosure agreements
screening employment candidates thoroughly is a key part of the hiring process
be sure to conduct a full background check that includes a criminal records check, job
history verification, education verification, certification validation and confirmation of
other accolades when possible
o Employment agreement: specifies job duties, expectations, rate of pay, benefits and info about
termination; sometimes, such agreements are for a set period (for example, in a contract or short-term
job).
Employment agreements facilitate termination when needed for an underperforming employee
The more info and detail in an employment agreement, the less risk (risk of a wrongful
termination lawsuit, for example) the company has during a termination proceeding
e.g. a terminated employee might take a copy of their email with them without thinking of it as
stealing, but they are less likely to do so if an employment agreement or another policy
document clearly prohibits it
creating documented processes allowing the new employee to be integrated quickly and
consistently
o Transfer: an employee moves from one job to another, likely requiring adjusted account access to
o Termination or offboarding: offboarding is the removal of an employee's identity from the IAM system,
once that person has left the org; can also be an element used when an employee transfers into a new
role
whether cordial or abrupt, the ex-employee should be escorted off the premises and not allowed
to return
1.9.4 Vendor, consultant, and contractor agreements and controls
o Orgs commonly outsource many IT functions, particularly data center hosting, contact-center support,
o Compliance: the act of confirming or adhering to rules, policies, regulations, standards, or requirements
o Compliance enforcement: the application of sanctions or consequences for failing to follow policy,
o Personally identifiable information (PII) about employees, partners, contractors, customers and others
should be stored in a secure way, accessible only to those who require the information to perform their
jobs
o Orgs should maintain a documented privacy policy outlining the type of data covered by the policy and
o Threats: any potential occurrence that many cause an undesirable or unwanted outcome for a specific
asset; they can be intentional or accidental; loosely think of a threat as a weapon that could cause harm to
a target
o Vulnerability: the weakness in an asset, or weakness (or absence) of a safeguard or countermeasure; a
o Risk: the possibility or likelihood that a threat will exploit a vulnerability to cause harm to an asset and the
severity of damage that could result; the > the potential harm, the > the risk
o Threats and vulnerabilities are related: a threat is possible when a vulnerability is present
Threat Vectors/ Attack Surface: the path or means by which an attack or attacker can gain
access to a target in order to cause harm
o Risk Assessment: used to identify the risks and set criticality priorities, and then risk response is used to
Single Loss Expectancy (SLE) – expected dollar loss if a risk occurs one time
SLE = AV x EF
Annualized Rate of Occurrence (ARO) – the number of times a risk is expected to occur each
year
Annualized Loss Expectancy (ALE) – the expected dollar loss from a risk in a given year
ALE = SLE x ARO
o Addressing either the threat or threat agent or vulnerability directly results in a reduction of risk (known
as threat mitigation)
o All IT systems have risk; all orgs have risk; there is no way to elminiate 100% of all risks
Instead upper management must decide which risks are acceptable, and which are not; There are
two primary risk-assessment methodologies:
Quantitative Risk Analysis: assigns real dollar figures to the loss of an asset and is based
on mathematical calculations
Qualitative Risk Analysis: assigns subjective and intangible values to the loss of an asset
and takes into account perspectives, feelings, intuition, preferences, ideas, and gut
reactions
The goal of risk assessment is to identify risks (based on asset-threat parings) and rank them in
order of criticality
o Risk response: the formulation of a plan for each identified risk; for a given risk, you have a choice for a
Risk Deterrence: deterrence is the process of implementing deterrents for would-be violators of
security and policy
the goal is to convince a threat agent not to attack;
e.g. implementing auditing, security cameras, and warning banners; using security guards
Risk Avoidance: determining that the impact or likelihood of a specific risk is too great to be
offset by potential benefits, and not performing a particular business function due to that
determination; the process of selecting alternate options or activities that have less associated risk
than the default, common, expedient, or cheap option
Risk Acceptance: the result after a cost/benefit analysis determines that countermeasure costs
would outweigh the possible cost of loss due to a risk
also means that management has agreed to accept the consequences/loss if the risk is
realized
Risk Rejection: an unacceptable possible response to risk is to reject risk or ignore risk; denying
that risk exists and hoping that it will never be realized are not valid prudent due care/due
diligence responses to risk
Risk Transference: paying an external party to accept the financial impact of a given risk
o Inherent Risk: the level of natural, native, or default risk that exists in an environment, system, or product
prior to any risk management efforts being performed (AKA initial or starting risk); this is the risk
identified by the risk assessment process
o Residual Risk: consists of threats to specific assets against which management chooses not to implement
(the risk that management has chosen to accept rather than mitigate); risk remaining after security
controls have been put in place
o Risk Appetite: the amount of residual risk the org is will to accept.
o Conceptual Total Risk Formula: threats * vulnerabilities * asset value = total risk
o Conceptual Residual Risk Formula: total risk - controls gap = residual risk
o Risk should be reassessed on a periodic basis to maintain reasonable security because security changes
over time
For exam prep, understand how the concepts are integrated into your environment; this is not a
step-by-step technical configuration, but the process of the implementation — where you start, in
which order it occurs and how you finish
Bear in mind that security should be designed to support and enable business tasks and functions
security controls, countermeasures, and safeguards can be implemented administratively,
logically / technically, or physically
these 3 categories should be implemented in a conceptual layered defense-in-depth
manner to provide maximum benefit
based on the concept that policies (part of administrative controls) drive all aspects of
security and thus form the initial protection layer around assets
then, logical and technical controls provide protection against logical attacks and exploits
then, physical controls provide protection against real-world physical attacks against
facilities and devices
requirements
o Physical: security mechanisms focused on providing protection to the facility and real world objects
o Deterrent: a deterrent control is deployed to discourage security policy violations; deterrent and
preventative controls are similar, but deterrent controls often depend on individuals being convinced not
to take an unwanted action
o Compensating: a compensating control is deployed to provide various options to other existing controls,
o Corrective: a corrective control modifies the environment to return systems to normal after an unwanted
or unauthorized activity as occurred; it attempts to correct any problems resulting from a security incident
o Recovery: An extension of corrective controls but have more advanced or complex abilities; a recovery
control attempts to repair or restore resources, functions, and capabilities after a security policy violation
recovery controls typically address more significant damaging events compared to corrective
controls, especially when security violations may have occurred
o Directive: A directive control is deployed to direct, confine, or control the actions of subjects to force or
o Periodically assess security and privacy controls: what’s working, what isn’t
As part of this assessment, the existing documents should be thoroughly reviewed, and some of
the controls tested randomly
A report is typically produced to show the outcomes and enable the org to remediate deficiencies
Often, security and privacy control assessment are performed and/or validated by different teams,
with the privacy team handling the privacy aspects
o If a security breach occurs, monitored systems and data become valuable from a forensics perspective;
rrom the ability to derive root cause of an incident to making adjustments to minimize the chances of
reoccurance
1.10.8 Reporting
o Risk Reporting is a key task to perform at the conclusion of risk analysis (i.e. production and presentation
of a summarizing report)
o A Risk Register or Risk Log is a document that inventories all identified risks to an org or system or within
an individual project
A risk register is used to record and track the activities of risk management, including:
identifying risks
evaluating the severity of, and prioritizing those risks
o Risk analysis is performed to provide upper management with the details necessary to decide which risks
should be mitigated, which should be transferred, which should be deterred, which should be avoided,
and which should be accepted
o An Enterprise Risk Management (ERM) program can be evaluated using an RMM
o Risk Maturity Model (RMM): assesses the key indicators and activities of a mature, sustainable, and
repeatable risk management process, typically relating the assessment of risk maturity against a five-level
model such as:
Ad hoc: a chaotic starting point from which all orgs initiate risk management
Preliminary: loose attempts are made to follow risk management processes, but each
department may perform risk assessment uniquely
Integrated: risk management operations are integrated into business processes, metrics are used
to gather effectiveness data, and risk is considered an element in business strategy decisions
Optimized: risk management focuses on achieving objectives rather than just reacting to external
threats; increased strategic planning is geared toward business success rather than just avoiding
incidents; and lessons learned are re-integrated into the risk management process
1.10.10 Risk frameworks
o A risk framework is a guide or recipe for how risk is to be accessed, resolved, and monitored
o NIST established the Risk Management Framework (RMF) and the Cybersecurity Framework (CSF): the
CSF is a set of guidelines for mitigating organizational cybersecurity risks, based on existing standards,
guidelines, and practices
o The RMF is intended as a risk management process to identify and respond to threats, and is defined in
Select an initial set of controls for the system and tailor the controls as needed to reduce
risk to an acceptable level based on an assessment of risk
Implement the controls and describe how the controls are employed within the system
and its environment of operation
Assess the controls to determine if the controls are implemented correctly, operating as
intended, and producing the desired outcomes with respect to satisfying the security and
privacy requirements
Authorize the system or common controls based on a determination that the risk to
organizational operations and assets, individuals, and other organizations, and the nation
is acceptable
Monitor the system and associated controls on an on-going basis to include assessing
control effectiveness, documenting changes to the system and environment of operation,
conducting risk assessments and impact analysis, and reporting the security and privacy
posture of the system
o There are other risk frameworks, such as the British Standard BS 31100 -- be familiar with frameworks and
their goals
1.11 Understand and apply threat modeling concepts and methodologies (OSG-9 Chpt 1)
Threat Modeling: security process where potential threats are identified, categorized, and analyzed; can be
performed as a proactive measure during design and development or as an reactive measure once a product has
been deployed
o Threat modeling identifies the potential harm, the probability of occurrence, the priority of concern, and
A defensive approach to threat modeling takes place during the early stages of development; the method is based
on predicting threats and designing in specific defenses during the coding and crafting process
o Security solutions are more cost effective in this phase than later; this concept should be considered a
o Tampering: any action resulting in unauthorized changes or manipulation of data, whether in transit or in
storage
o Repudiation: the ability of a user or attacker to deny having performed an action or activity by
o Denial of Service (DoS): an attack that attempts to prevent authorized use of a resource; this can be done
o Elevation of privilege: an attack where a limited user account is transformed into an account with greater
Process for Attack Simulation and Threat Analysis (PASTA): a seven-stage threat modeling methodology:
o Stage I: Definition of the Objectives (DO) for the Analysis of Risk
Visual, Agile, and Simple Threat (VAST): a threat modeling concept that integrates threat and risk management
into an Agile programming environment on a scalable basis
Part of the job of the security team is to identify threats, using different methods:
o Focus on attackers: this is a useful method in specific situations;
o e.g. suppose that a developer’s employment is terminated, and that post-offboarding and review of
developer’s computer, a determination is made that the person was disgruntled and angry
understanding this situation as a possible threat, allows mitigation steps to be taken
o Focus on assets: an org’s most valuable assets are likely to be targeted by attackers
o Focus on software: orgs that develop applications in house, and can be viewed as part of the threat
landscape; the goal isn’t to identify every possible attack, but to focus on the big picture, identifying risks
and attack vectors
Understanding threats to the org allow the documentation of potential attack vectors; diagramming can be used
to list various technologies under threat
Reduction analysis: with a purpose of gaining a greater understanding of the logic of a product and interactions
with external elements includes breaking down a system into five core elements: trust boundaries, data flow paths,
input points, privileged operations, and security control details; AKA decomposing the application, system, or
environment
1.12 Apply Supply Chain Risk Management (SRM) concepts (OSG-9 Chpt 1)
reputable organizations that disclose their practices and security requirements to their business
partners (not necessarily to the public)
o Each link in the chain should be responsible and accountable to the next link in the chain; each handoff is
from a supposedly trusted source but the supply chain behind the source could have been compromised
and asset poisoned or modified
During document review, your goal is to thoroughly review all the architecture, designs,
implementations, policies, procedures, etc.
A good understanding of the current state of the environment, especially to understand any
shortcomings or compliance issues prior to integrating the IT infrastructures
The level of access and depth of information obtained is usually proportional to how closely the
companies will work together
minimum security requirements are your company’s security requirements, in other cases, new minimum
security requirements need to be established
In such scenarios, the minimum security requirements should have a defined period
1.12.4 Service-level requirements
o Service Level Agreements (SLAs): companies have SLAs for internal operations (such as how long it
takes for the helpdesk to respond to a new ticket), for customers (such as the availability of a public-
facing service) and for partner orgs (such as how much support a vendor provides a partner)
All SLAs should be reviewed; a company sometimes has an SLA standard that should be applied,
when possible, to the service level agreements as part of working with another company
this can sometimes take time, as the acquiring company might have to support
established SLAs until they expire or are up for renewal
1.13 Establish and maintain a security awareness, education, and training program (OSG-9 Chpt 2)
1.13.1 Methods and techniques to present awareness and training (e.g., social engineering, phishing, security
champions, gamification)
o Before actual training takes place, user security awareness needs to take place; from there, training, or
teaching employees to perform their work tasks and to comply with the security policy can begin
All new employees require some level of training so that they will be able to comply with all
standards, guidelines, and procedures mandated by the security policy
Education is a more detailed endeavor in which students/users learn much more than they
actually need to know to perform their work tasks
Education is most often associated with users pursuing certification or seeking job promotion
o Employees need to understand what to be aware of (e.g. types of threats, such as phishing and free USB
sticks), how to perform their jobs securely (e.g. encrypt sensitive data, physically protect valuable assets)
and how security plays a role in the big picture (company reputation, profits,and losses)
Training should be mandatory and provided both to new employees and yearly (at a minimum)
for ongoing training
Routine tests of operational security should be performed (such as phishing test campaigns,
tailgating at company doors and social engineering tests)
Social engineering: while many orgs don’t perform social engineering campaigns (testing
employees using benign social engineering attempts) as part of security awareness, it is likely to
gain traction.
outside of campaigns, presenting social engineering scenarios and information is a
common way to educate
Phishing: phishing campaigns are popular, and many orgs use third-party services to routinely
test their employees with fake phishing emails
such campaigns produce valuable data, such as the percentage of employees who open
the phishing email, the percentage who open attachments or click links, and the
percentage who report the fake phishing email as malicious
Security champions: the term “champion” has been gaining ground; orgs often use it to designate
a person on a team who is a subject matter expert in a particular area or responsible for a specific
area
e.g. somebody on the team could be a monitoring champion — they have deep
knowledge around monitoring and evangelize the benefits of monitoring to the team or
other teams
a security champion is a person responsible for evangelizing security, helping bring
security to areas that require attention, and helping the team enhance their skills
Gamification: legacy training and education are typically based on reading and then answering
multiple-choice questions to prove knowledge; gamification aims to make training and education
more fun and engaging by packing educational material into a game
gamification has enabled organizations to get more out of the typical employee training
1.13.2 Periodic content reviews
o Threats are complex, so training needs to be relevant and interesting to be effective; this means updating
training materials and changing out the ways which security is tested and measured
if you always use the same phishing test campaign or send it from the same account on the same
day, it isn’t effective, and the same applies to other materials.
instead of relying on long/detailed security documentation for training and awareness, consider
using internal social media tools, videos and interactive campaigns
o Time and money must be allocated for evaluating the company’s security awareness and training; the
company should track key metrics, such as the percentage of employees who click on a fake phishing
campaign email links
Part 1 introduces risk and risk terminology from the lens of the (ISC)² Official Study Guide
Since the primary goal of risk management is to identify potential threats against an organizaton's assets, and
bring those risks into alignment with an organization's risk appetite, in Part2, we cover the threat assessment -- a
process of examining and evaluating cyber threat sources with potential system vulnerabilities
o we look at how a risk assessment helps drive our understanding of risk by pairing assets and their
In the third installment, we review the outcome of the risk assessment process, looking at total risk, allowing us to
determine our response to each risk/threat pair and perform a cost/benefit review of a particular safeguard or
control
o we look at the categories and types of controls and the idea of layering them to provide several different