Cissp LMRG 2024
Cissp LMRG 2024
Domain 1:
Security and Risk Management
IN
include:
NF
TE
GR
© 2024, CertMike.com 1
Prepared exclusively for louisejohncacot@gmail.com Transaction: 0141072519
CISSP Last Minute Review
Domain 1:
Security and Risk Management
© 2024, CertMike.com 2
Prepared exclusively for louisejohncacot@gmail.com Transaction: 0141072519
CISSP Last Minute Review
Domain 2:
Asset Security
Information should be classified based upon its Collect only data that is necessary for legitimate
sensitivity to the organization. Assets should be business purposes. This is known as data minimization.
classified based upon the classification of information Data should be retained no longer than necessary. Use
that they store, process, and transmit. sanitization technology to ensure that no traces of data
remain on media (data remnance) before discarding it.
Common classes of sensitive information include:
• Erasing performs a delete operation on a file but the
Personally identifiable information (PII) which data remains on disk.
uniquely identifies individuals. • Clearing overwrites the data with random values to
ensure that it is sanitized.
Protected health information (PHI) which includes
individual health records. Data Role Responsibilities
Data Owner Senior-level executive who establishes rules and
Proprietary information which contains trade secrets. determines appropriate controls for information.
Data Controller Organization or person within an organization
Data State Description who determines the purpose and means of data
processing. Special significance under GDPR.
Data at Rest Data stored on a system or media device
Data Custodian Individuals who are responsible for managing data
Data in Motion Data in transit over a network and data security controls for an organization.
This role is commonly found within IT teams.
Data in Use Data being actively processed in memory
Data Processor An organization that handles information on
behalf of another organization, typically a
business-to-business relationship.
TOP SECRET HIGHLY SENSITIVE Data User Individuals who interact with information during
the normal course of business.
Data Subject Individuals who may be individually identified
INCREASING SENSITIVITY
SECRET SENSITIVE
maintained by an organization.
IV
ME
AT
RN
E
SE
VE
© 2024, CertMike.com 3
Prepared exclusively for louisejohncacot@gmail.com Transaction: 0141072519
CISSP Last Minute Review
Domain 2:
Asset Security
© 2024, CertMike.com 4
Prepared exclusively for louisejohncacot@gmail.com Transaction: 0141072519
CISSP Last Minute Review
Domain 3:
Security Architecture and Engineering
Least privilege is a security principle that says that In asymmetric encryption, users each have their own
users should have the minimum set of permissions public/private keypair. Keys are used as follows:
necessary to carry out their job functions.
Confidentiality Digital Signature
Separation of duties requires that no single individual
Sender Encrypts with… Recipient’s public key Sender’s private key
have the ability to perform two separate functions that,
when combined, may undermine security. Recipient Decrypts with… Recipient’s private key Sender’s public key
Cryptographic Description
Two-person control requires the concurrence of two Attack
individuals to perform a single sensitive function.
Brute Force Attempts to guess the decryption key by using
random attempts (brute force) to guess all possi-
The defense-in-depth principle requires the use of ble key values until the correct one is found.
overlapping controls to meet the same control objective,
Ciphertext Attacks that work when the attacker only has
protecting against the failure of an individual control. Only access to the ciphertext.
Known Attacks that require the attacker to have access
Fail securely is a design principle that requires that Plaintext to both the ciphertext and the plaintext used to
systems default to a secure state when security create that ciphertext in an attempt to determine
mechanisms fail, preventing anyone from obtaining the decryption key.
unauthorized access. Chosen Attacks that require the attacker to have the ability
Ciphertext to generate ciphertext of their own choosing.
The zero trust model of network architecture says that Chosen Attacks that require the attacker to have the
security decisions should not be made based upon a Plaintext ability to generate ciphertext from plaintext of
user’s network location but should instead be based upon their own choosing.
that user’s identity and other contextual information. Frequency Attacks that analyze the number of times different
Analysis characters appear in the ciphertext in an attempt
The seven pillars of the zero-trust model are: to determine the decryption key.
1. User
2. Device Anything encrypted with one key from a pair may only
3. Network & Environment be decrypted with the other key from that same pair.
4. Application & Workload
5. Data Symmetric Cryptography Asymmetric Cryptography
6. Automation & Orchestration Requires Requires
7. Visibility & Analytics
n(n-1)
keys 2n keys
2
The two basic cryptographic operations are substitution
which modifies characters and transposition, which
moves them around. Secure symmetric algorithms include 3DES, AES, IDEA,
and Blowfish. DES is not secure.
Symmetric encryption uses the same shared secret
key for encryption and decryption. Secure asymmetric algorithms include RSA, El Gamal,
and elliptic curve (ECC).
© 2024, CertMike.com 5
Prepared exclusively for louisejohncacot@gmail.com Transaction: 0141072519
CISSP Last Minute Review
Domain 3:
Security Architecture and Engineering
Quantum computing uses the principles of quantum Dedicated System High Compartmented Multilevel
mechanics to perform computing tasks. Quantum Users must be Yes Yes Yes No
cryptography applies quantum computing to encryption cleared for
highest level of
and decryption and may have the ability to defeat odern info processed by
encryption algorithms when fully implemented. system.
Users must have Yes Yes No No
access approval
The Diffie-Hellman algorithm may be used for secure for all info
exchange of symmetric keys. processed.
Users must have Yes No No No
Hashes are one-way functions that produce a unique need to know all
info processed by
value for every input and cannot be reversed. system.
Digital certificates use the X.509 standard and contain Two serious issues can occur when users are granted
a copy of an entity’s public key. They are digitally signed limited access to information in databases or other
by a certificate authority (CA). repositories. Aggregation attacks occur when a user is
able to summarize individual records to detect trends
Transport Layer Security (TLS) is the replacement that are confidential. Inference attacks occur when a
for Secure Sockets Layer (SSL) and uses public key user is able to use several innocuous facts in combination
cryptography to exchange a shared secret key used to to determine, or infer, more sensitive information.
secure web traffic and other network communications.
Mantraps use a set of double doors to restrict physical
The Trusted Computing Base (TCB) is the secure core access to a facility.
of a system that has a secure perimeter with access
enforced by a reference monitor. TCP is a connection-oriented protocol, while UDP is
a connectionless protocol that does not guarantee
CPUs support two modes of operation: user mode delivery.
for standard applications and privileged mode for
processes that require direct access to core resources. TCP Three-Way Handshake
© 2024, CertMike.com 6
Prepared exclusively for louisejohncacot@gmail.com Transaction: 0141072519
CISSP Last Minute Review
Domain 4:
Communication and Network Security
DNS converts between IP addresses and domain names. When deploying services in the cloud, organizations
ARP converts between MAC addresses and IP addresses. may choose from three major cloud strategies:
NAT converts between public and private IP addresses. • Software-as-a-Service (SaaS) deploys entire
applications to the cloud. The customer is only
Wi-Fi networks should be secured with WPA2 or WPA3 responsible for supplying data and manipulating the
encryption rather than WEP or WPA. WPA2 uses the application.
CCMP protocol, while WPA3 uses the simultaneous • Infrastructure-as-a-Service (IaaS) sells basic
authentication of equals (SAE) in conjunction with AES building blocks, such as servers and storage. The
cryptography. customer manages the operating system and
configures and installs software.
Network switches generally work at layer 2 and • Platform-as-a-Service (PaaS) provides the customer
connect directly to endpoints or other switches. with a managed environment to run their own
Switches may also create virtual LANs (VLANs) to software without concern for the underlying hardware.
further segment internal networks at layer 2.
© 2024, CertMike.com 7
Prepared exclusively for louisejohncacot@gmail.com Transaction: 0141072519
CISSP Last Minute Review
Domain 4:
Communication and Network Security
Port(s) Service Most Virtual Private Networks (VPN) use either TLS
or IPsec. IPsec uses Authentication Headers (AH) to
20, 21 FTP
provide authentication, integrity and nonrepudiation
22 SSH and Encapsulating Security Payload (ESP) to provide
confidentiality.
23 Telnet
© 2024, CertMike.com 8
Prepared exclusively for louisejohncacot@gmail.com Transaction: 0141072519
CISSP Last Minute Review
Domain 5:
Identity and Access Management
The core activities of identity and access management are: Organizations often use centralized access control
• Identification where a user makes a claim of identity. systems to streamline authentication and authorization
• Authentication where the user proves the claim of and to provide users with a single sign on (SSO)
identity. experience. These solutions often leverage Kerberos
• Authorization where the system confirms that the which uses a multi step logon process:
user is permitted to perform the requested action. 1. User authenticates to a client on his or her device.
• Accounting where the system tracks user activity 2. Client sends the authentication credentials to the
Key Distribution Center (KDC).
In access control systems, we seek to limit the access 3. KDC verifies the credentials and creates a ticket
that subjects (e.g. users, applications, processes) have granting ticket (TGT) and sends it to the user.
to objects (e.g. information resources, systems) 4. Client makes a service access request to the KDC
using the TGT.
Access controls work in three different fashions: 5. KDC verifies the TGT, creates a service ticket (ST) for
• Technical (or logical) controls use hardware the user to use with the service, and sends the ST to
and software mechanisms, such as firewalls and the user.
intrusion prevention systems, to limit access. 6. User sends the ST to the service.
• Physical controls, such as locks and keys, limit 7. Service verifies the ST with the KDC and grants access.
physical access to controlled spaces.
• Administrative controls, such as account reviews,
provide management of personnel and business
practices. FAR
Multifactor authentication systems combine authentication
FRR
technologies from two or more of the following categories:
Error Rate
© 2024, CertMike.com 9
Prepared exclusively for louisejohncacot@gmail.com Transaction: 0141072519
CISSP Last Minute Review
Domain 5:
Identity and Access Management
The Security Assertion Markup Language (SAML) Brute force attacks against password systems try to
provides an open standard for different entities to guess all possible passwords. Dictionary attacks refine
exchange authentication and authorization information this approach by testing combinations and permutations
when performing federation. of dictionary words. Rainbow table attacks precompute
hash values for use in comparison. Salting passwords
OAuth is an authorization standard that allows users to with a random value prior to hashing them reduces the
log into applications using credentials provided by other effectiveness of rainbow table attacks.
identity providers without providing the application
with those credentials. OpenID Connect is a consumer- Man-in-the-middle attacks intercept a client’s initial
focused implementation of OAuth used by Google and request for a connection to a server and proxy that
other cloud service providers. connection to the real service. The client is unaware
that they are communicating through a proxy and the
The implicit deny principle says that any action that is attacker can eavesdrop on the communication and
not explicitly authorized for a subject should be denied. inject commands.
© 2024, CertMike.com 10
Prepared exclusively for louisejohncacot@gmail.com Transaction: 0141072519
CISSP Last Minute Review
Domain 6:
Security Assessment and Testing
Security tests verify that a control is functioning • Common Platform Enumeration (CPE)
properly. Security assessments are comprehensive • Extensible Configuration Checklist Description
reviews of the security of a system, application, or other Format (XCCDF)
tested environment. • Open Vulnerability and Assessment Language (OVAL)
Security audits use testing and assessment techniques Network discovery scanning uses tools like nmap to
but are performed by independent auditors. There are check for active systems and open ports. Common
three types of security audits: scanning techniques include:
• Internal audits are performed by an organization’s • TCP SYN scans send a single packet with the SYN flag set.
internal audit staff, normally led by a Chief Audit • TCP Connect scans attempt to complete the three
Executive who reports directly to the CEO. way handshake.
• External audits are performed by an outside • TCP ACK scans seek to impersonate an established
auditing firm. connection.
• Third-party audits are conducted by, or on behalf • Xmas scans set the FIN, PSH, and URG flags.
of, another organization, such as a regulator.
Network vulnerability scanning first discovers active
Organizations that provide services to other organizations services on the network and then probes those services
may conduct service organization control (SOC) audits for known vulnerabilities. Web application vulnerability
under SSAE 18. These engagements produce two different scans use tools that specialize in probing for web
types of reports: application weaknesses.
• Type I reports provide a description of the controls
in place, as described by the audited organization, The vulnerability management workflow includes three
and the auditor’s opinion whether the controls basic steps: detection, remediation, and validation.
described are sufficient. The auditor does not test
the controls. Penetration testing goes beyond vulnerability scanning and
• Type II reports results when the auditor actually attempts to exploit vulnerabilities. It includes five steps:
tests the controls and provides an opinion on their
effectiveness.
Planning
© 2024, CertMike.com 11
Prepared exclusively for louisejohncacot@gmail.com Transaction: 0141072519
CISSP Last Minute Review
Domain 6:
Security Assessment and Testing
There are three different types of penetration tests: Static testing evaluates software code without
• During white box penetration tests, testers have full executing it, while dynamic testing executes the code
access to information about the target systems. during the test. Fuzz testing supplies invalid input to
• During black box penetration tests, testers conduct applications in an attempt to trigger an error state.
their work without any knowledge of the target
environment. Interface testing evaluates the connections between
• Gray box tests reside in the middle, providing different system components.
testers with partial knowledge about the environment.
Misuse case testing evaluates known avenues of attack
Cybersecurity exercises use several different types of in an application.
teams:
• Red teams simulate attackers, exploiting Test coverage analysis metrics evaluate the
vulnerabilities and penetrating the defenses of their completeness of testing efforts using the formula:
own organization’s networks and systems
• Blue teams defend against red team attacks, by (use cases tested)
test coverage =
detecting, responding to, and mitigating threats (all use cases)
• Purple teams bring together the red and blue teams
to facilitate information sharing and learning from Common criteria for test coverage analysis include:
the exercise. • Branch coverage (if statements tested under all
conditions)
Code review provides an important software assurance • Condition coverage (logical tests evaluated under
tool that allows peer review by fellow developers for all inputs)
security, performance, and reliability issues. • Function coverage (each function tested).
• Loop coverage (every loop executed multiple times,
Fagan inspections are a formal code review process once, and not at all)
that follows a rigorous six-step process with formalized • Statement coverage (every line of code executed)
entry and exit parameters for each step:
Planning
Overview
Preparation
Inspection
Rework
Follow UP
© 2024, CertMike.com 12
Prepared exclusively for louisejohncacot@gmail.com Transaction: 0141072519
CISSP Last Minute Review
Domain 7:
Security Operations
Security professionals are often called upon to participate Cybersecurity incident response efforts follow this process:
in a variety of investigations:
• Criminal investigations look into the violation of a
criminal law and use the beyond a reasonable doubt Detection
standard of proof.
• Civil investigations examine potential violations of
civil law and use the preponderance of the evidence Lessons
Response
standard. Learned
• Regulatory investigations examine the violation of
a private or public regulatory standard.
• Administrative investigations are internal to an Remediation Mitigation
organization, supporting administrative activities.
The best evidence rule states that, when using a Intrusion Prevention Monitor a host or network for signs
System of intrusion and attempt to block
document as evidence, the original document must be malicious traffic automatically.
used unless there are exceptional circumstances. The
Security Information & Aggregate and correlate security
parol evidence rule states that a written agreement is Event Management System information received from other systems.
assumed to be the complete agreement.
Firewall Restricts network traffic to authorized
connections.
Forensic investigators must take steps to ensure that
Application Whitelisting Limits applications to those on an
they do not accidentally tamper with evidence and approved list.
that they preserve the chain of custody documenting
Application Blacklisting Blocks applications on an unapproved list.
evidence handling from collection until use in court.
Sandbox Provides a safe space to run potentially
malicious code.
The disaster recovery process begins when operations
are disrupted at the primary site and shifted to an Honeypot System that serves as a decoy to
attract attackers.
alternate capability. The process only concludes when
normal operations are restored. Honeynet Unused network designed to capture
probing traffic.
User and Entity Behavior Uses advanced analytics to identify
Analytics (UEBA) and assess abnormal user or device
behavior
© 2024, CertMike.com 13
Prepared exclusively for louisejohncacot@gmail.com Transaction: 0141072519
CISSP Last Minute Review
Domain 7:
Security Operations
Backups provide an important disaster recovery control. When managing the physical environment, you should
Remember that there are three major categories of backup: be familiar with common power issues:
© 2024, CertMike.com 14
Prepared exclusively for louisejohncacot@gmail.com Transaction: 0141072519
CISSP Last Minute Review
Domain 8:
Software Development Security
The waterfall model of software development is fairly rigid, While the agile approach eschews this rigidity for
allowing the process to return only to the previous step: a series of incremental deliverables created using a
process that values:
System • Individuals and interactions instead of processes
Requirements
and tools
Software • Working software instead of comprehensive
Requirements
documentation
Preliminary
• Customer collaboration instead of contract
Design
negotiation
Detailed
• Responding to change instead of following a plan
Design
© 2024, CertMike.com 15
Prepared exclusively for louisejohncacot@gmail.com Transaction: 0141072519
CISSP Last Minute Review
Domain 8:
Software Development Security
© 2024, CertMike.com 16
Prepared exclusively for louisejohncacot@gmail.com Transaction: 0141072519