9780138293086_Sample
9780138293086_Sample
6. Under the book listing, click on the Access Bonus Content link.
When you register your book, your Pearson Test Prep practice test access code will
automatically be populated with the book listing under the Registered Products tab.
You will need this code to access the practice test that comes with this book. You can
redeem the code at PearsonTestPrep.com. Simply choose Pearson IT Certifica-
tion as your product group and log into the site with the same credentials you used
to register your book. Click the Activate New Product button and enter the access
code. More detailed instructions on how to redeem your access code for both the
online and desktop versions can be found on the companion website.
If you have any issues accessing the companion website or obtaining your Pearson
Test Prep practice test access code, you can contact our support team by going to
pearsonitp.echelp.org.
This page intentionally left blank
CompTIA® Security+
SY0-701 Cert Guide
Lewis Heuermann
CompTIA® Security+ SY0-701 Cert Guide GM K12, Early Career
Lewis Heuermann and Professional
Copyright © 2024 by Pearson Education, Inc. Learning
Hoboken, New Jersey Soo Kang
All rights reserved. No part of this book shall be reproduced, stored in a retrieval
system, or transmitted by any means, electronic, mechanical, photocopying, record- Director, ITP Product
ing, or otherwise, without written permission from the publisher. No patent liability Management
is assumed with respect to the use of the information contained herein. Although
every precaution has been taken in the preparation of this book, the publisher and Brett Bartow
author assume no responsibility for errors or omissions. Nor is any liability assumed
for damages resulting from the use of the information contained herein. Executive Editor
Please contact us with concerns about any potential bias at Nancy Davis
https://www.pearson.com/report-bias.html.
Development Editor
ISBN-13: 978-0-13-829308-6
ISBN-10: 0-13-829308-2 Ellie C. Bru
Library of Congress Cataloging-in-Publication Data: 2024931504
Managing Editor
$PrintCode
Sandra Schroeder
Trademarks
Senior Project Editor
All terms mentioned in this book that are known to be trademarks or service marks
have been appropriately capitalized. Pearson IT Certification cannot attest to the Tonya Simpson
accuracy of this information. Use of a term in this book should not be regarded as
affecting the validity of any trademark or service mark. Copy Editor
Kitty Wilson
Warning and Disclaimer
Every effort has been made to make this book as complete and as accurate as pos- Indexer
sible, but no warranty or fitness is implied. The information provided is on an “as is”
basis. The author and the publisher shall have neither liability nor responsibility to Timothy Wright
any person or entity with respect to any loss or damages arising from the informa-
tion contained in this book. Proofreader
Barbara Mack
Special Sales
For information about buying this title in bulk quantities, or for special sales opportuni- Technical Editor
ties (which may include electronic versions; custom cover designs; and content particular Chris Crayton
to your business, training goals, marketing focus, or branding interests), please contact
our corporate sales department at corpsales@pearsoned.com or (800) 382-3419. Publishing Coordinator
For government sales inquiries, please contact governmentsales@pearsoned.com. Cindy Teeters
For questions about sales outside the U.S., please contact intlcs@pearson.com.
All terms mentioned in this book that are known to be trademarks or service marks Cover Designer
have been appropriately capitalized. Pearson IT Certification cannot attest to the Chuti Prasertsith
accuracy of this information. Use of a term in this book should not be regarded as
affecting the validity of any trademark or service mark. Compositor
Microsoft and/or its respective suppliers make no representations about the suitability codeMantra
of the information contained in the documents and related graphics published as part
of the services for any purpose. All such documents and related graphics are provided
“as is” without warranty of any kind. Microsoft and/or its respective suppliers hereby
disclaim all warranties and conditions with regard to this information, including all
warranties and conditions of merchantability, whether express, implied or statutory,
fitness for a particular purpose, title and non-infringement. In no event shall Microsoft
and/or its respective suppliers be liable for any special, indirect or consequential dam-
ages or any damages whatsoever resulting from loss of use, data or profits, whether in
an action of contract, negligence or other tortious action, arising out of or in connec-
tion with the use or performance of information available from the services.
The documents and related graphics contained herein could include technical inac-
curacies or typographical errors. Changes are periodically added to the information
herein. Microsoft and/or its respective suppliers may make improvements and/or
changes in the product(s) and/or the program(s) described herein at any time. Partial
screenshots may be viewed in full within the software version specified.
Microsoft® and Windows® are registered trademarks of the Microsoft Corporation
in the U.S.A. and other countries. Screenshots and icons reprinted with permission
from the Microsoft Corporation. This book is not sponsored or endorsed by or af-
filiated with the Microsoft Corporation.
Contents at a Glance
Introduction xxxix
Online elements
APPENDIX B Study Planner
GLOSSARY OF KEY TERMS
Table of Contents
Introduction xxxix
Physical Security 24
Bollards/Barricades 24
Access Control Vestibules 26
Fencing 27
Video Surveillance 28
Security Guards 28
Access Badges 29
Lighting 30
Sensors 30
Deception and Disruption Technology 31
Chapter Review Activities 32
Review Key Topics 32
Define Key Terms 33
Review Questions 33
Chapter 3 Understanding Change Management’s Security Impact 37
“Do I Know This Already?” Quiz 37
Foundation Topics 41
Business Processes Impacting Security Operations 41
Approval Process 41
Ownership 41
Stakeholders 42
Impact Analysis 42
Test Results 42
Backout Plan 42
Maintenance Window 43
Standard Operating Procedure 43
Technical Implications 43
Allow Lists 44
Block Lists/Deny Lists 44
Restricted Activities 44
Downtime 45
Service Restart 45
Application Restart 46
Legacy Applications 46
Dependencies 46
Table of Contents ix
Documentation 47
Updating Diagrams 47
Updating Policies/Procedures 48
Version Control 48
Chapter Review Activities 49
Review Key Topics 49
Define Key Terms 49
Review Questions 49
Chapter 4
Understanding the Importance of Using Appropriate Cryptographic
Solutions 53
“Do I Know This Already?” Quiz 53
Foundation Topics 58
Public Key Infrastructure (PKI) 58
Public Key 58
Private and Public Key 58
Encryption 59
Level 59
Full Disk 59
Partition 60
File 60
Volume 60
Database 60
Record 61
Transport/Communication 61
Encryption at Rest, in Transit/Motion, and in Processing 61
Symmetric Versus Asymmetric Encryption 62
Key Exchange 64
Algorithms 65
Key Length 66
Tools 67
Trusted Platform Module 67
Hardware Security Module 68
Key Management System 68
Secure Enclave 69
Obfuscation 70
x CompTIA Security+ SY0-701 Cert Guide
Steganography 70
Audio Steganography 71
Video Steganography 71
Image Steganography 72
Tokenization 72
Data Masking 74
Hashing 75
Salting 76
Digital Signatures 76
Key Stretching 77
Blockchain 78
Open Public Ledger 78
Certificates 79
Certificate Authorities 79
Certificate Revocation Lists 81
Online Certificate Status Protocol (OCSP) 82
Self-Signed 83
Third-Party 89
Root of Trust 89
Certificate-Signing Request 90
Wildcard 90
Chapter Review Activities 90
Review Key Topics 90
Define Key Terms 91
Review Questions 91
Chapter 13
Understanding the Importance of Resilience and Recovery in
Security Architecture 287
“Do I Know This Already?” Quiz 287
Foundation Topics 291
High Availability 291
Key Components 291
Cloud Environments 291
Site Considerations 292
Platform Diversity 294
Multi-Cloud System 294
Continuity of Operations 294
Capacity Planning 295
Testing 296
Tabletop Exercises 296
Failover 297
Simulations 298
Parallel Processing 299
Backups 299
Power 301
Uninterruptible Power Supply (UPS) 301
Generators 301
Chapter Review Activities 302
Review Key Topics 302
Define Key Terms 302
Review Questions 303
Documentation 310
Deployment 310
Ongoing Maintenance 311
Hardening Targets 311
Wireless Devices 315
Mobile Solutions 318
Mobile Device Management 318
MDM Security Feature Concerns: Application and Content
Management 320
MDM Security Feature Concerns: Remote Wipe, Geofencing,
Geolocation, Screen Locks, Passwords and PINs, and Full Device
Encryption 322
Deployment Models 325
Secure Implementation of BYOD, CYOD, and COPE 326
Connection Methods 328
Secure Implementation Best Practices 330
Wireless Security Settings 331
Wi-Fi Protected Access 3 (WPA3) 332
Remote Authentication Dial-In User Service (RADIUS)
Federation 332
Cryptographic Protocols 334
Authentication Protocols 335
Application Security 336
Input Validations 337
Secure Cookies 337
Static Code Analysis 338
Code Signing 339
Sandboxing 340
Monitoring 340
Chapter Review Activities 341
Review Key Topics 341
Define Key Terms 342
Review Questions 342
Table of Contents xxi
Chapter 15
Understanding the Security Implications of Hardware, Software, and
Data Asset Management 345
“Do I Know This Already?” Quiz 345
Foundation Topics 348
Acquisition/Procurement Process 348
Assignment/Accounting 350
Monitoring/Asset Tracking 350
Inventory 351
Enumeration 351
Disposal/Decommissioning 351
Sanitization 352
Destruction 352
Certification 353
Data Retention 353
Chapter Review Activities 354
Review Key Topics 354
Define Key Terms 354
Review Questions 354
Chapter 16
Understanding Various Activities Associated with Vulnerability
Management 357
“Do I Know This Already?” Quiz 357
Foundation Topics 360
Identification Methods 360
Vulnerability Scan 360
Application Security 362
Threat Feed 364
Open-Source Intelligence (OSINT) 364
Proprietary/Third-Party 364
Information-Sharing Organization 364
Dark Web 365
Penetration Testing 366
Responsible Disclosure Program 366
Bug Bounty Program 367
System/Process Audit 367
xxii CompTIA Security+ SY0-701 Cert Guide
Analysis 367
Confirmation 368
Prioritize 368
Common Vulnerability Scoring System (CVSS) 368
Practical Utility 370
Common Vulnerability Enumeration (CVE) 370
Vulnerability Classification 370
Exposure Factor 371
Environmental Variables 372
Industry/Organizational Impact 372
Risk Tolerance 372
Vulnerability Response and Remediation 374
Patching 374
Insurance 374
Segmentation 374
Compensating Controls 375
Exceptions and Exemptions 375
Validation of Remediation 376
Rescanning 376
Audit 376
Verification 376
Reporting 377
Chapter Review Activities 378
Review Key Topics 378
Define Key Terms 379
Review Questions 379
Chapter 17
Understanding Security Alerting and Monitoring Concepts and
Tools 381
“Do I Know This Already?” Quiz 381
Foundation Topics 383
Monitoring and Computing Resources 383
Activities 386
Log Aggregation 386
Alerting 388
Scanning 389
Table of Contents xxiii
Reporting 390
Archiving 391
Alert Response and Remediation/Validation 392
Tools 392
Security Content Automation Protocol (SCAP) 393
Benchmarks 395
Agents/Agentless 397
Security Information and Event Management (SIEM) 397
NetFlow 399
Antivirus Software 400
Data Loss Prevention (DLP) 401
Simple Network Management Protocol (SNMP) Traps 401
Vulnerability Scanners 403
Chapter Review Activities 405
Review Key Topics 405
Define Key Terms 406
Review Questions 406
Chapter 18
Modifying Enterprise Capabilities to Enhance Security 409
“Do I Know This Already?” Quiz 409
Foundation Topics 413
Firewall 413
Rules 414
Access Lists 415
Ports/Protocols 416
Screened Subnet 417
IDS/IPS 418
Trends 419
Signatures 419
Web Filter 421
Operating System Security 423
Implementation of Secure Protocols 424
DNS Filtering 427
Email Security 427
File Integrity Monitoring 429
xxiv CompTIA Security+ SY0-701 Cert Guide
DLP 429
Network Access Control (NAC) 430
Endpoint Detection and Response (EDR)/Extended Detection and Response
(XDR) 430
User Behavior Analytics 431
Chapter Review Activities 432
Review Key Topics 432
Define Key Terms 433
Review Questions 433
Chapter 19
Implementing and Maintaining Identity and Access
Management 435
“Do I Know This Already?” Quiz 435
Foundation Topics 439
Provisioning/De-provisioning User Accounts 439
Permission Assignments and Implications 439
Identity Proofing 441
Federation 441
Single Sign-On (SSO) 443
Lightweight Directory Access Protocol (LDAP) 443
OAuth 444
Security Assertion Markup Language 446
Interoperability 448
Attestation 449
Access Controls 450
Role-Based Access Control 450
Rule-Based Access Control 451
Mandatory Access Control 451
Discretionary Access Control 452
Attribute-Based Access Control (ABAC) 454
Time-of-Day Restrictions 455
Least Privilege 456
Multifactor Authentication (MFA) 456
Implementations 457
Biometrics 457
Hard and Soft Authentication Keys 457
Table of Contents xxv
Acquisition 503
Reporting 505
Preservation 505
E-Discovery 506
Chapter Review Activities 506
Review Key Topics 506
Define Key Terms 506
Review Questions 507
Chapter 22 Using Data Sources to Support an Investigation 509
“Do I Know This Already?” Quiz 509
Foundation Topics 512
Log Data 512
Firewall Logs 513
Application Logs 513
Endpoint Logs 515
OS-Specific Security Logs 515
IPS/IDS Logs 517
Network Logs 518
Metadata 518
Data Sources 521
Vulnerability Scans 522
Automated Reports 522
Dashboards 523
Packet Captures 525
Chapter Review Activities 525
Review Key Topics 525
Define Key Terms 526
Review Questions 526
Processors 551
Custodians/Stewards 552
Chapter Review Activities 553
Review Key Topics 553
Define Key Terms 553
Review Questions 554
Chapter 24 Understanding Elements of the Risk Management Process 557
“Do I Know This Already?” Quiz 557
Foundation Topics 561
Risk Identification 561
Risk Assessment 562
Ad Hoc 562
Recurring 562
One-time 562
Continuous 562
Risk Analysis 563
Qualitative Risk Assessment 565
Quantitative Risk Assessment 565
Probability 567
Data-Driven Decision Making 568
Risk Prioritization 568
Financial Planning 568
Scenario Analysis 568
Communication and Reporting 568
Continuous Monitoring and Adjustment 568
Likelihood 569
Risk Categorization 569
Decision-Making Frameworks 569
Resource Allocation 569
Sensitivity Analysis 569
Stakeholder Communication 569
Exposure Factor 570
Impact 571
xxx CompTIA Security+ SY0-701 Cert Guide
Online Elements
Appendix B Study Planner
Glossary of Key Terms
xxxiv CompTIA Security+ SY0-701 Cert Guide
Dedication
To Katie, my loving wife, whose unwavering support and encouragement have been my constant.
Your ability to keep me caffeinated and focused during those long-day and late-night writing
sessions has been nothing short of miraculous. You were the one who finally convinced me to stop
saying “One day…” when I talked about writing a book and instead say “Today….”
To Dominique, thank you for being a steadfast presence during all those early years of countless
nights I spent on the phone troubleshooting network and server issues. Your patience, encourage-
ment, and understanding during those challenging years played a significant role in my journey.
And to my wonderful children: When people tell you that you “can’t,” it just means they couldn’t.
Keep pushing and keep learning because “can’t” never could do anything.
—Lewis
xxxvi CompTIA Security+ SY0-701 Cert Guide
Acknowledgments
I extend my heartfelt thanks to the Pearson team, whose collective efforts have been
instrumental in bringing this book to fruition. Ellie, your remarkable skill in making
all the pieces of this complex puzzle fit seamlessly together is truly amazing. Chris,
your meticulous attention to detail has elevated the quality of this work beyond my
wildest imagination. Kitty, your sharp copyediting eye and expert grammar makes
the pages sing!
Nancy, you have been the foundation of our team, guiding us with kindness, support,
and an unwavering commitment to our collective goal. You saw something in me
early and helped turn my dream into a reality. To all of my many mentors over the
years, thank you for taking the time to slowly explain things to me when you didn’t
have the time to slow down. Each of you has contributed to this journey in unique
and meaningful ways, and for that, I am eternally grateful.
About the Technical Reviewer xxxvii
Reader Services
Register your copy of CompTIA Security+ SY0-701 Cert Guide for convenient
access to downloads, updates, and corrections as they become available. To start
the registration process, go to www.pearsonitcertification.com/register and log in
or create an account*. Enter the product ISBN 9780138293086 and click Submit.
When the process is complete, you will find any available bonus content under
Registered Products.
*Be sure to check the box that you would like to hear from us to receive exclusive
discounts on future editions of this product.
Introduction xxxix
Introduction
■■ Key Topics: The Key Topic icons indicate important figures, tables, and lists
of information that you should know for the exam. They are interspersed
throughout the chapter and are listed in table format at the end of the chapter.
■■ Key Terms: Key terms without definitions are listed at the end of each
chapter. See whether you can define them and then check your work against
the definitions provided in the glossary.
■■ Review Questions: These questions and answers with explanations are meant
to gauge your knowledge of the subjects covered in the chapter. If an answer
to a question doesn’t come readily to you, be sure to review the corresponding
portion of the chapter.
■■ Practice Exams: Practice exams are included in the Pearson Test Prep prac-
tice test software. These exams test your knowledge and skills in a realistic
testing environment. Take them after you have read through the entire book.
Gain a thorough understanding of each one before moving on to the next one.
The Security+ domains are further broken down into individual objectives. Table I-2
lists the CompTIA Security+ exam objectives and their related chapters in this book.
It does not list the bullets and sub-bullets for each objective.
Objective Chapter(s)
2.5 Explain the purpose of mitigation techniques used to secure the 9
enterprise.
3.1 Compare and contrast security implications of different architecture 10
models.
3.2 Given a scenario, apply security principles to secure enterprise 11
infrastructure.
3.3 Compare and contrast concepts and strategies to protect data. 12
3.4 Explain the importance of resilience and recovery in security architecture. 13
4.1 Given a scenario, apply common security techniques to computing 14
resources.
4.2 Explain the security implications of proper hardware, software, and data 15
asset management.
4.3 Explain various activities associated with vulnerability management. 16
4.4 Explain security alerting and monitoring concepts and tools. 17
4.5 Given a scenario, modify enterprise capabilities to enhance security. 18
4.6 Given a scenario, implement and maintain identity and access 19
management.
4.7 Explain the importance of automation and orchestration related to secure 20
operations.
4.8 Explain appropriate incident response activities. 21
4.9 Given a scenario, use data sources to support an investigation. 22
5.1 Summarize elements of effective security governance. 23
5.2 Explain elements of the risk management process. 24
5.3 Explain the processes associated with third-party risk assessment and 25
management.
5.4 Summarize elements of effective security compliance. 26
5.5 Explain types and purposes of audits and assessments. 27
5.6 Given a scenario, implement security awareness practices. 28
Companion Website
Register this book to get access to the Pearson Test Prep practice test software and
other study materials, as well as additional bonus content. Check this site regularly
for new and updated postings written by the author that provide further insight into
the more troublesome topics on the exam. Be sure to check the box indicting that
you would like to hear from us to receive updates and exclusive discounts on future
editions of this product or related products.
Introduction xliii
NOTE Please note that many of our companion content files can be very large,
especially image and video files.
If you are unable to locate the files for this title by following the preceding steps,
please visit http://www.pearsonitcertification.com/contact and select the Site
Problems/Comments option. Our customer service representatives will assist you.
NOTE After you register your book, your code can always be found in your account
under the Registered Products tab.
xliv CompTIA Security+ SY0-701 Cert Guide
Once you have the access code, to find instructions about both the PTP web app
and the desktop app, follow these steps:
Step 1. Open this book’s companion website as shown earlier in this Introduction
under the heading, “Companion Website.”
Step 2. Click the Practice Test Software button.
Step 3. Follow the instructions listed there for both installing the desktop app
and using the web app.
Note that if you want to use the web app only at this point, just navigate to
pearsontestprep.com, log in using the same credentials used to register your book
or purchase the Premium Edition, and register this book’s practice tests using the
registration code you just found. The process should take only a couple of minutes.
Study mode enables you to fully customize an exam and review answers as you are
taking the exam. This is typically the mode you use first to assess your knowledge
and identify information gaps. Practice Exam mode locks certain customization
options in order to present a realistic exam experience. Use this mode when you are
preparing to test your exam readiness. Flash Card mode strips out the answers and
presents you with only the question stem. This mode is great for late-stage prepa-
ration, when you really want to challenge yourself to provide answers without the
benefit of seeing multiple-choice options. This mode does not provide the detailed
score reports that the other two modes provide, so it is not the best mode for
helping you identify knowledge gaps.
In addition to these three modes, you will be able to select the source of your
questions. You can choose to take exams that cover all of the chapters, or you can
narrow your selection to just a single chapter or the chapters that make up specific
parts in the book. All chapters are selected by default. If you want to narrow your
focus to individual chapters, simply deselect all the chapters and then select only
those on which you wish to focus in the Objectives area.
There are several other customizations you can make to your exam from the exam
settings screen, such as the time allowed for taking the exam, the number of ques-
tions served up, whether to randomize questions and answers, whether to show the
Introduction xlv
Figure Credits
Cover: greenbutterfly/Shutterstock
Figure 2-2: Kyryl Gorlov/123RF
Figure 2-3: Aliaksandr Karankevich/123RF
Figure 2-5: rewelda/Shutterstock
Figure 8-1: WannaCry ransomware
Figure 10-1: Amazon Web Services, Inc
Figures 11-2, 11-9, 19-2, 19-6, 19-9, 22-2–22-4: Microsoft Corporation
Figures 14-2, 14-3: Cisco Systems, Inc
Figure 19-7: Robert Koczera/123RF
Figure 22-1: MaxBelkov
Figure 22-5: Google LLC
Figure 22-6: Tenable®, Inc
Figure 22-7: LogRhythm, Inc
CHAPTER 3
Understanding Change
Management’s Security
Impact
This chapter examines the critical role of change management processes in
fortifying an organization’s cybersecurity posture. Change management is
more than just an administrative task; it is a significant component of audit
and compliance requirements, providing a structured approach for reviewing,
approving, and implementing changes to information systems. Change manage-
ment minimizes unplanned outages due to unauthorized alterations by helping
to manage cybersecurity and operational risks. The process typically involves
well-defined steps, such as requesting, reviewing, approving, or rejecting and
testing, scheduling, implementing, and documenting changes. These steps
can serve as a blueprint for standard operating procedures (SOPs) in change
management, ensuring that each alteration is systematically vetted and executed.
As you will see throughout this chapter, a structured approach is vital for
maintaining the integrity and resilience of security mechanisms in the face of a
constantly evolving threat landscape.
CAUTION The goal of self-assessment is to gauge your mastery of the topics in this
chapter. If you do not know the answer to a question or are only partially sure of
the answer, you should mark that question as wrong for purposes of self-assessment.
Giving yourself credit for an answer you correctly guess skews your self-assessment
results and might provide you with a false sense of security.
Foundation Topics
Approval Process
The approval process is a crucial business procedure that dictates how changes
impacting security are approved and who holds the authority to make such deci-
sions. The approval process typically follows a step-by-step verification process to
ensure that all necessary precautions are considered and the planned change will not
introduce new vulnerabilities.
Ownership
In the context of security, ownership refers to the individual or team that is respon-
sible for specific assets, such as databases or applications, and that is accountable
for their security. Owners are typically responsible for defining an asset’s security
requirements, managing its risk profile, and addressing any vulnerabilities in the
system. A crucial component of recognizing ownership is establishing account-
ability. Ownership ensures that each asset is consistently maintained, protected, and
updated according to the security requirements of a specific system.
42 CompTIA Security+ SY0-701 Cert Guide
Stakeholders
Stakeholders are individuals or groups vested in an organization’s security posture
who can directly impact security procedures and policies. Stakeholders may include
system users, IT staff, management, customers, investors, or any entity that would
be affected by a security breach or whose actions could impact the security posture
of an organization. Involving stakeholders in security decision-making processes can
lead to more comprehensive security solutions, as diverse perspectives help in identi-
fying potential threats and vulnerabilities. Remember that stakeholders can be inter-
nal or external to specific internal business departments or external to the business.
Impact Analysis
Impact analysis is a process that involves assessing the potential effects of changes on
the organization’s security landscape. You may encounter impact analysis in the form
of a business impact analysis (BIA), which we will explore in depth in Chapter 24,
“Understanding Elements of the Risk Management Process.” An impact analysis also
helps in proactively identifying possible security risks or issues to a system. Security
analysts should conduct an impact analysis to better understand how to effectively
allocate resources such as staff, budget, and tools.
Test Results
A test result is an outcome of a specific test, such as a penetration test, vulnerability
assessment, or simulated attack. The test results of newly implemented security mea-
sures play a crucial role in determining the effectiveness of those measures and any
adjustments needed.
Test results offer insights into the strengths and weaknesses of a system’s security,
informing decisions about necessary improvements or adjustments. Essentially,
they serve as a report card for the organization’s cybersecurity measures. It’s crucial
to note what type of test result you are reviewing and how the results were gener-
ated. A test result from a vulnerability scanner will show detailed technical insights
specific to each system and will generally lack bias. A human-generated test result,
such as a result in a cybersecurity risk assessment, might have subjective content and
require additional context to be understood.
Backout Plan
Every change in an IT system or process needs a backout plan—a meticulously
outlined procedure designed to revert any changes that negatively impact security
or business operations. A backout plan is more than just a rollback strategy; it’s a
critical IT service management framework component. A backout plan adheres to a
Chapter 3: Understanding Change Management’s Security Impact 43
predefined action list and should be created before any software or system upgrade,
installation, integration, or transformation occurs. This plan typically includes
detailed steps and techniques for uninstalling a new system and reversing process
changes to a pre-change working state. The objective is to ensure that automated
system business operations continue smoothly, especially if post-implementation
testing reveals that the new system fails to meet expectations. As a best practice,
you should avoid making changes during peak business hours and always have a
comprehensive backout plan.
Maintenance Window
A maintenance window is a designated time frame for performing system updates or
changes that is strategically chosen to minimize disruptions. We used to say, “Main-
tenance on a Friday is guaranteed work on a Saturday.” Choose your maintenance
windows carefully to balance impacts on the business and plan for any unexpected
operational impacts that result from your maintenance.
You might find that in a software as a service (SaaS) company, you need to do main-
tenance on the company’s virtual private network (VPN). Engineers may use the
VPN for secure remote access and use it frequently throughout the day to connect
to development systems, but the usage levels may drop drastically after 6:00 p.m.
You would therefore want to plan your maintenance window from 7:00 p.m. to
minimize outages to any critical work happening at the company.
Technical Implications
Technical implications refer to the potential consequences or effects of a technology-
related decision or event in the cybersecurity landscape. Technical implications could
involve alterations to network infrastructure, modifications to security protocols, or
the need for additional server capacity following the implementation of new software
or systems. It is important to ensure that you understand all technical implications of
any new or existing system to ensure that you can maintain functionality and security
for that system.
44 CompTIA Security+ SY0-701 Cert Guide
Allow Lists
Allow lists, or whitelists, are lists of approved inputs a user or machine can enter on
a system. Using an allow list is an easy and safe way to ensure well-defined inputs
such as numbers, dates, or postal codes because it allows you to clearly specify per-
mitted values and reject everything else. With HTML5 form validation, you get
predefined allow list logic in the built-in data type definitions, so if you indicate that
a field contains an email address, you have ready email validation. If only a handful
of values are expected, you can use regular expressions to explicitly include them on
an allow list.
Using an allow list gets tricky with free-form text fields, where you need some
way to allow the vast majority of available characters, potentially in many different
alphabets. Unicode character categories can be useful for allowing, for example, only
letters and numbers in a variety of international scripts. You should also apply nor-
malization to ensure that all input uses the same encoding, and no invalid characters
are present. An allow list needs to be continuously updated as the company works
with new applications and removes old ones, and a lot of resource time is required to
maintain it. We will explore allow lists in greater detail in Chapter 9, “Understand-
ing the Purpose of Mitigation Techniques Used to Secure the Enterprise.”
Restricted Activities
Restricted activities are specific actions or operations within a computer or network
system that are limited or prohibited to maintain cybersecurity standards. These
Chapter 3: Understanding Change Management’s Security Impact 45
limitations are often defined through allow lists and deny lists, which, as you’ve just
seen, explicitly outline what is permitted and what is not. For example, restricted
activities may include accessing specific system components or downloading unap-
proved software.
Clearly defined restricted activities are crucial for upholding secure environments
and effectively communicating IT systems’ acceptable use to internal and external
stakeholders. These restrictions are commonly introduced during the employee
onboarding process through key documentation like acceptable use policies (AUPs).
In change management, access to critical areas like the production environment and
change management software is typically restricted to authorized personnel only to
ensure that only qualified individuals can make or approve changes, reducing the
risk of unauthorized or harmful modifications.
Downtime
Downtime is time during which a system, network, or software application is
unavailable to end users or completely offline. Downtime can be scheduled, such as
during maintenance windows, as discussed earlier, or it can be unplanned, sometimes
due to technical problems or even cyberattacks. Acceptable downtime might be for
critical system patching or planned upgrades. A common standard of availability is
99.999%, commonly referred to as “five 9s” availability. “Two 9s” would be a system
that guarantees 99% availability in a one-year period, allowing up to 1% down-
time, or 3.65 days of unavailability. You might find that if you leverage third-party
services, you need to ensure that their systems match, or exceed, your published
service-level agreements (SLAs). You may need to implement a change if there is a
misalignment between the SLA you have with your clients and what any third-party
services provide to you. Unplanned downtime can disrupt business operations,
negatively impact employee productivity, and potentially result in data loss. IT pro-
fessionals are often focused on reducing downtime, which is crucial in cybersecurity
and IT management. It’s essential to have strategies to address issues when they hap-
pen and minimize the duration and impact of unplanned downtime.
Planned downtime is needed to conduct IT maintenance activities, software installa-
tion or upgrades, and other activities requiring non-active systems. You might need
to upgrade a firewall on the network, which would require turning off the current
system. To prevent making the network and end users vulnerable, you would sched-
ule downtime, typically in off-hours/non-peak time, to replace the network device.
Service Restart
In your role as an IT or security professional, one task you’ll likely encounter is
a service restart, which involves halting and then reactivating a system service to
46 CompTIA Security+ SY0-701 Cert Guide
Application Restart
Software application restarts are sometimes necessary procedures. An application
restart is like a service restart, but it is concentrated on a specific software applica-
tion. An example you’re no doubt familiar with is an app on your phone freezing and
needing to be restarted to function correctly again.
Application restarts are common in IT and cybersecurity. You may often need to
restart applications or systems to load patches and enforce updates. Again, commu-
nication and coordination with the stakeholders of the application are key.
Legacy Applications
In the course of your career, you will likely encounter older systems still running
on a network for a variety of reasons. Handling legacy applications, which are older
software programs still serving a critical function in an organization, is a typical duty
you might face.
Legacy applications allow you to leverage uncommon technology, and they can be
fun, especially if the original engineers are still working on the system. However,
dealing with legacy applications often requires understanding older technologies
and the specific nuances associated with them, which can be especially challenging if
the original engineers have moved on. It is important to understand any connection
the legacy application requires to function. You might find limitations in the types of
operating systems the organization must maintain if the legacy application requires a
certain OS to run properly.
Dependencies
When working with software components, grasping dependencies is crucial.
Dependencies refer to the relationships where one software component or service
relies on another to function correctly. Think of the roof on a house. The roof may
be supported by large beams of wood or stone columns. If you were to remove any
Chapter 3: Understanding Change Management’s Security Impact 47
of the beams or columns, you would jeopardize the integrity of the roof. Under-
standing dependencies is critical when troubleshooting issues, managing updates,
and implementing changes in the IT environment.
Services, newer applications, and legacy applications are all likely to have critical
dependencies that you need to understand before you do any maintenance on them.
Documentation
An essential part of any IT or cybersecurity professional’s role is the creation and
maintenance of documentation. Documentation is written material that provides
information about a system or process. It might include user guides, technical speci-
fications, or system descriptions. Documentation may also be written for specific
products (for example, product documentation, user guides) or for specific processes
(for example, installation instructions, uninstallation guides, patching processes).
Documentation can also include policies, procedures, standards, and guidelines.
Many organizations have their own security policies that cover critical security top-
ics such as change management and change control policies, information security
policies, acceptable use policies (AUPs), and business continuity planning (BCP)/
disaster recovery policies (DRPs).
Good documentation ensures a clear understanding of system operations, making it
easier to train new staff and troubleshoot issues. It is often a good idea to begin with
documentation when trying to ascertain any dependencies software or a system may
require for operations and to map any dependencies.
Updating Diagrams
In the ever-evolving landscape of your IT environment, the process of updating
diagrams plays a vital role. Updating diagrams is the process of editing current
diagrams of systems or networks and inserting any changes that have occurred since
the diagrams were originally created. As a best practice, you should ensure strong
version control and put a version control number on every diagram. Diagrams can
be visualized as maps or blueprints of your network or flowcharts of a process.
Updating diagrams ensures that everyone has an accurate and current picture of the
systems. This clarity can significantly enhance troubleshooting and system upgrades.
A good configuration management process helps to prevent small or large changes
from going undocumented. Undocumented changes can lead to poor performance,
inconsistencies, or noncompliance and can negatively impact business operations
and security. Poorly documented changes add to instability and downtime. Having
good network diagrams and well-written and up-to-date documentation is crucial
and allows you to not only troubleshoot problems but also respond quickly to
security incidents.
48 CompTIA Security+ SY0-701 Cert Guide
Updating Policies/Procedures
One crucial responsibility you will shoulder is updating policies and procedures. In
the cybersecurity landscape, policies are the rules governing how IT systems are used
and secured, whereas procedures are the specific steps required to implement these
rules. It’s worth noting that policies and procedures are directive controls and help
communicate expectations to an organization. You must continuously revise policies
and procedures to align with technological advancements, environmental shifts, or
system modifications. Doing so ensures smooth, efficient, and secure operation of
your IT infrastructure.
You should generally pay special attention to legacy applications that require unique
user instructions. For instance, a legacy terminal application that is used to manage
network interfaces could inadvertently expose privileged access if a policy changes
but the corresponding procedures are not updated.
Version Control
Understanding and effectively implementing version control is vital in IT and
cybersecurity domains and extends into areas like documentation. Version control is
a system that records changes to a file or set of files over time so that you can recall
specific versions later. It allows you to track modifications, pinpoint when and by
whom changes were made, and, if necessary, revert to an earlier version.
For example, in modern IT environments, code is often checked into a version
control repository like GitLab or GitHub. Each change is integrated and tested
with the rest of the software system. Organizations that lack proper version control
face challenges in tracking bug fixes and security patches. Similarly, vendors and
software providers that lack appropriate version control make it difficult for con-
sumers to correlate, triage, and patch security vulnerabilities. Proper version control
is a best practice and a necessity for maintaining a secure and efficient operational
environment.
Failure to maintain version control can lead to confusion and potential problems.
Consider, for instance, a potential issue when a team member says, “Aren’t we on
version 2.3?” only to discover that the system was updated to version 4.0 weeks ago.
Effective version control not only aids in managing changes and troubleshooting
issues in a collaborative environment but also plays a crucial role in communicating
updates to policies and procedures throughout an organization. It’s an essential com-
ponent of any well-run organization.
Chapter 3: Understanding Change Management’s Security Impact 49
Review Questions
Answer the following review questions. Check your answers with the answer key in
Appendix A.
1. What is the primary purpose of patch management in an organization’s
security operations?
2. What is the role of business processes in security operations?
50 CompTIA Security+ SY0-701 Cert Guide
6. What is an allow list, and what role does it play in system security?
7. What is the downside of relying solely on a block list, or deny list, for input
validation?
8. What are restricted activities in the context of cybersecurity?
D subject, 611
DAC (discretionary access control), tokenization, 72–74, 281
452–454, 538 in transit, 277–278
dark web, 141, 365 in use, 278
dashboard, 522–524 database
DAST (dynamic application security blockchain, 78
testing), 360, 363 encryption, 60
data OVS (Open vSwitch), 200
availability, 140 DCS (distributed control system),
classification, 275–276 212–213
confidential, 275 DDoS (distributed denial-of-service)
-driven decision making, 568 attack, 160
erasure, 613 decentralized system, 202, 548–549
human- and non-human-readable, 275 deception technology
integrity, 19 honeyfile, 32
inventory, 612 honeypot, 31–32
leakage, 207 honeytoken, 32
log, 512 spam honeypot, 31
masking, 74, 281 decision making
in motion, 61 data driven, 568
ownership, 612 framework, 569
private, 276 decommissioning, 183
in processing, 61 asset, 351–352
processor, 612 certification, 353
protection, 139–140 deep web, 365
protection officer, 551 default credentials, 115–116, 185,
regulated, 274 209–210
at rest, 61, 277 defensive penetration testing, 626
restricted, 276 delegation of access, 444
retention, 353, 612–613 deny list, 44, 322
salt, 77–78 DEP (Data Execution Prevention), 130
sanitization, 352 dependency, 46–47
securing deployment, 310
encryption, 279 DER (Distinguished Encoding Rules), 87
geographic restrictions, 279 descriptive metadata, 519
hashing, 279–280 destruction, hardware, 352–353
permission restrictions, 282–283 detection phase, incident response, 495
sensitive, 275 detective controls, 9, 11
sources, 521 deterrent controls, 8
sovereignty, 278 CI/CT (continuous integration/
states, 276–277 continuous testing), 478–479
encryption 701