CISSP Notes
CISSP Notes
CISSP Notes
Incident response
Vulnerability management
Application security
Cloud security
Infrastructure security
One important aspect of this domain is the concept of shared responsibility. Shared
responsibility means all individuals involved take an active role in lowering risk during the
design of a security system. Additional design principles related to this domain, which are
discussed later in the program, include:
Threat modelling
Least privilege
Défense in depth
Fail securely.
Separation of duties
Keep it simple.
Zero trust
Organizations with remote, hybrid, and on-site work environments must ensure data
remains secure, but managing external connections to make certain that remote workers
are securely accessing an organization’s networks is a challenge. Designing network security
controls—such as restricted network access—can help protect users and ensure an
organization’s network remains secure when employees travel or work outside of the main
office.
Essentially, IAM uses what is referred to as the principle of least privilege, which is the
concept of granting only the minimal access and authorization required to complete a task.
As an example, a cybersecurity analyst might be asked to ensure that customer service
representatives can only view the private data of a customer, such as their phone number,
while working to resolve the customer's issue; then remove access when the customer's
issue is resolved.
This domain suggests that organizations conduct security control testing, as well as collect
and analyze data. Additionally, it emphasizes the importance of conducting security audits
to monitor for and reduce the probability of a data breach. To contribute to these types of
tasks, cybersecurity professionals may be tasked with auditing user permissions to validate
that users have the correct levels of access to internal systems.
Security must be incorporated into each element of the software development life cycle,
from design and development to testing and release. To achieve security, the software
development process must have security in mind at each step. Security cannot be an
afterthought.
Performing application security tests can help ensure vulnerabilities are identified and
mitigated accordingly. Having a system in place to test the programming conventions,
software executables, and security measures embedded in the software is necessary. Having
quality assurance and pen tester professionals ensure the software has met security and
performance standards is also an essential part of the software development process. For
example, an entry-level analyst working for a pharmaceutical company might be asked to
make sure encryption is properly configured for a new medical device that will store private
patient data.
Controls
Controls are used alongside frameworks to reduce the possibility and impact of a security
threat, risk, or vulnerability. Controls can be physical, technical, and administrative and are
typically used to prevent, detect, or correct security issues.
Security guards
Firewalls
MFA
Antivirus software
Separation of duties
Authorization
Asset classification
Fail securely
Fail securely means that when a control fails or stops, it should do so by defaulting to its
most secure option. For example, when a firewall fails it should simply close all connections
and block all new ones, rather than start accepting everything.
The security of an application should not rely on keeping the source code secret. Its security
should rely upon many other factors, including reasonable password policies, defense in
depth, business transaction limits, solid network architecture, and fraud and audit controls.
Internal Audit
Internal security audits help security teams identify organizational risk, assess controls, and
correct compliance issues.
Audit questions
What is the audit meant to achieve?
Which assets are most at risk?
Are current controls sufficient to protect those assets?
If not, what controls and compliance regulations need to be implemented?
Considering questions like these can support your ability to complete the next element: a
controls assessment.
Administrative controls are related to the human component of cybersecurity. They include
policies and procedures that define how an organization manages data, such as the
implementation of password policies.
Technical controls are hardware and software solutions used to protect assets, such as the
use of intrusion detection systems, or IDS's, and encryption.
Physical controls refer to measures put in place to prevent physical access to protected
assets, such as surveillance cameras and locks.
Security audits
A security audit is a review of an organization's security controls, policies, and procedures
against a set of expectations. Audits are independent reviews that evaluate whether an
organization is meeting internal and external criteria.
Audit checklist
It’s necessary to create an audit checklist before conducting an audit. A checklist is generally
made up of the following areas of focus:
o List assets that will be assessed (e.g., firewalls are configured correctly, PII is
secure, physical assets are locked, etc.)
o Note how the audit will help the organization achieve its desired goals.
When conducting an internal audit, you will assess the security of the identified
assets listed in the audit scope.
Create a mitigation plan.
A mitigation plan is a strategy established to lower the level of risk and potential
costs, penalties, or other issues that can negatively affect the organization’s security
posture.
The end result of this process is providing a detailed report of findings, suggested
improvements needed to lower the organization's level of risk, and compliance
regulations and standards the organization needs to adhere to.
Control types
Control types include, but are not limited to:
1. Preventative
2. Corrective
3. Detective
4. Deterrent
These controls work together to provide defence in depth and protect assets.
Preventative controls are designed to prevent an incident from occurring in the first
place.
Corrective controls are used to restore an asset after an incident.
Detective controls are implemented to determine whether an incident has occurred or is in
progress.
Deterrent controls are designed to discourage attacks.
More Resources:
Control types
Disaster Recovery Plan
Playbooks
Playbooks ensure that people follow a consistent list of actions in a prescribed way,
regardless of who is working on the case.
Playbooks are generally used alongside SIEM tools. If, for example, unusual user behavior
is flagged by a SIEM tool, a playbook provides analysts with instructions about how to
address the issue.
An incident response playbook is a guide with six phases used to help mitigate and manage
security incidents from beginning to end.
Preparation
Detection & Analysis
Containment
Eradication & Recovery
Post-incident activity
Coordination
GRC Notes
Planning involves developing, creating, and implementing strategies to help the organization
meet its goals. Planning can be broken down into three levels:
Strategic – Strategic planning is designed to lead the entire organization over a long
period of time.
Tactical - Tactical planning is designed to guide a portion of the organization for a
shorter period of time.
Operational - operational planning structures the day-to-day operations of a small
group within the organization, like a department.
Cybersecurity professionals can be grouped into three types based on their focus and
expertise.
Those that define cybersecurity - This group consists of the senior executives
and managers hat handle planning, policy, and risk management.
Those that build cybersecurity - This group consists of the engineers, programmers,
and other technical specialists that create security solutions.
Those that administrate or operate cybersecurity - This group consists of the
cybersecurity managers and analysts responsible for the day-to-day monitoring and
operations of the cybersecurity program. This category includes firewall, VPN, and
IDPS administrators, security operations centre staff, incident response teams, and
pretty much everyone else the organization has that doesn't fall into one of the
previous two categories.
There are two main tools the organization can use to help its employees,
Training programs
Awareness programs.
These are part of a set of programs known as SETA or CyberSETA(Education, Training &
Awareness) programs.
The standard is the more detailed statement of what must be done to comply with policy.
Guidelines are recommendations the user may want to use to help comply with policy.
A procedure is a defined set of steps to comply with the policy and the practice or rather
best practice.