CISM Domain 1 Update 2 New Format
CISM Domain 1 Update 2 New Format
CISM Domain 1 Update 2 New Format
Manager
CISM
CISM Examination
2 Each question contains a "Stem" which is the body of the question and four options
(answer choices). Candidates are asked to choose the correct or best answer.
3 CISM exam questions are developed to test the practical knowledge and the application
of general concepts and standards
1 Read each question carefully and eliminate known incorrect answers. Make the “BEST”
choice possible.
2 Identify key words or phrases in the question (e.g., MOST, BEST or FIRST) before
selecting and recording an answer.
3 Read the provided instructions carefully before attempting to answer questions.
4 Skipping over these directions or reading them too quickly could result in missing
important information and possibly answering incorrectly.
4 Each candidate who completes the CISM exam will receive a score report. This score
report contains a sub-score for each job practice domain.
5 These can be useful in identifying those areas in which further study may be needed,
should retaking the exam be necessary.
6 Grading is based solely on the number of questions answered correctly.
How to get certified?
Submit an application (within five years of the exam passing date) with verified evidence
2 of a minimum of at least five years of cumulative work experience performing the tasks of
a CISM professional. For more information visit ISACA website www.isaca.org
4 Each candidate who completes the CISM exam will receive a score report. This score
report contains a sub-score for each job practice domain.
Information Security
27% Information Security Program 19% Incident Management
Development and Management
Domain 1
accomplish it.
– Understand the purpose of an information security strategy, its objectives and the reasons
and steps required to develop one.
– Understand the meaning, content, creation and use of policies, standards, procedures and
guidelines and how they relate to each other.
– Develop business cases and gain commitment from senior leadership.
– Define governance metrics requirements, selection and creation.
Task Statements
• T1.1 Establish and/or maintain an information security strategy in alignment with organizational goals and objectives
to guide the establishment and/or ongoing management of the information security program.
• T1.2 Establish and/or maintain an information security governance framework to guide activities that support the
information security strategy.
Information Security Governance
• T1.3 Integrate information security governance into corporate governance to ensure that organizational goals and
objectives are supported by the information security program.
• T1.4 Establish and maintain information security policies to guide the development of standards, procedures and
guidelines in alignment with enterprise goals and objectives.
• T1.5 Develop business cases to support investments in information security.
• T1.6 Identify internal and external influences to the organization (e.g., emerging technologies, social media,
business environment, risk tolerance, regulatory requirements, third-party considerations, threat landscape) to
ensure that these factors are continually addressed by the information security strategy.
• T1.7 Gain ongoing commitment from senior leadership and other stakeholders to support the successful
implementation of the information security strategy.
• T1.8 Define, communicate and monitor information security responsibilities throughout the organization (e.g., data
owners, data custodians, end users, privileged or high-risk users) and lines of authority.
• T1.9 Establish, monitor, evaluate and report key information security metrics to provide management with accurate
and meaningful information regarding the effectiveness of the information security strategy.
Effective Info Security
– Providing the structure and framework to optimize allocations of limited security resources
– Providing a level of assurance that critical decisions are not based on faulty information
– Providing a firm foundation for efficient and effective risk management, process improvement, rapid incident
response and continuity management
– Providing greater confidence in interactions with trading partners
– Improving trust in customer relationships
– Protecting the organization’s reputation
– Enabling new and better ways to process electronic transactions
– Providing accountability for safeguarding information during critical business activities, such as mergers and
acquisitions, business process recovery, and regulatory response
– Effective management of information security resources
The Outcome of Information Security Governance
1. Strategic alignment:
Aligning information security with business strategy to support organization
2. Risk Management:
Executing appropriate measures to mitigate risk and reduce potential impacts on information resources to an
Information Security Governance
acceptable level
3. Value Delivery:
Optimizing security investments in support of business objectives
4. Resource Optimization:
Using information security knowledge and infrastructure efficiently and effectively
5. Performance Measurement:
Monitoring and reporting on information security processes to ensure that objectives are achieved
• Boards of directors will be required to make information security an intrinsic part of governance
• This includes monitoring and reporting processes to ensure that governance processes are
effective and compliance enforcement is sufficient to reduce risk to acceptable levels.
• effective information security governance is required to address legal and regulatory requirements
and is becoming mandatory in the exercise of due care
Governance and Business Goals and Objectives
• Corporate governance is the set of • Information security governance is a subset of
responsibilities and practices exercised by the corporate governance.
board and senior management with the goals • It provides strategic direction for security activities and
of: ensures that objectives are achieved.
Information Security Governance
• Risk capacity: Amount of loss an enterprise can tolerate without its continued existence being questioned.
• Risk appetite: The amount of risk that an entity is willing to accept in pursuit of its mission.
Risk Appetite Risk Acceptance
• Risk appetite is an essential element for • Risk acceptance is a formal and explicit process
virtually all aspects of information security as that affirms that the risk requires and warrants no
well as most other aspects of organizational additional response by the organization as long as
Information Security Governance
• IT usually is not the owner of most of the information in its systems; rather, it owns the machinery that
processes it. The information is in IT’s care, control and custody, and, therefore, IT functions as a custodian for
the data owners.
• In the context of information security governance, it is important that the scope and responsibilities of
information security are clearly set forth in the information security strategy and reflected in the policies.
• To be successful, information security to be fully supported by senior management and the various
organizational units. Without clearly defined information security responsibilities, it is impossible to determine
accountability.
Governance Risk and Compliance
the auditee also feels the stress in answering many audit requirements.
• Information security is back bone of all the security related initiatives. Of course information security cannot
be achieved by only looking at technical controls. Physical and environmental control also plays a vital role in
securing information processing assets.
Information Security Governance
Tracking Roles
Practice Question
• Business goals define the strategic direction of the organization. Functional goals define the tactical
direction of a business function. Security goals define the security direction of the organization. What is
the MOST important relationship between these concepts?
Information Security Governance
• • Senior Management
Board of Directors
– Need to be aware of information assets – Ensure needed functions/resources are
available
– Provided with high-level results of risk
– Ensure resources are properly utilized
Information Security Governance
• The business case drives the decision • The formal presentation to senior management is used as a
process means to educate and communicate key aspects of the
– If no longer valid, project should be overall security program. Key points include:
Information Security Governance
Metrics allow the measurement of the From a management perspective, technical metrics cannot
achievement of a process goal. Security metrics provide answers to questions such as:
should tell us about the state or degree of • How secure is the organization?
• How much security is enough?
Information Security Governance
– Measurement
– Attainable
– Relevant
– Timely
• Avoid measuring something simply
because it can be measured.
Metrics at Strategic Level
• The requirement of a good strategic level metric is evaluation of a
• Key goal indicators (KGIs) and key specific control being able to be tracked to a specific business
performance indicators (KPIs) can be requirement. Any control that cannot be tracked directly back to a
useful for process or service goals. specific business requirement is suspect and should be analyzed for
• High-level metrics related to implementing relevancy and possible elimination.
a strategy include: • Indicators of alignment include:
Information Security Governance
• A successful risk management program can be defined as one that efficiently, effectively and
consistently meets expectations and attains defined objectives in maintaining risk at levels acceptable
to management.
• Indicators of appropriate risk management include:
Information Security Governance
– Security resources that are allocated by degree of assessed risk and potential impact
– Protection costs that are aggregated as a function of revenues or asset valuation
– An adequate and appropriate number of controls to achieve acceptable risk and impact levels
– Policies in place that require all controls to be periodically reevaluated for cost, compliance and
effectiveness
– The use and effectiveness of controls
Resource Management Metrics
• Organizations should consider an approach to information security governance that includes an effort
to integrate assurance functions.
• KGIs include:
– No gaps in information asset protection
Information Security Governance
• The action plan(s) must be formulated based on available resources and constraints, including
consideration of relevant legal and regulatory requirements.
• The strategy and action plans must contain provisions for monitoring as well as defined metrics
to determine the level of success.
• This provides feedback to the CISO and steering committee to allow for midcourse correction
and ensure that security initiatives are on track to meet defined objectives.
Practice Questions
• "Sensitive data must be protected to prevent loss, theft, unauthorized access and/or unauthorized
disclosure" is a statement that would MOST likely be found in a:
• A. guideline.
• B. policy.
Information Security Governance
• C. procedure.
• D. standard.
Practice Questions
• The PRIMARY objective for information security program development should be:
• A. creating an information security strategy.
• B. establishing incident response procedures.
Information Security Governance
• Biased evaluation—Easy acceptance of evidence that supports their one’s hypotheses while
contradictory evidence is challenged and, almost invariably, rejected. Critics are often charged with
hostile motives or their competence is impugned.
• Groupthink—Pressure for agreement in team-based cultures
Information Security Strategy Objectives
• The objectives of developing an information security strategy must be defined and metrics developed
to determine if those objectives are being achieved. Typically, the six defined outcomes of security
governance will provide high-level guidance. The six outcomes are:
– Strategic alignment
Information Security Governance
– Impact cost-effectiveness
• Goals help set objectives, which drive strategy
– Should tie to enterprise goals
Asset Classification
• Classification provides the basis for applying protective measures in proportion to the business value, resulting in
more cost-effective controls
• Initial classification can be time consuming
– For large organizations, this can amount to terabytes of useless data and literally thousands of outdated and
Information Security Governance
– Defined desired state makes it easier to identify path from current state
– Risk objectives such as risk appetite and risk tolerance and the organization’s risk culture
• Current State
– What is actually occurring
– Help to identify where the environment falls short of the desired
– Business Impact Analysis can be used a tool to determine the current state
Building the Strategy
• Strategy provides a road map to move from the current state to the desired state
• Path could be long depending on distance between current and desired state
• Should identify:
Information Security Governance
– Available resources
– Available methods
– Constraints
Resources
• Policies • Training
• Standards • Awareness and Education
• Procedures • Audits
• Guidelines • Compliance enforcement
Information Security Governance
• Legal
• Physical
Information Security Governance
• Ethics
• Culture
• Costs
• Personnel
• Organizational structure
• Resources
• Capabilities
• Time
• Risk appetite
Legal and Regulatory Requirements Physical Constraints
• Information security linked to privacy, IP and law
• Include capacity, space, environmental
• Security strategies for different regions may be hazards, etc.
required
• Safety of personnel should also be
• Retention requirements
Information Security Governance
considered
• E-discovery • Often ignored and can lead to
• Treat as any other risk interruptions or breaches
• Disaster recovery should be considered
Ethics and Culture Costs
• Ethics • Justify spending based on a project’s
– Perception of the enterprise’s behavior value.
– Influenced by location and culture • Cost-benefit/financial analysis most
Information Security Governance
• Difficult to measure
• RTOs/RPOs
Strategic Resources
• B. liability.
• C. compliance.
• D. strategy.
Practice question
• The FIRST step to create an internal culture that embraces information security is to:
• A. implement stronger controls.
• B. conduct periodic awareness training.
Information Security Governance
• A non-IT control direct precisely how • Contain information that will be helpful in
something is to be done executing procedures
• Responsibility of operations staff • Enable use of individual judgment
Information Security Governance
framework
– Framework = logical architecture
• Physical architecture implements the logical • Ensures that information security is focused
architecture through policies, standards and on the right goals
controls
Third party resources
Keep in mind:
• If no general framework is used, find a – Controls are not always as effective as
framework that is comprehensive and can be intended
used across the organization – Controls may not address all outcomes
– Changes in technology may render controls
obsolete
IT Controls Non-IT Controls
• Constitute the majority of controls in an
organization • Information security extends beyond IT
• Control objective: “A statement of the desired • Include:
result or purpose to be achieved by – Secure marking, handling and storage
Information Security Governance
• It is MOST important that information security architecture be aligned with which of the following?
• A. Industry good practices
• B. Business goals and objectives
Information Security Governance
Which of the following is the PRIMARY reason to change policies during program development?
A. The policies must comply with new regulatory and legal mandates.
Information Security Governance
• Development of appropriate email policy and investigation & background verification policy
• Policies must be reviewed by HR and Legal for adequacy and Management for culture and approach.
Organization Structure
• Flexible and evolving structure is good for • Whatever may be the structure, the
implementing infosec strategy. responsibilities and objectives will remain same
• Infosec department reporting void of conflict of as they must be:
interest. CISO reporting to CEO or COO would be – Be closely aligned with the business
Information Security Governance
appropriate. objectives
• Centralized or decentralized nature of security also – Be sponsored and approved by senior
plays a role. management
• Centralized approach needs consideration of local – Have monitoring in place
requirement in case of multinational diversity. Local – Have reporting and crisis management in
laws may not allow storage of data outside their place
boundaries. Policies must be tailored to local needs. – Have organizational continuance
• Decentralized approach has advantages in security procedures
is being closer to the user as they understand local – Have risk management in place
issues better.
– Have appropriate security awareness and
• Disadvantage of decentralized approach may be
training programs
that the quality of the security service may vary and
standardization might be difficult due to the training
levels available locally.
Other requirements… Awareness and Education
• A proper risk management and risk assessment exercise to be done to identify, assess, treat
and monitor and report the risk to be developed.
Outsourcing service providers
• From an information security point of view, outsourcing arrangements can present risk that may be
difficult to quantify and potentially difficult to mitigate.
• Providers may operate on different standards and can be difficult to control.
• The security strategy should consider outsourced security services carefully to ensure that they either
Information Security Governance
are not a critical single point of failure or there is a viable backup plan in the event of service provider
failure.
• Risk posed by outsourcing can also materialize as the result of mergers and acquisitions.
• Typically, significant differences in culture, systems, technology and operations between the parties
present a host of security challenges that must be identified and addressed.
Practice Question
• B. Procedures
• C. Guidelines
• D. Standards
Practice Question
• Which of the following are seldom changed in response to technological changes?
• A. Standards
• B. Procedures
Information Security Governance
• C. Policies
• D. Guidelines
Practice Question
• The enactment of policies and procedures for preventing hacker intrusions is an example of an activity
that belongs to:
• A. risk management.
Information Security Governance
• B. compliance.
• C. IT management.
• D. governance.
Practice Question
• An information security strategy presented to senior management for approval MUST incorporate:
• A. specific technologies.
Information Security Governance
• B. compliance mechanisms.
• C. business priorities.
• D. detailed procedures.
Practice Question
• Which of the following is the MOST important information to include in a strategic plan for information
security?
• A. Information security staffing requirements
Information Security Governance
• Which of the following steps should be FIRST in developing an information security plan?
• A. Perform a technical vulnerabilities assessment.
Information Security Governance
• C. Board of directors
• D. Chief information officer
Practice Question
• Information security frameworks can be MOST useful for the information security manager because
they:
• A. provide detailed processes and methods.
Information Security Governance