CISSP-Study-Resources

CISSP Resources

View project on GitHub

Domain-1 Security and Risk Management

  • Glass-Steagall Act: passed in 1933 and separated investment and commercial banking activities in response to involvement in stock market investment
    • The Gramm-Leach-Bliley Act eliminated the Glass-Steagall Act’s restrictions against affiliations between commercial and investment banks in 1999
    • Security Control Assessment (SCA): an evaluation process of the different type of controls such as management, operational and security control within an information system, with the purpose of validation of the requirement of a control, correct implementation, operationally being followed as intended, and result is as desired
      • basically a formal evaluation of a defined set of controls, which may be conducted with the Security Test and Evaluation (ST&E); NIST Special Publication 800-53A Security and Privacy Controls for Federal Information Systems and Organizations ensure the security requirements and enforcement of appropriate security controls
  • RFC 1087: activitiy that is unethical and unacceptable:
    • (a) seeks to gain unauthorized access to the resources of the Internet
    • (b) disrupts the intended use of the Internet
    • (c) wastes resources (people, capacity, computer) through such actions
    • (d) destroys the integrity of computer-based information, and/or
    • (e) compromises the privacy of users

1.1 Understand, adhere to, and promote professional ethics (OSG-9 Chpts 1,19)

  • As a CISSP, you must understand and follow the (ISC)² code of ethics, as well as your organization’s own code
  • 1.1.1 (ISC)² Code of Professional Ethics
    • (ISC)² Code of Professional Ethics – take the time to read the code of ethics
    • At a minimum, know and understand the ethics canons:
      • Protect society, the common good, necessary public trust and confidence, and the infrastructure
        • this is “do the right thing”; put the common good ahead of yourself
        • ensure that the public can have faith in your infrastructure and security
      • Act honorably, honestly, justly, responsibly, and legally
        • always follow the laws
        • but if you find yourself working on a project where conflicting laws from different countries or jurisdictions apply, you should prioritize the local jurisdiction from which you are performing the services
      • Provide diligent and competent service to principles
        • avoid passing yourself as an expert or as qualified in areas that you aren’t
        • maintain and expand your skills to provide competent services
      • Advance and protect the profession
        • don’t bring negative publicity to the profession
        • provide competent services, get training and act honorably
        • think of it like this: If you follow the first three canons in the code of ethics, you automatically comply with this one
  • 1.1.2 Organizational code of ethics
    • You must also support ethics at your organization; this can be interpreted to mean evangelizing ethics throughout the organization, providing documentation and training around ethics, or looking for ways to enhance the existing organizational ethics
      • some organizations might have slightly different ethics than others, so be sure to familiarize yourself with your org’s ethics and guidelines

1.2 Understand and apply security concepts (OSG-9 Chpt 1)

  • 1.2.1 Confidentiality, integrity, and availability, authenticity and nonrepudiation
    • Confidentiality:
      • Principle that objects are not disclosed to unauthorized subjects
      • Concept of measures used to ensure the protection of the secrecy of data, objects, and resources
      • Confidentiality protections prevent disclosure while protecting authorized access
      • Preserving authorized restrictions on information access and disclosure, including the means for protecting personal privacy and prioprietary information
      • Sensitive data, including personally identifiable information (PII) must be kept confidential; confidentiality is different from secrecy
      • Preserving confidentiality means protecting an asset or data, even if it’s not a secret
    • Integrity:
      • Principle that objects retain their veracity and are intentionally modified only by authorized subjects
      • Concept of protecting the reliability and correctness of data; guarding against improper info modification/destruction; includes ensuring non-repudiation and authenticity
      • Integrity protection prevents unauthorized alterations of data
      • Preventing authorized subjects from making unauthorized modifications, such as mistakes
      • Maintaining the internal and external consistency of objects
    • Availability:
      • Principle that authorized subjects are granted timely and uninterrupted access to objects
      • To ensure high availability of services and data, use techniques like failover clustering, site resiliency, automatic failover, load balancing, redundancy of hardware and software components, and fault tolerance
    • Authenticity: ensuring a transmission, message or sender is legitimate
    • Nonrepudiation:
      • Ensures that the subject of activity or who caused an event cannot deny that the event occurred
      • Nonrepudiation is made possible through identification, authentication, authorization, accountability, and auditing
    • AAA Services:
      • Identification: claiming to be an identity when attempting to access a secured area or system
      • Authentication: proving that you are that claimed identity via one or more factors (something you have, something you know, something you are)
      • Authorization: defining the needed resources, permissions (i.e. allow/grant and/or deny) to a resource, and object access for a specific identity or subject
      • Auditing: recording a log of the events and activities related to the system and subjects
      • Accounting: (aka accountability) access control process which records info about attempts by all entities to access resources; reviewing log files to check for compliance and violations in order to hold subjects accountable for their actions, especially violations of organizational security policy

1.3 Evaluate and apply security governance principles (OSG-9 Chpt 1)

  • Security governance: the collection of policies, roles, processes/practices used to make security decisions in an org; related to supporting, evaluating, defining, and directing the security efforts of an org; it involves making sure that security strategies align with business goals, and that they are comprehensive and consistent across the organization
    • Security governance is the implementation of a security solution and a management method that are tightly interconnected
    • There are numerous security frameworks and governance guidelines providing a structured approach to security governance:
      • ISO/IEC 27001: a widely recognized international standard for information security management systems (ISMS); it provides a risk-based approach, and emphasizes coontinual improvement of the ISMS
      • NIST Cybersecurity Framework (CSF): built around six core functions: govern, identify, protect, detect, respond, and recover to provide guidance to industry, government agencies, and other orgs to manage cybersecurity risks
      • SP 800-53: a comprehensive set or catelog of security and privacy controls across multiple security domains, covering areas such as risk management, access control, incident response, and system maintenance
      • SP 800-100: Titled Information Security Handbook: a guide for managers, NIST hasn’t released an update since 2006, although they appear to have an update in progress
      • COBIT (Control Objectives for Information and Related Technologies): COBIT focuses enterprise IT, aligning IT and business strategies, and providing a comprehensive framework for managing risks (see additional below)
      • CIS Critical Security Controls: the CIS (Center for Internet Security) Critical Security Controls provides a prioritize set of actions to defend against threats; it focuses on practical steps to reduce the attack surface, like implementing secure configurations, managing admin privileges, and monitoring logs
      • ITIL (Information Technology Infrastructure Library): ITIL is a set of practices for IT service management (ITSM) that focuses on aligning IT services with business needs; it includes elements of security governance, particularly in managing security incidents, changes, and service continuity, and is often integrated with other frameworks like ISO 27001
  • The security function: the aspect of operating a business that focuses on the task of evaluating and improving security over time
    • To manage security, an org must implement proper and sufficient security governance
    • The act of performing a risk assessment to drive the security policy is the clearest and most direct example of management of the security function
  • Third-party governance: external entity oversight that may be mandated by law, regulation, industry standards, contractual obligation, or licensing requirement; outside investigator or auditors are often involved
  • 1.3.1 Alignment of security function to business strategy, goals, mission, and objectives
    • Security Management Planning: ensures proper creation/implementation/enforcment of a security policy, and alignment with org strategy, goals, mission, and objectives; security management is based on three types of plans: strategic, tactical, and operational
    • Strategic Plan: a strategic plan is a long-term plan (useful for 5 years); it defines the org’s security purpose
      • A strategic plan should include a risk assessment
    • Tactical Plan: mid-term plan (1 year or less) developed to provide more details on accomplishing the goals set forth in the strategic plan
    • Operational Plan: a short-term, highly detailed plan based on strategic or tactical plans
      • Strategy, goals, missions,and objectives — support each other in a heirarchy
      • Objectives: are closest to the ground-level and represent small efforts to help you achieve a mission
      • Missions: represent a collection of objectives, and one or more missions lead to goals; when you reach your goals, you are achieving the strategy
    • A security framework must closely tie to mission and objectives, enabling the business to complete its objectives and advance the mission while securing the environment based on risk tolerance
  • 1.3.2 Organizational processes (e.g., acquistions, divestitures, governance committees)
    • Security governance should address every aspect of an org, including organizational processes of acquisitions, divestitures, and governance
    • Be aware of the risks in acquisitions (since the state of the IT environment to be integrated is unknown, due diligence is key) and divestitures (how to split the IT infrastructure and what to do with identities and credentials)
    • Understand the value of governance committees (vendor governance, project governance, architecture governance, etc.)
    • Executives, managers and appointed individuals meet to review architecture, projects and incidents (security or otherwise),and provide approvals for new strategies or directions
      • The goal is a fresh set of eyes, often eyes that are not purely focused on information security
    • When evaluating a third-party for your security integration, consider the following:
      • on-site assessment
      • document exchange and review
      • process/policy review
      • third-party audit
  • 1.3.3 Organizational Roles and Responsibilities
    • Primary security roles are senior manager, security professional, asset owner, custodian, user, and auditor
    • Senior Manager: has a responsibility for organizational security and to maximize profits and shareholder value
    • Security Professional: has the functional responsibility for security, including writing the security policy and implementing it
    • Asset Owner: responsible for classifying information for placement or protection within the security solution
    • Custodian: responsible for the task of implementing the proscribed protection defined by the security policy and senior management
    • Auditor: responsible for reviewing and verifying that the security policy is properly implemented
  • 1.3.4 Security control frameworks
    • A security control framework: outlines the org’s approach to security, including a list of specific security processes, procedures, and solutions used; it is important in planning the structure of an org’s security solution; many frameworks to choose from, such as:
      • COBIT Control Objectives for Information and Related Technology (“moderately referenced” on the exam):
        • COBIT is a documented set of best IT security practices by ISACA; a “security concept infrastructure” used to organize the complex security solutions of companies
          • COBIT is commonly used as an audit framework for orgs
          • Six key principles:
            • provide stakeholder value
            • holistic approach
            • dynamic governance system
            • governance distinct from management
            • tailored to enterprise needs
            • end-to-end governance system
      • ISO 27000 series (27000, 27001, 27002, etc.).
      • NIST CyberSecurity Framework (CSF)
        • designed for commerical orgs and critical infrastructure, CSF 1.1 consists of five functions:
          • identify
          • protect
          • detect
          • respond
          • recovery
        • note: updated (2024) CSF 2.0 functions:
          • govern
          • identify
          • protect
          • detect
          • respond
          • recover
  • 1.3.5 Due care/due diligence
    • Due diligence: establishing a plan, policy, and process to protect the interests of the organization; due diligence is knowing what should be done and planning for it; understanding your security governance principles (policies and procedures) and the risks to your organization; actions taken by a vendor to demonstrate or provide due care
      • Due diligence often involves:
        • gathering information through discovery, risk assessments and review of existing documentation
        • developing a formalized security structure containing a security policy, standards, baselines guidlines, and procedures
        • documentation to establish written policies
        • disseminating the information to the organization
    • Due care: practicing the individual activities that maintain the due diligence effort; due care is about your legal responsibility within the law or within org policies to implement your org’s controls, follow security policies, do the right thing and make reasonable choices
    • Security documentation is the security policy
    • After establishing a framework for governance, security awareness training should be implemented, including all new hires, who complete the security awareness training as they come on board, and existing employees who should recertify regularly (typically yearly)
    • Due care is the responsible protection of assets
    • Due diligence is the ability to prove due care

1.4 Determine compliance and other requirements (OSG-9 Chpt 4)

  • 1.4.1 Contractual, legal, industry standards, and regulatory requirements
    • Understand the difference between criminal, civil, and administrative law.
      • Criminal law: protects society against acts that violate the basic principles we believe in; violations of criminal law are prosecuted by federal and state governments
      • Civil law: provides the framework for the transaction of business between people and organizations; violations of civil law are brought to the court and argued by the two affected parties
      • Administrative law: used by government agencies to effectively carry out their day-to-day business
    • Compliance: Organizations may find themselves subject to a wide variety of laws, and regulations imposed by regulatory agencies or contractual obligation
      • Payment Card Industry Data Security Standard (PCI DSS) - governs the security of credit card information and is enforced through the terms of a merchant agreement between a business that accepts CC payments, and the bank that processes the business’ transactions
      • Sarbanes-Oxley (SOX) - financial systems may be audited to ensure security controls are sufficient to ensure compliance with SOX
      • Gramm-Leach-Bliley Act (GLBA) - affects banks, insurance companies, and credit providers; included a number of limitations on the types of information that could be exchanged even among subsidiaries of the same corp, and required financial institutions to provide written privacy policies to all their customers
      • Health Insurance Portability and Accountability Act (HIPAA) - privacy and security regulations requiring strict security measures for hospitals, physicians, insurance companies, and other organizations that process or store private medical information about individuals; also clearly defines the rights of individuals who are the subject of medical records and requires organizations that maintain such records to disclose these rights in writing
      • Federal Information Security Management Act (FISMA) - requires federal agencies to implement an information security program that covers the agency’s operations and contractors
      • Computer Fraud and Abuse Act (CFAA) (as amended) - protects computers used by the government or in interstate commerce from a variety of abuses
      • Electronic Communications Privacy Act (ECPA) - in short, makes it a crime to invade the electronic privacy of an individual; passed in 1986 to expand and revise federal wiretapping and electronic eavesdropping provisions, making it a crime to intercept or procure electronic communications, and includes important provisions that protect a person’s wire and electronic communications from being intercepted by another private individual
      • Digital Millennium Copyright Act (DMCA) - prohibits the circumvention of copyright protection mechanisms placed in digital media and limits the liability of internet service providers for the activities of their users
  • 1.4.2 Privacy requirements
    • European Union’s General Data Protection Regulation (GDPR) - replaced Data Protection Directive (DPD), purpose is to provide a single, harmonized law that covers data throughout the EU
      • Lawfulness, fairness, and transparency
      • Purpose Limitation
      • Data Minimization
      • Accuracy
      • Storage Limitation
      • Security
      • Accountability
    • Personal Information Protection and Electronic Documents Act (PIPEDA): Canadian law that governs the use of personal information
    • California Consumer Privacy Act (CCPA)
    • Be familiar with the EU Data Protection Directive
    • Be familiar with the requirements around healthcare data, credit card data and other PII data as it relates to various countries and their laws and regulations
  • 1.5.1 Cybercrimes and data breaches
    • Understand the notification requirements placed on organizations that experience a data breach
    • California’s SB 1386 implemented the first statewide requirement to notify individuals of a breach of their personnel information; all other states eventually followed suit with similar laws
    • Currently, federal law only requires notification of individuals when a HIPAA-covered entity breaches their protected health information (likely to soon change)
    • Before an org expands to other countries, perform due diligence to understand legal systems and what changes might be required to the way that data is handled and secured
    • In particular, be familiar with:
      • Council of Europe Convention on Cybercrime: a treaty signed by many countries that establishes standards for cybercrime policy
      • Laws about data breaches, including notification requirements
      • In the US, the Health Information Technology for Economic and Clinical Health (HITECH) Act requires notification of a data breach in some cases, such as when the personal health information was not protected as required by HIPAA
      • GLBA (Gramm-Leach-Bliley Act) applies to insurance and financial orgs, requiring notification to federal regulators, law enforcement agencies and customers when a data breach occurs
      • Certain states also impose their own requirements concerning data breaches
      • the EU and other countries have their own requirements, for instance, the GDPR has very strict data breach notification requirements: A data breach must be reported to the competent supervisory authority within 72 hours of its discovery
      • Communications Assistance to Law Enforcement Act (CALEA): requires all communication carriers make wiretaps possible for law enforcement officials who have an appropriate court order
      • Some countries do not have any reporting requirements
  • 1.5.2 Licensing and intellectual property (IP) requirements
    • Intellectual property: intangible assets (e.g. software, data)
    • Trademarks: words, slogans, and logos used to identify a company and its products or services
    • Patents: provide protection to the creators of new inventions; a temporary monopoly for producing a specific item such as a toy, which must be novel and unique to qualify for a patent
      • Utility: protect the intellectual property rights of inventors
      • Design: cover the appearance of an invention and last for 15 years; note design patents don’t protect the idea of an invention only its form, and are generally seen as weaker
      • Software: area of on-going controversy; Google vs Oracle; given to rise of “patent trolls”
    • Copyright: protects original works of authoriship, such as books, articles, poems, and songs; exclusive use of artistic, musical or literary works which prevents unauthorized duplication, distribution or modification
    • Licensing: a contract between the software producer and the consumer which limits the use and/or distribution of the software
    • Trade Secrets: trade secret laws protect the operating secrets of a firm; trade secrets are intellectual property that is critical to a business, and significant damage would result if it were disclosed to competitors or the public; the Economic Espionage Act imposes fines and jail sentences on someone found guilty of stealing trade secrets from a US corp
  • 1.5.3 Import/export controls
    • Every country has laws around the import and export of hardware and software; e.g. the US has restrictions around the export of cryptographic technology, and Russia requires a license to import encryption technologies manufactured outside the country
  • 1.5.4 Transborder data flow
    • Orgs should adhere to origin country-specific laws and regulations, regardless of where data resides
    • Also be aware of applicable laws where data is stored and systems are used
    • International Traffic in Arms Regulations (ITAR): a US regulation that was built to ensure control over any export of items such as missiles, rockets, bombs, or anything else existing in the United States Munitions List (USML)
    • Export Administration Regulations (EAR): EAR predominantly focuses on commercial use-related items like computers, lasers, marine items, and more; however, it can also include items that may have been designed for commercial use but actually have military applications
  • 1.5.5 Privacy
    • Many laws include privacy protections for personal data
      • The EU’s GDPR has strong privacy rules that apply to any org anywhere that stores or processes the personal data of EU residents; these individuals must be told how their data is collected and used, and they must be able to opt out
    • The privacy guidelines of the Organization for Economic Co-operation and Development (OECD) require orgs to avoid unjustified obstacles to trans-border data flow, set limits to personal data collection, protect personal data with reasonable security and more
    • Fourth Amendment to the US Constitution: the right of the people to be secure in their persons, houses, papers, effects against unreasonable search and seizure
    • Electronic Communication Privacy Act (ECPA): as amended, protects wire, oral, and electronic communications while those communications are being made, are in transit, and when they are stored on computers; makes it a crime to invade electronic privacy of an individual, and it broadened the Federal Wiretap Act
    • HIPAA: see above
    • HITECH: see above
    • California SB 1386 (2002): immediate disclosure to individuals for PII breach
    • California Consumer Privacy Act (CCPA): The CCPA applies to:
      • For-profit businesses that collect consumers’ personal information (or have others collect personal information for them),
      • Determine why and how the information will be processed
      • Do business in California and meet any of the following:
        • have a gross annual revenue > $25 million;
        • buy, sell, or share the personal information of 100k or more California residents or households; or
        • get 50% or more of their annual revenue from selling or sharing California residents’ personal information
      • The CCPA imposes separate obligations on service providers and contractors (who contract with businesses to process personal info) and other recipients of personal information from businesses
      • The CCPA does not generally apply to nonprofit orgs or government agencies
      • California residents have the right to:
        • (L)imit use and disclosure of personal info
        • (O)pt-out of sale or cross-context advertising
        • (C)orrect inaccurate info
        • (K)now what personal info business have and share
        • (E)qual treatment / nondiscrimination
        • (D)elete info business have on them
    • Children’s Online Privacy Protection Act (COPPA) of 1998:
      • COPPA makes a series of demands on websites that cater to children or knowingly collect information from children:
        • Websites must have a privacy notice that clearly states the types of info they collect and what it’s used for (including whether infor is disclosed to third parties); must also include contact info for site operators
        • Parents must be able to review any info collected from children and permanently delete it from the site’s records
        • Parents must give verifiable consent to the collection of info about children younger than the age of 13 prior to any such collection
    • GLBA: see above
    • US Patriot Act of 2002: enacted following the September 11 attacks with the stated goal of tightening U.S. national security, particularly as it related to foreign terrorism
      • The act included three main provisions:
        • expanded surveillance abilities of law enforcement, including by tapping domestic and international phones
        • easier interagency communication to allow federal agencies to more effectively use all available resources in counterterrorism efforts
        • increased penalties for terrorism crimes and an expanded list of activities which would qualify for terrorism charges
    • Family Education Rights and Privacy Act (FERPA): Grants privacy rights to students over 18, and the parents of minor students
    • EU’s Data Protection Directive (DPD): see above
    • EU’s General Data Protection Regulation (GDPR): key provisions
      • lawfulness, fairness, and transparency
      • purpose limitation
      • data minimization
      • accuracy
      • storage limitation
      • security
      • accountability
    • The EU-US Privacy Shield (formerly the EU-US Safe Harbor agreement): controls data flow from the EU to the United States; the EU has more stringent privacy protections and without the Privacy Shield, personal data flow from the EU to the United States would not be allowed

1.6 Understand requirements for investigation types (i.e., administrative, criminal, civil, regulatory, industry standards) (OSG-9 Chpt 19)

  • An investigation will vary based on incident type; e.g. for a financial services company, a financial system compromise might cause a regulatory investigation; a system breach or website compromise might cause a criminal investigation; each type of investigation has special considerations:
    • Administrative: an administrative investigation has a primary purpose of providing the appropriate authorities with incident information; thereafter, authorities will determine the proper action, if any
      • Administrative investigations are often tied to HR scenarios, such as when a manager has been accused of improprieties
    • Criminal: a criminal investigation occurs when a crime has been committed and you are working with a law enforcement agency to convict the alleged perpetrator; in such a case, it is common to gather evidence for a court of law, and to share the evidence with the defense
      • You need to gather and handle the information using methods that ensure the evidence can be used in court
      • In a criminal case, a suspect must be proven guilty beyond a reasonable doubt; a higher bar compared to a civil case, which is showing a preponderance of evidence
    • Civil: in a civil case, one person or entity sues another; e.g. one company could sue another for a trademark violation
      • A civil case is typically about monetary damages, and doesn’t involve criminality
      • In a civil case, a preponderance of evidence is required to secure a victory; differing from criminal cases, where a suspect is innocent until proven guilty beyond a reasonable doubt
    • Industry Standards: an industry standards investigation is intended to determine whether an org is adhering to a specific industry standard or set of standards, such as logging and auditing failed logon attempts
      • Because industry standards represent well-understood and widely implemented best practices, many orgs try to adhere to them even when they are not required to do so in order to improve security, and reduce operational and other risks
    • Regulatory: A regulatory investigation is conducted by a regulatory body, such as the Securities and Exchange Commission (SEC) or Financial Industry Regulatory Authority (FINRA), against an org suspected of an infraction
      • Here the org is required to comply with the investigation, e.g., by not hiding or destroying evidence

1.7 Develop, document, and implement security policy, standards, procedures and guidelines (OSG-9 Chpt 1)

  • To create a comprehensive security plan, you need the following items: security policy, standards, baselines, guidelines, and procedures
  • The top tier of a formalized hierarchical organization security documentation is the security policy
    • Policy: docs created by and published by senior management describing organizational strategic goals
    • A security policy is a document that defines the scope of security needed by the org, discussing assets that require protection and the extent to which security solutions should go to provide the necessary protections
    • It defines the strategic security objectives, vision, and goals and outlines the security framework of the organization
  • Acceptable User Policy: the AUP is a commonly produced document that exists as part of the overall security documentation infrastructure
    • This policy defines a level of acceptable performance and expectation of behavior and activity; failure to comply with the policy may result in job action warnings, penalties, or termination
  • Security Standards, Baselines and Guidelines: once the main security policies are set, the remaining security docuemntation can be crafted from these policies
    • Policies: these are high-level documents, usually written by the management team; policies are mandatory, and a policy might provide requirements, but not the steps for implementation
    • Standards: specific mandates explicity stating expections of performance/conformance; more descriptive than policies, standards define compulsary requirements for the homogenous use of hardware, software, technology, and security controls, uniformly implemented throughout the org
    • Baseline: defines a minimum level of security that every system throughout the organization must meet; baselines are usually system specific and refer to industry / government standards
      • e.g. a baseline for server builds would be a list of configuration areas that should be applied to every server that is built
      • A Group Policy Object (GPO) in a Windows network is sometimes used to comply with standards; configuration management solutions can also help you establish baselines and spot configurations that are not in alignment
    • Guideline: offers recommendations on how standards and baselines should be implemented & serves as an operational guide for security professionals and users
      • Guidelines are flexible, and can be customized for unique systems or conditions; they state which security mechanism should be deployed instead of prescribing a specific product or control; they are not complusory; suggested practices and expectations of activity to best accomplish tasks and goals
    • Procedure (AKA Standard Operating Procedure or SOP): detailed, step-by-step how-to doc that describes the exact actions necessary to implement a specific security mechanism, control, or solution

1.8 Identify, analyze, and prioritize Business Continuity (BC) requirements (OSG-9 Chpt 3)

  • Business Continuity Planning (BCP): involves assessing the risk to organizational processes and creating policies, plans, and procedures to minimize the impact those risks might have on the organization if they were to occur
    • BCP is used to maintain the continuous operation of a business in the event of an emergency, with a goal to implement a combination of policies, procedures, and processes
    • BCP has four distinct phases:
      • project scope and planning
      • business impact analysis
      • continuity planning
      • approval and implementation
    • Business continuity requires a lot of planning and preparation; actual implementation of business continuity processes occur quite infrequently
    • The primary facets of business continuity are:
      • Resilience: (e.g. within a data center and between sites or data centers)
      • Recovery: if a service becomes unavailable, you need to recover it as soon as possible
      • Contingency: a last resort in case resilience and recovery prove ineffective
  • BCP vs DR:
    • BCP activities are typically strategically focused at a high level and center themselves on business processes and operations
    • DR plans tend to be more tactical and describe technical activities such as recovery sites, backups, and fault tolerance
  • The overall goal of BCP is to provide a quick, calm, and efficient response in the event of an emergency and to enhance a company’s ability to quickly recover from a distruptive event

  • 1.8.2 Develop and document the scope and the plan
    • The BCP process has four main steps:
      1. Project scope and planning
      2. Business Impact Analysis
      3. Continuity planning
      4. Approval and implementation
      • Project scope and planning: Developing the project scope and plan starts with gaining support of the management team, making a business case (cost/benefit analysis, regulatory or compliance reasons etc.) and gaining approval to move forward
        • Next, you need to form a team with representatives from the business as well as IT
        • Next, start with a business continuity policy statement,conduct a business impact analysis (see next item), and then develop the remaining components:
          • preventive controls
          • relocation
          • the actual continuity plan
          • testing
          • training and maintenance
  • 1.8.1 Business Impact Analysis (BIA)
    • Business impact analysis (BIA): Identify the systems and services that the business relies on and assess the impacts that a disruption or outage would cause, including the impacts on business processes like accounts receivable and sales
      • Step 1: Identification of priorities
      • Step 2: Risk identification
      • Step 3: Likelihood assessment
      • Step 4: Resource prioritization
        • deciding which systems and services you need to get things running again (think foundational IT services such as the network and directory, which many other systems rely on)
        • and prioritize the order in which critical systems and services are recovered or brought back online
      • As part of the BIA, establish:
        • recovery time objectives (RTO): how long it takes to recover
        • recovery point objectives (RPO): the maximum tolerable data loss
        • maximum tolerable downtime (MTD): (AKA maximum allowable downtime or MAD) how long an org can survive an interruption of critical functions
        • along with the costs of downtime and recovery
    • Continuity planning: The first two phases of the BCP process (project scope and planning and the business impact analysis) focus on determining how the BCP process will work and prioritizing the business assets that need to be protected against interruption
      • The next phase of BCP development, continuity planning, focuses on the development and implementation of a continuity strategy to minimize the impact realized risks might have on protected assets
      • There are two primary subtasks/phases involved in continuity planning:
        • Strategy development: in this phase, the BCP team determines which risks they will mitigate
        • Provisions and processes: in this phase, the team designs mechanisms and procedures that will mitigate identified risks
      • The goal of this process is to create a continuity of operations plan (COOP), which focuses on how an org will carry out critical business functions starting shortly after a disruption occurs and extending up to one month of sustained operations
    • Approval and implementation:
      • BCP plan now needs sr. management buy-in (should be endorsed by the org’s top exec)
      • BCP team should create an implementation schedule, and all personnel involed should receive training on the plan
  • The top priority of BCP and DRP is people: Always prioritize people’s safety; get people out of harm’s way, and then address IT recovery and restoration issues

1.9 Contribute to and enforce personnel security policies and procedures (OSG-9 Chpt 2)

  • People are often considered the weakest element in any security solution; no matter what physical or logical controls are deployed, humans can discover ways of to avoid them, circumvent/subvert them, or disable them
    • Malicious actors are routinely targeting users with phishing and spear phishing campaigns, social engineering, and other types of attacks, and everybody is a target
    • Once attackers compromise an account, they can use that entry point to move around the network and elevate their privileges
    • People can also become a key security asset when they are properly trained and are motivated to protect not only themselves but the security of the organization as well
    • Part of planning for security includes having standards in place for job descriptions, job classifications, work tasks, job responsibilities, prevention of collusion, candidate screening, background checks, security clearances, employment and nondisclosure agreements
  • 1.9.1 Candidate screening and hiring
    • The following strategies can reduce your risk:
      • Candidate screening and hiring: To properly plan for security, you shold have standards in place for job descriptions, job classification, work tasks, job responsibilities, prevention of collusion, candidate screening, background checks, security clearances, employment agreements, and nondisclosure agreements
        • screening employment candidates thoroughly is a key part of the hiring process
        • be sure to conduct a full background check that includes a criminal records check, job history verification, education verification, certification validation and confirmation of other accolades when possible
        • all references should be contacted
  • 1.9.2 Employement agreements and policies
    • Employment agreement: specifies job duties, expectations, rate of pay, benefits and info about termination; sometimes, such agreements are for a set period (for example, in a contract or short-term job).
      • Employment agreements facilitate termination when needed for an underperforming employee
      • The more info and detail in an employment agreement, the less risk (risk of a wrongful termination lawsuit, for example) the company has during a termination proceeding
      • e.g. a terminated employee might take a copy of their email with them without thinking of it as stealing, but they are less likely to do so if an employment agreement or another policy document clearly prohibits it
      • example employee agreements:
        • non-compete
        • codes of conduct such as an acceptable use policy (AUP), which defines what is and isn’t acceptable acitivty, practice, or use for company equipemnt and resources
        • nondisclosure agreement (NDA), which is a doc used to protect confidential information from being disclosed by a current or former employee
  • 1.9.3 Onboarding, transfers and termination processes
    • Onboarding: process of bringing a new employee into the org
      • creating documented processes allowing the new employee to be intgrated quickly and consistently
    • Transfer: an employee moves from one job to another, likely requiring adjusted account access to maintain appropriate least privilege
    • Termination or offboarding: offboarding is the removal of an employee’s identity from the IAM system, once that person has left the org; can also be an element used when an employee transfers into a new role
      • whether cordial or abrupt, the ex-employee should be escorted off the premises and not allowed to return
  • 1.9.4 Vendor, consultant, and contractor agreements and controls
    • Orgs commonly outsource many IT functions, particularly data center hosting, contact-center support, and application development
    • Info security policies and procedures must address outsourcing secuity and the use of service providers, vendors and consultants
      • e.g. access control, document exchange and review, maintenance, on-site assessment, process and policy review, and Service Level Agreements (SLAs) are examples of outsourcing security considerations
  • 1.9.5 Compliance policy requirements
    • Compliance: the act of confirming or adhering to rules, policies, regulations, standards, or requirements
      • on a personnel level, compliance is related to individual employees following company policies and procedures
      • employees need to be trained on company standards as defined in the security policy and remain in compliance with any contractual obligations (e.g. with PCI DSS)
    • Compliance is a form of administrative or managerial security control
    • Compliance enforcement: the application of sanctions or consequences for failing to follow policy, training, best practices, or regulations
  • 1.9.6 Privacy policy requirements
    • Personally identifiable information (PII) about employees, partners, contractors, customers and others should be stored in a secure way, accessible only to those who require the information to perform their jobs
    • Orgs should maintain a documented privacy policy outlining the type of data covered by the policy and who the policy applies to
    • Employees and contractors should be required to read and agree to the privacy policy upon hire and on a regular basis thereafter (such as annually)

1.10 Understand and apply risk management concepts (OSG-9 Chpt 2)

  • 1.10.1 Privacy policy requirements
    • Risk Management: process of identifying factors that could damage or disclose data, evaluating those factors in light of data value and countermeasure cost, and implementing cost-effective solutions for mitigating or reducing risk
    • Threats: any potential occurrence that many cause an undersirable or unwanted outome for a specific asset; they can be intentional or accidental; loosely think of a threat as a weapon that could cause harm to a target
    • Vulnerability: the weakness in an asset, or weakness (or absense) of a safeguard or countermeasure; a flaw, limitation, error, frailty, or susceptibility to harm
    • Threats and vulnerabilities are related: a threat is possible when a vulnerability is present
      • Threats exploit vulnerabilities, which results in exposure
      • Exposure is risk, and risk is mitigated by safeguards
      • Safeguards protect assets that are endangered by threats
      • Threat Agent/Actors: intentionally exploit vulnerabilities
      • Threat Events: accidential occurrences and intentinoal exploitations of vulnerabilities
      • Threat Vectors: (AKA attack vector) is the path or means by which an attack or attacker can gain access to a target in order to cause harm
      • Exposure: being susceptible to asset loss because of a threat; the potential for harm to occur
      • Exposure Factor (EF): derived from this concept; an element of quantitative risk analysis that represents the percentage of loss than org would experience if a specific asset were violated by a realized risk
      • Single Loss Expectancy (SLE): an element of quantitative risk analysis that represents the cost associated with a single realized risk against a specific asset; SLE = asset value (AV) * exposure factor (EF)
      • Annualized rate of occurrence (ARO): an element of quantitative risk analysis that represent the expected frequency with which a specific threat or risk will occur within a single year
      • Annualized loss expectancy (ALE): an element of quantitative risk analysis that represent the possible yearly cost of all instances of a specific realized threat against a specific asset; ALE = SLE * ARO
      • Safeguard evaluation: ALE for an asset if a safeguard is implemented; ALE before safeguard - ALE with safeguard - annual cost of safeguard, or (ALE1 - ALE2) - ACS
      • Risk: the possiblity or likelihood that a threat will exploit a vulnerability to cause harm to an asset and the severity of damage that could result; the > the potential harm, the > the risk
  • 1.10.1 Risk assessment/analysis
    • Risk Assessment: used to identify the risks and set criticality priorities, and then risk response is used to determine the best defense for each identified risk
    • Risk is threat with a vulnerability
    • Risk = threat * vulnerability (or probability of harm multiplied by severity of harm)
    • Addressing either the threat or threat agent or vulnerability directly results in a reduction of risk (known as threat mitigation)
    • All IT systems have risk; all orgs have risk; there is no way to elminiate 100% of all risks
      • Instead upper management must decide which risks are acceptable, and which are not; there are two primary risk-assessment methodologies:
        • Quantitative Risk Analysis: assigns real dollar figures to the loss of an asset and is based on mathematical calculations
        • Qualitative Risk Analysis: assigns subjective and intangible values to the loss of an asset and takes into account perspectives, feelings, intuition, preferences, ideas, and gut reactions; qualitative risk analys is based more on scenarios than calculations, and threats are ranked to evaluate risks, costs, and effects
      • Most orgs employ a hybrid of both risk assessment methodologies
      • The goal of risk assessment is to identify risks (based on asset-threat parings) and rank them in order of criticality
  • 1.10.3 Risk response
    • Risk response: the formulation of a plan for each identified risk; for a given risk, you have a choice for a possible risk response:
      • Risk Mitigation: reducing risk, or risk mitigation, is the implementation of safeguards, security controls, and countermeasures to reduce and/or eliminate vulnerabilities or block threats
      • Risk Assignment: assigning or transferring risk is the placement of the responsibility of loss due to a risk onto another entity or organization; AKA assignment of risk and transference of risk
      • Risk Deterrence: deterrence is the process of implementing deterrents for would-be violators of security and policy
        • the goal is to convince a threat agent not to attack
        • e.g. implementing auditing, security cameras, and warning banners; using security guards
      • Risk Avoidance: determining that the impact or likelihood of a specific risk is too great to be offset by potential benefits, and not performing a particular business function due to that determiniation; the process of selecting alternate options or activities that have less associated risk than the default, common, expedient, or cheap option
      • Risk Acceptance: the result after a cost/benefit analysis determines that countermeasure costs would outweigh the possible cost of loss due to a risk
        • also means that management has agreed to accept the consequences/loss if the risk is realized
      • Risk Rejection: an unacceptable possible response to risk is to reject risk or ignore risk; denying that risk exists and hoping that it will never be realized are not valid prudent due care/due diligence responses to risk
      • Risk Transference: paying an external party to accept the financial impact of a given risk
    • Inherent Risk: the level of natural, native, or default risk that exists in an environment, system, or product prior to any risk management efforts being performed (AKA initial or starting risk); this is the risk identified by the risk assessment process
    • Residual Risk: consists of threats to specific assets against which management chooses not to implement (the risk that management has chosen to accept rather than mitigate); risk remaining after security controls have been put in place
    • Total Risk: the amount of risk an org would face if no safeguards were implemented
    • Conceptual Total Risk Formula: threats * vulnerabilities * asset value = total risk
    • Controls Gap: amount of risk that is reduced by implementing safeguards, or the difference between total risk and residual risk
    • Conceptual Residual Risk Formula: total risk - controls gap = residual risk
    • Risk should be reassessed on a periodic basis to maintain reasonable security because security changes over time
  • 1.10.4 Countermeasure selection and implementation
    • Countermeasure: AKA a “control” or “safeguard” can help reduce risk
      • For exam prep, understand how the concepts are integrated into your environment; this is not a step-by-step technical configuration, but the process of the implementation — where you start, in which order it occurs and how you finish
      • Bear in mind that security should be designed to support and enable business tasks and functions
        • security controls, countermeasures, and safeguards can be implemented administratively, logically / technically, or physically
        • these 3 categories should be implemented in a conceptual layered defense-in-depth manner to provide maximum benefit
        • based on the concept that policies (part of administrative controls) drive all aspects of security and thus form the initial protection layer around assets
        • then, logical and technical controls provide protection against logical attacks and exploits
        • then, physical controls provide protection against real-world physical attacks against facilities and devices
  • 1.10.5 Applicable types of controls (e.g., preventive, detective, corrective)
    • Administrative: the policies and procedures defined by an org’s security policy and other regulations or requirements
    • Physical: security mechanisms focused on providing protection to the facility and real world objects
    • Preventive: a preventive or preventative control is deployed to thwart or stop unwanted or unauthorized activity from occurring
    • Deterrent: a deterrent control is deployed to discourage security policy violations; deterrent and preventative controls are similar, but deterrent controls often depend on individuals being convinced not to take an unwanted action
    • Detective: a detective control is deployed to discover or detect unwanted or unauthorized activity; detective controls operate after the fact
    • Compensating: a compensating control is deployed to provide various options to other existing controls, to aid in enforcement and support of security policies
      • they can be any controls used in addition to, or in place of, another control
      • they can be a means to improve the effectiveness of a primary control or as the alternative or failover option in the event of a primary control failure
    • Corrective: a corrective control modifies the environment to return systems to normal after an unwanted or unauthorized activity as occurred; it attempts to correct any problems resulting from a security incident
    • Recovery: An extension of corrective controls but have more advanced or complex abilities; a recovery control attempts to repair or restore resources, functions, and capabilities after a security policy violation
      • recovery controls typically address more significant damaging events compared to corrective controls, especially when security violations may have occurred
    • Directive: A directive control is deployed to direct, confine, or control the actions of subjects to force or encourage compliance with security policies
  • 1.10.6 Control assessments (security and privacy)
    • Periodically assess security and privacy controls: what’s working, what isn’t
      • As part of this assessment, the existing documents should be thoroughly reviewed, and some of the controls tested randomly
      • A report is typically produced to show the outcomes and enable the org to remediate deficiencies
      • Often, security and privacy control assessment are performed and/or validated by different teams, with the privacy team handling the privacy aspects
  • 1.10.7 Monitoring and measurement
    • Monitoring and measurement are closely aligned with identifying risks
    • While monitoring is used for more than security purposes, monitoring should be tuned to ensure the org is notified about potential security incidents as soon as possible
    • If a security breach occurs, monitored systems and data become valuable from a forensics perspective; rrom the ability to derive root cause of an incident to making adjustments to minimize the chances of reoccurance
  • 1.10.8 Reporting
    • Risk Reporting is a key task to perform at the conclusion of risk analysis (i.e. production and presentation of a summarizing report)
    • A Risk Register or Risk Log is a document that inventories all identified risks to an org or system or within an individual project
      • A risk register is used to record and track the activities of risk management, including:
        • identifying risks
        • evaluating the severity of, and prioritizing those risks
        • prescribing responses to reduce or eliminate the risks
        • track the progress of risk mitigation
  • 1.10.9 Continuous improvement (e.g., Risk maturity modeling)
    • Risk analysis is performed to provide upper management with the details necessary to decide which risks should be mitigated, which should be transferred, which should be deterred, which should be avoided, and which should be accepted; to fully evaluate risks and subsequently take proper precautions, the following must be analyzed:
      • assets
      • asset valuation
      • threats
      • vulnerabilities
      • exposure
      • risk
      • realized risk
      • safeguards
      • countermeasures
      • attacks
      • breaches
    • An Enterprise Risk Management (ERM) program can be evaluated using an RMM
    • Risk Maturity Model (RMM): assesses the key indicators and activities of a mature, sustainable, and repeatable risk management process, typically relating the assessment of risk maturity against a five-level model such as:
      • Ad hoc: a chaotic starting point from which all orgs initiate risk management
      • Preliminary: loose attempts are made to follow risk management processes, but each department may perform risk assessment uniquely
      • Defined: a common or standardized risk framework is adopted organization-wide
      • Integrated: risk management operations are integrated into business processes, metrics are used to gather effectiveness data, and risk is considered an element in business strategy decisions
      • Optimized: risk management focuses on achieving objectives rather than just reacting to external threats; increased strategic planning is geared toward business success rather than just avoiding incidents; and lessons learned are re-integrated into the risk management process
  • 1.10.10 Risk frameworks
    • A risk framework is a guide or recipe for how risk is to be accessed, resolved, and monitored
    • NIST established the Risk Management Framework (RMF) and the Cybersecurity Framework (CSF): the CSF is a set of guidelines for mitigating organizational cybersecurity risks, based on existing standards, guidelines, and practices
    • The RMF is intended as a risk management process to identify and respond to threats, and is defined in three core, interrelated Special Publications:
      • SP 800-37 Rev 2, Risk Management Framework for Information Systems and Organizations
      • SP 800-39, Managing Information Security Risk
      • SP 800-30 Rev 1, Guide for Conducting Risk Assessments
      • The RMF has 7 steps, and six cyclical phases:
        • Prepare to execute the RMF from an organization and system-level perspective by establishing a context and priorities for managing security and privacy risk
        • Categorize the system and the information processed, stored, and transmitted by the system based on an analysis of the impact of loss
        • Select an initial set of controls for the system and tailor the controls as needed to reduce risk to an acceptable level based on an assessment of risk
        • Implement the controls and describe how the controls are employed within the system and its environment of operation
        • Assess the controls to determine if the controls are implemented correctly, operating as intended, and producing the desired outcomes with respect to satisfying the security and privacy requirements
        • Authorize the system or common controls based on a determination that the risk to organizational operations and assets, individuals, and other organizations, and the nation is acceptable
        • Monitor the system and associated controls on an on-going basis to include assessing control effectiveness, documenting changes to the system and environment of operation, conducting risk assessments and impact analysis, and reporting the security and privacy posture of the system
      • See my overview article, The NIST Risk Management Framework
    • There are other risk frameworks, such as the ISO/IEC 31000, ISO/IEC 31004, COSO, Risk IT, OCTAVE, FAIR, and TARA; be familiar with frameworks and their goals

1.11 Understand and apply threat modeling concepts and methodologies (OSG-9 Chpt 1)

  • Threat Modeling: security process where potential threats are identified, categorized, and analyzed; can be performed as a proactive measure during design and development (aka defensive approach) or as an reactive measure once a product has been deployed (aka adversarial approach)
    • Threat modeling identifies the potential harm, the probability of occurrence, the priority of concern, and the means to eradicate or reduce the threat
  • Microsoft uses the Security Development Lifecycle (SDL) with the motto: “Secure by design, secure by default, secure in deployment and communication”
    • It has two objectives:
      • Reduce the number of security-related design and coding defects
      • Reduce the severity of any remaining defects
  • A defensive approach to threat modeling takes place during the early stages of development; the method is based on predicting threats and designing in specific defenses during the coding and crafting process
    • Security solutions are more cost effective in this phase than later; this concept should be considered a proactive approach to threat management
  • Microsoft developed the STRIDE threat model:
    • Spoofing: an attack with the goal of gaining access to a target system through the use of falsified identity
    • Tampering: any action resulting in unauthorized changes or manipulation of data, whether in transit or in storage
    • Repudiation: the ability of a user or attacker to deny having performed an action or activity by maintaining plausible deniability
    • Information Disclosure: the revelation or distribution of private, confidential, or controlled information to external or unauthorized entities
    • Denial of Service (DoS): an attack that attempts to prevent authorized use of a resource; this can be done through flaw exploitation, connection overloading, or traffic flooding
    • Elevation of privilege: an attack where a limited user account is transformed into an account with greater privileges, powers, and access
    • STRIDE is threat categorization model; threat categorization is an important part of app threat modeling
  • Process for Attack Simulation and Threat Analysis (PASTA): a seven-stage threat modeling methodology:
    • Stage I: Definition of the Objectives (DO) for the Analysis of Risk
    • Stage II: Definition of the Technical Scope (DTS)
    • Stage III: Application Decomposition and Analysis (ADA)
    • Stage IV: Threat Analysis (TA)
    • Stage V: Weakness and Vulnerability Analysis (WVA)
    • Stage VI: Attack Modeling and Simulation (AMS)
    • Stage VII: Risk Analysis and Management (RAM)
  • Each stage of PASTA has a specific list of objectives to achieve and deliverables to produce in order to complete the stage
  • Visual, Agile, and Simple Threat (VAST): a threat modeling concept that integrates threat and risk management into an Agile programming environment on a scalable basis
  • Part of the job of the security team is to identify threats, using different methods:
    • Focus on attackers: this is a useful method in specific situations;
    • e.g. suppose that a developer’s employment is terminated, and that post-offboarding and review of developer’s computer, a determination is made that the person was disgruntled and angry
      • understanding this situation as a possible threat, allows mitigation steps to be taken
    • Focus on assets: an org’s most valuable assets are likely to be targeted by attackers
    • Focus on software: orgs that develop applications in house, and can be viewed as part of the threat landscape; the goal isn’t to identify every possible attack, but to focus on the big picture, identifying risks and attack vectors
  • Understanding threats to the org allow the documentation of potential attack vectors; diagramming can be used to list various technologies under threat
  • Reduction analysis: with a purpose of gaining a greater understanding of the logic of a product and interactions with external elements includes breaking down a system into five core elements: trust boundaries, data flow paths, input points, privileged operations, and security control details; AKA decomposing the application, system, or environment
  • DREAD: Microsoft developed the DREAD threat modeling approach to detect and prioritize threats so that serious threats can be mitigated first
    • D: Damage potential
    • R: Reproducibility
    • E: Exploitability
    • A: Affected users
    • D: Discoverability

1.12 Apply Supply Chain Risk Management (SRM) concepts (OSG-9 Chpt 1)

  • 1.12.1 Risks associated with hardware, software, and services
    • Supply Chain Risk Management (SCRM): the means to ensure that all of the vendors or links in the supply chain are:
      • reliable,
      • trustworthy,
      • reputable organizations that disclose their practices and security requirements to their business partners (not necessarily to the public)
    • Each link in the chain should be responsible and accountable to the next link in the chain; each handoff is properly organized, documented, managed, and audited
      • The goal of a secure supply chain is that the finished product is of sufficient quality, meets performance and operational goals, provides stated security mechanisms, and that at no point in the process was any element counterfeited or subject to unauthorized or malicious manipulation or sabotage
    • The supply chain can be a threat vector, where materials, software, hardware, or data is being obtained from a supposedly trusted source but the supply chain behind the source could have been compromised and asset poisoned or modified
  • 1.12.2 Third-party assessment and monitoring
    • Before doing business with another company, an org needs to perform due-dilligence, and third-party assessments can help gather information and perform the assessment
    • An on-site assessment is useful to gain information about physical security and operations
      • During document review, your goal is to thoroughly review all the architecture, designs, implementations, policies, procedures, etc.
      • A good understanding of the current state of the environment, especially to understand any shortcomings or compliance issues prior to integrating the IT infrastructures
      • The level of access and depth of information obtained is usually proportional to how closely the companies will work together
  • 1.12.3 Minimum security requirements
    • As part of assessment, the minimum security requirements must be established; in some cases, the minimum security requirements are your company’s security requirements, in other cases, new minimum security requirements need to be established
      • In such scenarios, the minimum security requirements should have a defined period
  • 1.12.4 Service-level requirements
    • Service Level Agreements (SLAs): companies have SLAs for internal operations (such as how long it takes for the helpdesk to respond to a new ticket), for customers (such as the availability of a public-facing service) and for partner orgs (such as how much support a vendor provides a partner)
      • Outside entity or vendor agreements should stipulate performance expectations like maximum downtimes and include penalties if the vendor doesn’t meet expections
      • All SLAs should be reviewed; a company sometimes has an SLA standard that should be applied, when possible, to the service level agreements as part of working with another company
        • this can sometimes take time, as the acquiring company might have to support established SLAs until they expire or are up for renewal

1.13 Establish and maintain a security awareness, education, and training program (OSG-9 Chpt 2)

  • 1.13.1 Methods and techniques to present awareness and training (e.g., social engineering, phishing, security champions, gamification)
    • Before actual training takes place, user security awareness needs to take place; from there, training, or teaching employees to perform their work tasks and to comply with the security policy can begin
      • All new employees require some level of training so that they will be able to comply with all standards, guidelines, and procedures mandated by the security policy
      • Education is a more detailed endeavor in which students/users learn much more than they actually need to know to perform their work tasks
      • Education is most often associated with users pursuing certification or seeking job promotion
    • Employees need to understand what to be aware of (e.g. types of threats, such as phishing and free USB sticks), how to perform their jobs securely (e.g. encrypt sensitive data, physically protect valuable assets) and how security plays a role in the big picture (company reputation, profits,and losses)
      • Training should be mandatory and provided both to new employees and yearly (at a minimum) for ongoing training
      • Routine tests of operational security should be performed (such as phishing test campaigns, tailgating at company doors and social engineering tests)
      • Social engineering: a form of attack that exploits human nature and behavior; the common social engineering principles are authority, intimidation, consensus, scarcity, familiarity, trust, and urgency;
        • social engineering attacks include phishing, spear phishing, business email compromise (BEC), whaling, smishing, vishing, spam, shoulder surfing, invoice scams, hoaxes, impersonation, masquerading, tailgating, piggybacking, dumpster diving, identity fraud, typo squatting, and influence campaigns
        • while many orgs don’t perform social engineering campaigns (testing employees using benign social engineering attempts) as part of security awareness, it is likely to gain traction
        • outside of campaigns, presenting social engineering scenarios and information is a common way to educate
      • Phishing: phishing campaigns are popular, and many orgs use third-party services to routinely test their employees with fake phishing emails
        • such campaigns produce valuable data, such as the percentage of employees who open the phishing email, the percentage who open attachments or click links, and the percentage who report the fake phishing email as malicious
      • Security champions: the term “champion” has been gaining ground; orgs often use it to designate a person on a team who is a subject matter expert in a particular area or responsible for a specific area
        • e.g. somebody on the team could be a monitoring champion — they have deep knowledge around monitoring and evangelize the benefits of monitoring to the team or other teams
        • a security champion is a person responsible for evangelizing security, helping bring security to areas that require attention, and helping the team enhance their skills
      • Gamification: legacy training and education are typically based on reading and then answering multiple-choice questions to prove knowledge; gamification aims to make training and education more fun and engaging by packing educational material into a game
        • gamification has enabled organizations to get more out of the typical employee training
  • 1.13.2 Periodic content reviews
    • Threats are complex, so training needs to be relevant and interesting to be effective; this means updating training materials and changing out the ways which security is tested and measured
      • if you always use the same phishing test campaign or send it from the same account on the same day, it isn’t effective, and the same applies to other materials.
      • instead of relying on long/detailed security documentation for training and awareness, consider using internal social media tools, videos and interactive campaigns
  • 1.13.2 Program effectiveness evaluation
    • Time and money must be allocated for evaluating the company’s security awareness and training; the company should track key metrics, such as the percentage of employees who click on a fake phishing campaign email links

Also see my articles on risk management:

  • Part 1 introduces risk and risk terminology from the lens of the (ISC)² Official Study Guide
  • Since the primary goal of risk management is to identify potential threats against an organizaton’s assets, and bring those risks into alignment with an organization’s risk appetite, in Part2, we cover the threat assessment – a process of examining and evaluating cyber threat sources with potential system vulnerabilities
    • we look at how a risk assessment helps drive our understanding of risk by pairing assets and their associated potential threats, ranking them by criticality
    • we also discuss quantitative analytic tools to help provide specific numbers for various potential risks, losses, and costs
  • In the third installment, we review the outcome of the risk assessment process, looking at total risk, allowing us to determine our response to each risk/threat pair and perform a cost/benefit review of a particular safeguard or control
    • we look at the categories and types of controls and the idea of layering them to provide several different types of protection mechanisms
    • we also review the important step of reporting out our risk analysis and recommended responses, noting differences in requirements for messaging by group