0% found this document useful (1 vote)
527 views30 pages

CISSP Domain 1: Security & Risk Management

The document discusses key concepts in CISSP Domain 1 including security and risk management, ethics, the CIA triad of confidentiality, integrity and availability, and organizational roles and responsibilities related to information security governance. It provides details on the ISC2 Code of Professional Ethics and outlines common security roles in an organization.

Uploaded by

Supun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
527 views30 pages

CISSP Domain 1: Security & Risk Management

The document discusses key concepts in CISSP Domain 1 including security and risk management, ethics, the CIA triad of confidentiality, integrity and availability, and organizational roles and responsibilities related to information security governance. It provides details on the ISC2 Code of Professional Ethics and outlines common security roles in an organization.

Uploaded by

Supun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

← Back to Resources

Unraveling CISSP Domain 1:


Security and Risk Management

Copy Link

The first CISSP domain focuses on the fundamentals of security and how to
assess and manage risk. It makes sense since both of these concepts are an
essential part of our personal and professional lives. Therefore, we have to
analyze every risk associated with every action we take.

Moreover, technology adoption growth and digitalization require cybersecurity


professionals to be aware of the topics discussed in CISSP Domain 1. It also
focuses heavily on the critical factors of governance and compliance and how
security helps by aligning and contributing to each.

Have a look at everything you need to know for the CISSP certification exam for
domain 1 in this article.

1.1 Understand, adhere to, and promote


professional ethics
Ethics
Ethics are a foundational element of a successful security program and should
be adhered to throughout the organization. Proper ethical behavior is based
upon one belief: abide by the rules and do nothing harmful to anyone else.
Within an organization, the best way to prescribe, promote, and instill consistent
ethical behavior is through corporate rules or laws, more appropriately referred
to as policies, to ensure that all employees employ the same set of ethics.
As a CISSP candidate, you are responsible for understanding and complying with
the ISC2 Code of Professional Ethics, which applies to CISSP holders around the
globe. In fact, the CISSP exam will most likely ask at least one question on this
topic.
The Preamble and the Code of Professional Ethics Canons must be understood
fully in the context of corporate and industry applications. The Canons should be
memorized and adhered to in the order presented.

ISC2 Code of Ethics Preamble


The safety and welfare of society and the common good, the duty to our
principals, and to each other, requires that we adhere, and be seen to
adhere, to the highest ethical standards of behavior.
Therefore, strict adherence to this Code is a condition of certification.

The ISC2 Code of Ethics consists of the Canons outlined here:

ISC2 Code of Ethics Canons

Protect society, the common good, necessary public trust and


1
confidence, and the infrastructure.

2 Act honorably, honestly, justly, responsibly, and legally.

3 Provide diligent and competent service to principals.

4 Advance and protect the profession.

Remember, if a scenario is presented in which there's a conflict in the Canons,


they need to be applied in order.

1.2 Understand and apply security concepts

Focus of security
Security focuses on anything that represents value, better referred to as assets,
and implements control that ultimately increases the value of those assets.
Therefore, the focus of the security function is to:

1. Allow and enable the organization to achieve its goals and objectives.
2. Increase the organization's value.

Confidentiality, integrity, availability, authenticity, and


nonrepudiation

The CIA triad is a foundational model that helps organizations design, structure,
and implement security functions.

The elements of the CIA triad are as follows:

Protects assets using important principles such as need-


Confidentiality to-know and least privilege; prevents unauthorized
disclosure.

Protects and adds value to assets by making them more


accurate, timely, current, and meaningful; prevents
Integrety
unauthorized or accidental changes to assets such as
information.

Protects critical assets based on value to ensure


Availability organizational assets are available when required by
stakeholders.
The traditional pillars of security have been increased to include authenticity and
nonrepudiation:

Proves assets are legitimate and bona fide and verifies


that they are trusted and verified. Proves the source
Authenticity
and origin of important, valuable assets. Also referred
to as "proof of origin."

Assures that someone cannot dispute the validity of


something; the inability to refute accountability or
Nonrepudiation
responsibility. Also, the inability to deny having done
something.

1.3 Evaluate and apply security governance


principles

Alignment of the security function to business strategy,


goals, mission, and objectives

The purpose of governance is to enhance organizational value, and corporate


governance is based on the goals and objectives of the organization.

Security needs to enable the organization's goals and objectives, not just
enforce information processes or fix technical issues, and must be managed top
down instead of bottom up.
On the other hand, scoping and tailoring are used to align security objectives
with organizational goals and objectives:
Scoping looks at potential control elements and determines which ones are
in scope—for example, security control elements that could adhere to
applicable laws and regulations—and which ones are out of scope.
Tailoring looks specifically at applicable—in scope—security control elements
and further refines or enhances them so they're most effective and aligned
with the goals and objectives of an organization.

Accountability versus responsibility

Accountable and responsible are two terms that are sometimes used mistakenly
and interchangeably.
If someone is accountable for something, that accountability can never be
delegated to anyone else. That person will always remain accountable. On the
other hand, responsibility can be delegated, but the delegator will remain
accountable.

Even if certain organization functions are managed by a responsible third party,


like a payroll or Cloud Service Provider (CSP), accountability still resides with the
owner of the assets being managed. A CSP will often have a contractual-based
responsibility for protecting the data. Still, the data owner is always accountable
for the data and, therefore, liable if there is a data breach.

Organizational roles and responsibilities

The following table outlines some of the key functions typically found in an
organization and their accountabilities and responsibilities from a security
perspective:

Ensuring that appropriate security


controls, consistent with the
Owners / organization's security policy, are
Controllers / implemented to protect the
Accountable organization's assets
Functional for:
Leaders / Senior Determining appropriate sensitivity
Management or classification levels
Determining access privileges

Design, implementation,
Information management, and review of the
Systems Security Responsible organization's security policies,
Professionals / IT for: standards, baselines, procedures,
Security Officer and guidelines

Developing and implementing


technology solutions
Reviewing and approving new IT
alternatives
Information Working closely with IS and IT
Responsible Security Professionals and Officers
Technology (IT)
for: to evaluate security strategies
Officer
Working closely with the Business
Continuity Management (BCM) team
to ensure continuity of operations
should a disruption occur

Responsible Implementing and adhering to


IT Function security policies
for:

Managing, troubleshooting, and


applying hardware and software
patches to systems as necessary
Operator / Responsible Managing user permissions per the
Administrator for: owner's specifications
Administering and managing
specific applications and services

Maintaining computer networks and


resolving issues with them
Network Responsible Installing and configuring
Administrator for: networking equipment and systems
and resolving problems

Providing management with


independent assurance that the
security objectives are appropriate
Determining whether the security
policy, standards, baselines,
Information Responsible procedures, and guidelines are
Systems Auditors for: appropriate and effective to comply
with the organization's security
objectives
Determining whether the objectives
have been met
Developing and implementing
technology solutions
Reviewing and approving new IT
alternatives
Working closely with IS and IT
Responsible Security Professionals and Officers
Users
for: to evaluate security strategies
Working closely with the Business
Continuity Management (BCM) team
to ensure continuity of operations
should a disruption occur

The responsibility for the corruption rests with the custodian. However,
accountability for corruption rests with the asset owner.

Due care versus due diligence

Simply put:
Due care is the responsible protection of assets
Due diligence is the ability to prove due care

1.4 Determine compliance and other


requirements
Establishing the right security controls isn't just about the internal needs of an
organization. Plenty of contractual, legal, industry and regulatory requirements
should inform how different assets are protected.

The legal, privacy, and audit/compliance functions must work together to ensure
compliance, and once management understands compliance needs, they can
work with security to implement controls.

1.5 Understand legal and regulatory issues


that pertain to information security in a holistic
context

Cybercrimes and data breaches

Every organization should be asking fundamental questions like:

How is/are our information/assets protected?


What are the issues pertaining to information security for our organization in
a global context?
What does the current threat landscape look like?

This is important because cybercrime is highly profitable. This fact explains why
most organizations won't admit to being victims or prosecute the perpetrators of
cybercrime.

Not every attack can be prevented, but effective security strategies can reduce
attacks by making them:
Not worthwhile
Too time-consuming
Too expensive

Bottom line: Don't be the low-hanging fruit that can be easily picked!

Licensing and intellectual property requirements

Intellectual property laws aim to encourage the creation of intellectual goods


(inventions, literary and artistic works, designs, symbols, and names) and to
protect the same.

The following table will show what trade secrets, patents, copyrights, and
trademarks protect.
Disclosure Term of
Term Protects
Requiered Protecti

Trade Potentia
Business information No
Secret infinitive

Functional innovations, novel idea,


Patent invetions Yes Set peri

Expression of an idea embodied in a Set peri


Copyright fixed medium (books, movies, songs, Yes time
etc.)
Color, sound, symbol, etc. used to Potentia
Trademark distinguish one product/company Yes
infinitive
from another

Import/export controls

Import and export controls are country-based rules and laws implemented to
manage which products, technologies, and information can move in and out of
those countries, usually meant to protect national security, individual privacy,
economic well-being, and so on.

The Wassenaar Arrangement


The Wassenaar Arrangement was put in place to manage the risk that
cryptography poses while still facilitating trade. It allows certain countries to
exchange and use cryptography systems of any strength while also preventing
the acquisition of these items by terrorists.

International Traffic in Arms Regulations (ITAR)


This is a US regulation that was built to ensure control over any export of items
such as missiles, rockets, bombs, or anything else existing in the United States
Munitions List (USML).

Export Administration Regulations (EAR)


EAR predominantly focuses on commercial use-related items like computers,
lasers, marine items, and more. However, it can also include items that may have
been designed for commercial use but actually have military applications.
Transborder data flow

Transborder data flow laws restrict the transfer of data across country borders.
When sharing data across borders, applicable laws must be considered.
These laws primarily relate to personal data. The idea is to protect a
country/state/province/region's citizens' personal data. If an organization is
collecting citizens' data, then they are accountable for the protection of that
data.

Given these laws, organizations must consider the potential implications of the
flow of data across physical borders. This can be very challenging for
organizations to keep track of with the proliferation of service providers and
global cloud services.

Privacy

Privacy is the state or condition of being free from being observed or disturbed
by other people, and personal data is information on its own or in combination
that uniquely identifies an individual.
It's essential that personal data is well protected to comply with current privacy
laws and to protect the value of the information and of the organization itself.
This can become complex for multinational organizations since there's a
significant variation around the world in both the definition of personal data and
the laws that determine how to protect it.

Personal data
Depending on the location in the world, personal data may be referred to in
different ways, and what constitutes personal data can vary significantly.
Personal data can be referred to as:
PI: Personal Information
PII: Personally Identifiable Information
SPI: Sensitive Personal Information
PHI: Personal Health Information
On the other hand, it's important to distinguish between direct identifiers, which
include information that relates specifically to an individual, such as their name,
address, biometric data, government ID, or other uniquely identifying numbers,
while indirect identifiers include information that on its own cannot uniquely
identify an individual but can be combined with other information to identify
specific individuals.

Privacy requirements

Privacy policy requirements


The following table contains a summary of the key roles within the privacy realm:

Owners need to have clearly defined accountabilities, including:


Defining classification
Approving access
Retention and destruction

Data Different types of owners:


owners Data owners
Process owners
System owners
Companies that collect personal data about customers are
accountable for the protection of the data

Need to have clearly defined responsibilities.


Data Protect data based on the input from the owners.
custodians Custodians also need tools, training, resources, etc.
And who provides all this. Typically, the owners.

Need to have clearly defined responsibilities.


Data Processes personal data on behalf of the controller/owner.
processors Protects critical assets based on value to ensure organizational
assets are available when required by stakeholders.
Data
subjects Individuals to whom personal data relates.

One privacy law that you should have a deeper understanding of is the GDPR,
which is one of the most comprehensive privacy laws in the world, and many
countries have modeled or are in the process of modeling their privacy laws on
GDPR or plan to in the future.

OECD privacy guidelines


The Organization for Economic Cooperation and Development (OECD) is an
international organization that is focused on international standards and policies
and finding solutions to social, economic, and environmental challenges. One
such challenge that they have been driving for decades is privacy.

OECD privacy guidelines are not mandatory for organizations to comply with,
although they are considered a prudent course of action. These guidelines are:
Collection limitation principle
Data quality principle
Purpose specification principle
Use limitation principle
Security safeguards principle
Openness principle
Individual participation principle
Accountability principle

Privacy assessments

Privacy Impact Assessment (PIA) is a process undertaken on behalf of an


organization to determine if personal data is being protected appropriately and
to minimize risks to personal data where appropriate.

A PIA is performed with the goal to:

1. Identify/evaluate risks relating to privacy breaches.


2. Identify what controls should be applied to mitigate privacy risks.
3. Offer organizational compliance with privacy legislation.

These are the PIA steps:

1. Identify the need for a DPIA


2. Describe the data processing
3. Assess necessity and proportionality
4. Consult interested parties
5. Identify and assess risks
6. Identify measures to mitigate the risks
7. Sign off and record outcomes
8. Monitor and review
1.6 Understand requirements for investigation
types
To understand the requirements for investigation types, read our domain 7 article
(section 7.1.7), in which we explain everything you need to know in this regard.

1.7 Develop, document, and implement


security policies, procedures, standards,
baselines, and guidelines
Policies, procedures, standards, baselines, and guidelines
The compendium of functional policies will be defined, supported, and informed
by many standards, procedures, baselines, and guidelines, as seen in the
following model:

For the CISSP certification exam, you must be aware of the differences between
policies, procedures, baselines, and guidelines:

Documents that communicate management's goals and


objectives
Provide authority to security activity
Policies Define the elements, functions, and scope of the security
team
Must be approved and communicated
Corporate law
Specific hardware and software solutions, mechanisms, and
products
Examples:
Specific antivirus software, e.g., MCAfree
Standards Specific access control system, e.g., Forescout
Specific firewall system, e.g., Cisco ASA
Publishing guideline (e.g., ISO 27001) adopted by an
organization as a standard

Step-by-step descriptions on how to perform a task;


mandatory actions
Examples:
User registration or new hire onboarding
Procedure
Contracting for security purposes
Information system material destruction
Incident response

Defined minimal implementation methods/levels for security


mechanisms and products
Examples:
Baselines
Configurations for intrusion detection systems
Configurations for access control system

Recommended or suggested actions


Examples:
Government recommendations
Security configuration recommendations
Guidelines Organizational guidelines
Product/system evaluation criteria

(Note: Guidelines allow an organization to suggest


something be done without making it a hard requirement and
thus cause a negative audit finding.)

The committee, reporting to the Board of Directors and CEO, should develop an
overarching security policy that is aligned with organizational goals and
objectives that covers the entire organization and clearly articulates the goals
and objectives of the security function.

While policies don't need to be reviewed every year, standards, procedures,


baselines, and guidelines may need to be updated frequently.
1.8 Identify, analyze, and prioritize
business continuity (BC) requirements
Please check section 7.11 of our article on Domain 7 to know more about this
topic.

1.9 Contribute to and enforce personnel


security policies and procedures
Personal security policies
Some of the best practices for protecting the business and its important assets
are listed below.

Candidate screening and hiring


New personnel represents a risk to security; every organization needs
personnel security policies that address and mitigate this risk with the right
security controls.

Employment agreements and policies


As part of bringing a new employee into an organization—also referred to as
onboarding—company security policies, acceptable use policies, and similar
agreements should be reviewed and agreed upon prior to giving a new
employee their badge and any system credentials.
Prior to an employee leaving, or in conjunction with it, user system access
should be disabled, and the fact that the employee's employment is being
terminated should be conveyed to all relevant parties within the organization.
Employee duress
An employee acting under duress may be forced to perform an action or set of
actions that they wouldn't do under normal circumstances. One common
practice to handle these stressful situations is to have keywords that denote
that an employee is acting under duress.

Personnel security controls


Here is a list of important personnel security controls:

Job rotation. Job rotation is quite useful for protecting against fraud and
provides cross-training. It entails rotating staff (especially individuals in key
positions) so that an individual can't commit fraud and cover it up.
Mandatory vocation. Mandatory vacation is a control also used by
organizations to detect fraud. Employees are required to go on vacation for
a set period of time, during which time another employee can step into the
role and determine if any malicious or nefarious activity has taken place or
is actively taking place.
Separation of duties. Separation of duties is used to prevent fraud by
requiring more than one employee to perform critical tasks.
Need-to-know and Least privilege. Least privilege ensures that only the
minimum permissions needed to complete the work are granted to any
employee. Need to know ensures that access to sensitive assets is
restricted only to those who require the information to complete the work.

Enforce personnel security controls


Enforcing personnel security controls commences with the hiring process,
extends through the employment period, and ends only after the employee has
left the organization.
Additionally, personnel-focused policies are often further supported by things
like:

Nondisclosure agreements (NDA). Contracts through which the parties


agree not to disclose information covered by the agreement.
Noncompete agreements (NCA)
Ethical guideline and requirement questionnaires and agreements
Vendor, consultant, and contractor agreements and controls

1.10 Understand and apply risk management


concepts
Risk management
Risk management is the identification, assessment, and prioritization of risks and
the economical application of resources to minimize, monitor, and control the
probability and/or impact of these risks.

Here's an overview of the risk management process:

Value. identifying the assets of the organization and ranking those assets
from most to least valuable. This process is referred to as asset valuation,
and the ranking of assets can be achieved via two methods or, most
commonly, a combination of both quantitative value analysis and qualitative
value analysis.
Risk analysis. Determine the risks associated with each asset via the risk
analysis process. The four key components are threat, vulnerability, impact,
and probability/likelihood.
Treatment. There are four risk treatment methods: avoid, transfer, mitigate,
and accept.

Asset valuation
Before risks can be identified and managed, valuable assets of the organization
must first be identified.

Two different forms of analysis can be used to rank the assets of the
organization from most to least valuable: qualitative and quantitative:

Qualitative analysis Quantitative analysis

Does not attempt to assign monetary Assign objective monetary values


value
Relative ranking system, based on Fully quantitative process when all
professional judgment elements are quantified
Uses words like "Low," "Medium,"
"High," "1–5," "Probability," or
"Likelihood" to express value
Qualitative analysis is relatively Purely quantitative is difficult to
simple and efficient achieve and time-consuming

Risk analysis

After the asset valuation process, related threats and vulnerabilities must be
identified for each asset, and owners must be deeply involved in the risk
analysis process.
Threats and vulnerabilities
There are three main components to risk being present:

Asset: anything of value to the organization


Threat: any potential danger; anything that causes damage to an asset, like
hackers, earthquakes, ransomware, social engineering, denial-of-service
attacks, disgruntled employees, and many others.
Vulnerability: a weakness that exists; anything that allows a threat to take
advantage of it to inflict damage to the organization. Examples include open
ports with vulnerable services, lack of network segregation, lack of patching,
and OS updating.

Risk management terms

The following list contains a list of core terms used in risk management and
how they fit together.

The entity that has the potential to cause damage to


Threat Agent an asset (e.g., external attackers, internal attackers,
disgruntled employees)

Threat Any potential danger

Attack Any harmful action that exploits a vulnerability


A weakness in an asset that could be exploited by a
Vulnerability threat

Significant exposure to a threat or vulnerability (a


Risk weakness that exists in an architecture, process,
function, technology, or asset)

Asset Anything that is valued by the organization

Negative consequences to an asset if the risk is


Exposure/Impact realized (e.g., loss of life, reputational damage,
downtime, etc.)

Countermeasures Controls implemented to reduce threat agents,


and Safeguards threats, and vulnerabilities and reduce the negative
impact of a risk being realized

The risk that remains after countermeasures and


Residual Risk safeguards (controls) are implemented

Annualized Loss Expectancy (ALE) calculation

Quantitative analysis as part of ranking risks requires calculating how much risk
is expected to cost the organization annually—the Annualized Loss Expectancy
(ALE). The ALE can be calculated using this formula:

ALE = SLE (AV x EF) x ARO


The acronyms pertain to:

Asset Value (AV)


Exposure Factor (EF)
Single Loss Expectancy (SLE)
Annualized Rate of Occurrence (ARO)
Annualized Loss Expectancy (ALE)
Risk response/ treatment

After the risk analysis process, security should implement the most cost-
effective treatments. The right approach depends on the value of the asset and
the type of risk identified in the previous steps.

Although risk can never be entirely eliminated, it can be managed via the
following approaches:

Avoid. Choosing to stop doing whatever exposes the asset to risk. Not
jumping can avoid the risk, but you can miss significant opportunities (the
opportunity cost).
Transfer. Transferring risk means sharing some risk with another party,
usually an insurance company.
Mitigate. Mitigate risk means implementing controls that reduce the risk to
an acceptable level.
Accept. Accepting risk simply means taking no action or no further action
where the risk to a particular asset is concerned.

Types of controls

Seven major types of controls can be put in place, as shown in the following
table:
Directive controls direct, confine, or control the actions of
Directive subjects to force or encourage compliance with security
policies.

Deterrent Deterrent controls discourage violation of security


policies

Preventive controls can prevent undesired actions or


Preventive events

Detective controls are designed to identify if a risk has


Detective occurred. Importantly, detective controls operate after an
event has already happened

Corrective controls are used to minimize the negative


impact of a risk occurring—minimize the damage. They
Corrective are used to alleviate the effects of an event that has
resulted in a loss and to respond to incidents to minimize
risk.

Recovery Restore to normal

Compensating Make up for lack (e.g. supervision)

A concept that is pervasively used in security is complete control. Complete


control is a combination of preventive, detective, and corrective controls at a
minimum.
In addition, in defense-in-depth (layered security), complete control should be
implemented at each layer.

Categories of controls

A way to categorize the security controls is as safeguards or as


countermeasures.

Safeguards are proactive controls; they are put in place before the risk has
occurred to deter or prevent it from manifesting.

Countermeasures are reactive controls. They are put in place after risk has
occurred and aim to allow us to detect and respond to it accordingly.

Controls can be further classified into three main categories:


Administrative
Logical/Technical
Physical

Functional and assurance

A good security control should always include two aspects: the functional
aspect and the assurance aspect.

Functional Assurance

Control performs the function it was Control can be proven to be


designed to address/does what it is functioning properly on an ongoing
meant to do—for example, a firewall basis, usually proven through
filtering traffic between different testing, assessments, logging,
subnets. monitoring, etc.

Selecting controls

Selected controls must support organizational goals and objectives and be cost-
effective.

Security is usually a balancing act between achieving the maximum level of


security with the least cost and, at the same time allowing proper functionality.
Security controls make systems more difficult to use, slower, more complicated,
and so on.
Measuring control effectiveness and reporting
Once a control, or set of controls, has been decided upon and implemented, it
is important to understand how well they're working. One of the best ways to do
this is by using metrics.
To identify the metrics that will matter, the metrics that will be useful to
implement and monitor, and the target audience must be identified.

Continuous improvement

Risk management is a continuous, arduous, and time-consuming process that


needs to be continually updated.
The Deming Cycle, sometimes also referred to as Plan Do Check Act (PDCA),
shown in the next figure, outlines the cyclical nature of many processes in
security, including risk management.
Determine which controls to implement based on the risks
Plan identified

Do Implement the controls

Monitoring and assurance; are the controls operating


Check effectively?
Based upon findings during the "Check" step, take
Act additional actions as necessary (react), which leads back to
planning

Apply supply chain risk management concepts

Risk management methodologies should be applied to all vendors, suppliers,


and service providers, and it should include the following items:

Governance review
Site security review
Formal security audit
Penetration testing
Adherence to the security baseline
Evaluation of hardware and software
Adherence to security policies
Development of an assessment plan
Identification of assessment requirements and which party will perform it
Preparation of assessment and reporting templates

Risk management frameworks

Risk management frameworks provide comprehensive guidance for structuring


and conducting risk management. The four risk management frameworks are
shown in the following table:

This guide describes the risk management framework


NIST SP 800-
37 (RMF) (RMF) and provides guidelines for applying the RMF to
information systems and organizations.
ISO 31000 ISO 31000 is a family of standards relating to risk
management.

COSO provides a definition of essential enterprise risk


management components, reviews ERM principles and
COSO concepts, and provides direction and guidance for
enterprise risk management.
ISACA's Risk IT Framework contains guidelines and
ISACA Risk IT practices for risk optimization, security, and business
Framework value. The latest version places greater emphasis on
cybersecurity and aligns with the latest version of COBIT

1.11 Understand and apply threat modeling


concepts and methodologies
Threat modeling is used to systematically identify, enumerate, and prioritize
threats related to an asset.

Three major threat modeling methodologies you need to know about for
the exam are STRIDE, PASTA, and DREAD.
STRIDE
STRIDE is a threat-focused methodology that's less strategic and thorough than
PASTA. It is an acronym of:
Spoofing
Tampering
Repudiation
Information disclosure
Denial-of-service
Elevation of privilege

PASTA
Process for Attack Simulation and Threat Analysis (PASTA), contrary to
STRIDE, is an attacker-focused, risk-centric methodology. It is much more
detailed than STRIDE and performs threat analysis from a strategic
perspective.

The stages in PASTA are as follows:

Define objectives
Define technical scope
Application decomposition
Threat analysis
Vulnerability and weakness analysis
Attack modeling
Risk and impact analysis

DREAD
DREAD is a threat model primarily used to measure and rank the severity of
threats. DREAD is often used in combination with the STRIDE model, where
STRIDE identifies the threats, and DREAD is then used to rank the severity of
threats. The acronym means:

Damage
Reproducibility
Exploitability
Affected users
Discoverability

Social engineering
Social engineering can be defined as using deception or intimidation to get
people to provide sensitive information that they shouldn't in order to facilitate
fraudulent activities.
It is a prevalent means of attack against organizations and employees (the
biggest security weakness that exists in most companies) because it's very
effective. Common social engineering tactics include intimidation, deception,
and rapport.
Social engineering attacks can be mitigated through awareness, training, and
education.

1.12 Apply supply chain risk management


(SCRM) concepts

SLR, SLA, and service level reports

Security must be considered for all acquisitions and be part of the procurement
process. Even if the acquisition is of a well-known brand, product, or service,
risks exist and must be evaluated as part of the acquisition, or procurement,
process. This evaluation should occur as early as possible and include security
considerations that minimize the risk.

Service level requirements (SLR)


With the acquisition of a service, additional organizational requirements must
be considered, which is done through an SLR document. Specifically, an SLR
outlines:

Detailed service descriptions


Detailed service level targets
Mutual responsibilities

Security requirements must be clearly communicated (e.g., SLAs) to


suppliers/vendors/service providers.

Service Level Agreement (SLA)


After a service is acquired, an SLA must be put in place between the customer
and the service provider.
SLAs often include expectations and stipulations related to:
Service levels
Governance
Security
Compliance with law and regulations

Service level reports


Service level reports are issued by a vendor or service provider to a client and
provide insight and information about the service provider's ability to deliver
services as defined by the SLA.

It might contain any of the following components:

Achievement of metrics defined in the SLA


Identification of issues
Reporting channels
Management
Third-party SOC reports

1.13 Establish and maintain security


awareness, education, and training
programs
Everyone is responsible for security; however, they must know what to do.
Awareness within an organization is fostered to create cultural sensitivity to a
given topic or issue.
In addition, education helps people understand fundamental concepts and
therefore develop decision-making skills and abilities.

Methods and techniques to provide awareness and


training
Common methods to provide awareness and training are:
Live in-person sessions
Live online sessions
Pre-recorded sessions
Requirements/rewards
Regular communications/campaigns

The topics selected should directly align with the organization's goals and
objectives. At the same time, training and education programs and materials
should also evolve and be updated accordingly to be most effective.
Program effectiveness evaluation
Program participants should be surveyed from time to time. Some key metrics
to consider are:
Total number of people completing the awareness program
Number of people providing feedback in comparison to total attendees
Number of people reporting suspicious activities after training completion
Tracking of how well staff members performed
Total number of attempts each person took the course

Destination Certification: The next step to


pass the CISSP exam
The CISSP exam can seem daunting, but it all comes down to having the right
information and an adequate learning process.
On Destination Certification, we offer an intelligent learning system backed by
our expertise in the field that makes it much more straightforward. We
continually assess your strengths and weaknesses to guide you to what you
really need
to learn to pass the exam.
Enroll now in our CISSP MasterClass and start your journey towards becoming a
cybersecurity professional.

Copyright © 2024 Destination Certification Inc.


Victoria, BC, Canada
All rights reserved.

CISSP® & CCSP® are registered trademarks of ISC2, Inc.


CISSP Company

CISSP MasterClass About Us

Sample Class Videos Contact Us

About the CISSP 1 on 1 Mentoring

CISSP Guidebook

Flashcard App Legal


FREE MindMaps
Privacy Policy
Practice Questions App
Terms of Use
Success Stories

CISSP Mini MasterClass

CCSP

CCSP MasterClass

Flashcard App

Follow Us

Sign up for our Newsletter!

You might also like