Cissp 10 Key Topics Handout
Cissp 10 Key Topics Handout
STRATEGY SESSION
10 key topics
& Strategies
A transformational
exam prep session
with Pete Zerger vCISO, CISSP, MVP
housekeeping To keep our session orderly
10 Key
topics
CISSP EXAM CRAM
THE COMPLETE COURSE
STRATEGY
Day 1 Strategic Guidance
100 – 150 questions in 180 minutes
means approx. 1:15 – 1:45 per question
Foundational
Topics & Principles
Advanced
Topics
Foundational
Topics & Principles
Advanced
Topics
Foundational
Topics & Principles
Advanced
Topics
Foundational
Topics & Principles
STRATEGY
Recommended exam resources
Changes from 2021 to 2024?
Changes are incremental. 2021 exam topics still apply!
2024 brings a few new topics…
some updated topics…
some have been elevated to direct mention in the syllabus…
and others simply moved around or reworded
+
2024 updates are minor, 2021 topics still apply, so
the two together provide up-to-date coverage
Exam prep resources
Use these together for the 2024 exam
+
My CISSP Exam Prep 2024 playlist has several
key videos with the most important at the top
testimonials
What are other learners saying?
“
Great videos. Excellent
presentation. Perfect study
companion to the ISC2 book.
~Mike R
1,000+ practice questions, with
access to the practice questions
at the end of each chapter
STRATEGY
How to use materials effectively
There is no
AWARD
for the longest
STUDY TIME!
24 hours
1 week
20 min
THE POWER OF
REPETITION
spaced repetition
100 Spaced Repetition
Forgetting curve
QUICKLY
3rd repetition After 6-8 hours
4th repetition After 24 hours
5th repetition After 48 hours
PRACTICE POWERPOINT
EXAM REVIEW
DOMAIN CHAPTERS
1. Security and Risk Management 1-4
2. Asset Security 5
3. Security Architecture and Engineering 6 – 10
4. Communication and Network Security 11 – 12
5. Identity and Access Management 13 – 14
6. Security Assessment and Testing 15
7. Security Operations 16 – 19
8. Software Development Security 20 - 21
EXAM
Filter down to weak areas
PREP
with practice exams, live
review, flashcards, etc.
PRACTICE POWERPOINT
EXAMS REVIEW
PRACTICE POWERPOINT
EXAMS REVIEW
My preferred order
Exam prep strategy
Research shows everyone benefits from a variety of sources!
PRACTICE POWERPOINT
EXAMS REVIEW
My preferred order
Exam prep strategy
Research shows everyone benefits from a variety of sources!
PRACTICE POWERPOINT
EXAMS REVIEW
PRACTICE POWERPOINT
EXAMS REVIEW
PRACTICE POWERPOINT
EXAMS REVIEW
PRACTICE POWERPOINT
EXAMS REVIEW
10 Key
topics
When choosing
your answers…
THINK LIKE A
MANAGER short version
know your priorities
Roles & Risks Priorities & Objectives
human safety, business
continuity, protect profits,
YOU ARE CISO Strategic reduce liability & risk
HERE! long term (5-yr)
Research Implementation
Planning Operation (upkeep)
Evaluation Reasonable measures
Do Detect Do Correct
“
Your “Think like a manager” was the single
most important video that I watched in
preparation for taking the CISSP exam.
~FB
1. Exam Prep Strategy
2. CISSP Mindset
3. Data Lifecycle
10 Key
topics
Create Cloud Secure data Lifecycle
The Cloud Security Alliance model
Destroy Store
Can be created by users
a user creates a file
Share
3
Create Cloud Secure data Lifecycle
The Cloud Security Alliance model
Destroy Store
Share
Create Cloud Secure data Lifecycle
The Cloud Security Alliance model
Destroy Store
Archive Use
Share
Create Cloud Secure data Lifecycle
The Cloud Security Alliance model
Destroy Store
Archive Use
Share
Create Cloud Secure data Lifecycle
The Cloud Security Alliance model
Destroy Store
Archive Use
Share
Create Cloud Secure data Lifecycle
The Cloud Security Alliance model
Destroy Store
Destruction Classification
Secure data
LIFECYCLE
( functional )
Archive Storage
Usage
1. Exam Prep Strategy
2. CISSP Mindset
3. Data Lifecycle
topics
1 . 2 . 1 : THE 5 PILLARS OF INFORMATION SECURITY
topics
7 . 6 INCIDENT MANAGEMENT 5
SANS
Lessons
Preparation Identification Containment Eradication Recovery
Learned
NIST 800-61v2
Containment,
Detection and
Preparation eradication, and Post-incident activity
analysis
recovery
INCIDENT MANAGEMENT framework
1 Detection
DRMRRRL
2 Response
3 Mitigation
4 Reporting
|
5 Recovery
6 Remediation
7 Lessons Learned
INCIDENT MANAGEMENT framework
1. Detection - Monitoring and identifying potential
Detection incidents through alerts and user reports.
2. Response - Activating the incident response team
Response
and coordinating initial response.
3. Mitigation - Containing the incident and taking
Mitigation
steps to limit its impact.
4. Reporting - Notifying appropriate parties internal
Reporting and external to the organization.
5. Recovery - Restoring affected systems and
Recovery
services to normal operations.
6. Remediation - Identifying and mitigating
Remediation
vulnerabilities that led to the incident.
topics
6. Cryptography Concepts
CONCEPT: Symmetric vs Asymmetric
# YS–9\&
:E9KJ2]
‘H[#YkH
Asymmetric
Distribution of symmetric bulk encryption keys (shared key)
Identity authentication via digital signatures and certificates
Non-repudiation services and key agreement
Hash functions
Verification of digital signatures
Generation of pseudo-random numbers
Integrity services (data integrity and authenticity)
symmetric algorithms
NAME TYPE Algorithm Type Block Size (bits) Key Size (bits) Strength
topics
6. Cryptography Concepts
7. Security Models
WHAT IS A SECURITY MODEL? Security Policy
ISO, NIST, FIPS
Security models are used to determine how security
will be implemented, what subjects can access the
system, and what objects they will have access to.
Security Model
Bell LaPadula, Biba,
They are a way to formalize security policy. State Machine
Security Model?
Provides a way for designers to map
abstract statements into a security policy
D O M A I N 3 . 2 : SECURITY MODEL
Security Model?
Determines how security will be implemented,
what subjects can access the system, and
what objects they will have access to.
security models
Three properties that will be mentioned
repeatedly when talking about security models.
Lattice-based
Bell LaPadula
State machine model enforces confidentiality
Uses mandatory access control (mac) to enforce the
DoD multilevel security policy government!
Simple security property
subject cannot read data at a higher level of
classification. “no read up”
Star * security property
subject cannot write info to lower level of classification
“no write down”
security models
Bell LaPadula
READ Secret
WRITE
Confidential
Unclassified
Subject
Objects and cannot write data into
lower classification
document (no write down)
Model Focus Note
Biba Integrity No read down, no write up
Clark-Wilson Integrity Access control triplet
Bell-LaPadula Confidentiality No read up, no write down
Brewer and Nash Confidentiality aka Chinese Wall
Graham-Denning Confidentiality Security labels (8 rules)
Take-Grant Confidentiality Employs a “directed graph”
Information Flow Confidentiality Based on State Machine model
Lattice-based Confidentiality Aka Layer-based
Non-interference Confidentiality Based on Information Flow model
State Machine Both Describes secure state machine
topics
6. Cryptography Concepts
7. Security Models
8. Quantitative Risk Analysis
D O M A I N 1 : RISK ANALYSIS
RISK ANALYSIS
Two ways to evaluate risk to assets:
| OBJECTIVE
D O M A I N 1 : RISK ANALYSIS
1.11 software risk mitigation
Term Formula Description
Represents the percentage of
EF = Monetary loss due to
Exposure Factor (EF) potential loss an asset might
threat) / Value of asset
experience if a threat occurs.
Calculates the average
Single Loss
SLE = AV x EF expected loss from a single
Expectancy (SLE)
occurrence of a specific threat.
Estimates the frequency of a
Annual Rate of ARO = (Number of Events) /
specific threat occurring within a
Occurrence (ARO) (Observation Time in Years)
year.
Represents the average
Annualized Loss
ALE = SLE x ARO annualized loss expected from a
Expectancy (ALE)
specific threat over a year.
D O M A I N 1 : CALCULATING RISK
Single Loss
Expectancy (SLE)
Represents the cost associated with a
single realized risk against a specific asset
D O M A I N 1 : CALCULATING RISK
Single Loss
Expectancy (SLE)
SLE = Asset Value (AV) X Exposure Factor (EF)
D O M A I N 1 : CALCULATING RISK
Single Loss
Expectancy (SLE)
AV EF SLE
$100,000 X .3 (30%) = $30,000
D O M A I N 1 : CALCULATING RISK
Annualized Rate
of Occurrence (ARO)
The expected frequency with which a specific
threat or risk will occur within a single year.
D O M A I N 1 : CALCULATING RISK
Annualized Loss
Expectancy (ALE)
The possible yearly cost of all instances of a
specific realized threat against a specific asset.
D O M A I N 1 : CALCULATING RISK
Annualized Loss
Expectancy (ALE)
ALE = single loss expectancy (SLE) *
annualized rate of occurrence (ARO)
D O M A I N 1 : CALCULATING RISK
ALE Example
Office Building = $200,000
Hurricane damage estimate 50%
Hurricane probability is one every 10 years 10%
Safeguard
Evaluation
Good security controls mitigate risk,
are transparent to users, difficult to
bypass, and are cost effective
D O M A I N 1 : CALCULATING RISK
Safeguard
Evaluation
Good security controls mitigate risk,
are transparent to users, difficult to
bypass, and are cost effective
D O M A I N 1 : CALCULATING RISK
Safeguard
Evaluation
ALE before safeguard – ALE after safeguard
– annual cost of safeguard = value of safeguard
D O M A I N 1 : CALCULATING RISK
Safeguard
Evaluation
value of safeguard = ALE1 – ALE2 - ACS
QUANTITATIVE RISK ANALYSIS
topics
6. Cryptography Concepts
7. Security Models
8. Quantitative Risk Analysis
9. Cloud Computing
shared responsibility model
100% YOURS
Applications Applications Applications Applications
Data Data Data Data
Runtime Runtime Runtime Runtime
Responsible Middleware Middleware Middleware Middleware
CSP OS OS OS OS
Customer Virtualization Virtualization Virtualization Virtualization
Shared Servers Servers Servers Servers
Storage Storage Storage Storage
Networking Networking Networking Networking
For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube!
shared responsibility model
PRIVATE Cloud
Applications Applications
Data Data
Runtime Runtime CSP provides building blocks, like
Middleware Middleware networking, storage and compute
OS OS
Virtualization Virtualization CSP manages staff, HW, and
Servers Servers
datacenter
Storage Storage
Networking Networking
On-premises IaaS
For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube!
CLOUD service categories - IAAS
Applications Applications
Data Data
Runtime Runtime Key Benefits
Middleware Middleware
Usage is metered
OS OS
Virtualization Virtualization Eases scale (scale-up, out, and down)
Servers Servers Reduced energy and cooling costs
Storage Storage
Networking Networking
On-premises IaaS
For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube!
CLOUD service categories - IAAS
Applications Applications
Data Data
Runtime Runtime
Middleware Middleware
OS OS
Virtualization Virtualization
Servers Servers Azure Virtual Amazon EC2 GCP Compute
Storage Storage Machines Engine
Networking Networking
On-premises IaaS
For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube!
CLOUD service categories - PAAS
Applications Applications
Data Data
Runtime Runtime Customer is responsible for
Middleware Middleware deployment and management of apps
OS OS
Virtualization Virtualization CSP manages provisioning,
Servers Servers
configuration, hardware, and OS
Storage Storage
Networking Networking
On-premises PaaS
For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube!
CLOUD service categories - PAAS
Applications Applications
Data Data
Runtime Runtime Key Benefits
Middleware Middleware
Core infrastructure updated by provider
OS OS
Virtualization Virtualization Global collaboration for app development
Servers Servers Running multiple languages seamlessly
Storage Storage
Networking Networking
On-premises PaaS
For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube!
CLOUD service categories - PAAS
Applications Applications
Data Data
Runtime Runtime
Middleware Middleware
OS OS
Virtualization Virtualization
Servers Servers Azure SQL API Azure App
Storage Storage Database Management Service
Networking Networking
On-premises PaaS
For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube!
CLOUD service categories - SAAS
On-premises SaaS
For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube!
CLOUD service categories - SAAS
Applications Applications
Data Data
Runtime Runtime Key Benefits
Middleware Middleware
Limited administration responsibility
OS OS
Virtualization Virtualization Limited skills required
Servers Servers Service always up-to-date
Storage Storage
Global access
Networking Networking
On-premises SaaS
For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube!
CLOUD service categories - SAAS
Applications Applications
Data Data
Runtime Runtime
Middleware Middleware
OS OS
Virtualization Virtualization
Servers Servers
Storage Storage
Networking Networking
On-premises SaaS
For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube!
You can’t audit a major CSP, but they offer
On premises vs cloud SOC 2 and other reports on-demand
Right-to-Audit Clauses
written into supply chain contracts, allow an auditor can visit the premises to inspect
and ensure that the contractor is complying with contractual obligations.
This would help an auditor identify:
- Faulty or inferior quality of goods
- Short shipments
- Goods not delivered
- Kickbacks
- Gifts and gratuities to company employees
- Commissions to brokers and others
- Services allegedly performed that were not actually necessary
1. Exam Prep Strategy
2. CISSP Mindset
3. Data Lifecycle
topics
6. Cryptography Concepts
7. Security Models
8. Quantitative Risk Analysis
9. Cloud Computing
10.Answering Questions,
Managing Time
testimonials
What are other learners saying?
“
The "READ" strategy was monumental
support in training my brain how to de-
construct the exam questions.
~S.A.
THE “READ” Strategy
REVIEW
DECIDE
THE “READ” Strategy
GOAL: Find "What is the core issue
you are solving for?"
REVIEW
Read through the details of:
ELIMINATE ✓ What is being asked?
✓ Requirements and context?
ANALYZE ✓ Is a specific framework being
referenced?
DECIDE ✓ Which leg of the CIA triad does
the question speak to?
THE “READ” Strategy
1. A captive portal
2. WPA3 in SAE mode
3. WPA2 in PSK mode
4. WPA2 in Enterprise mode
secure data lifecycle
Both meet the technical requirement,
01 ANSWER but WPA3 has objective advantages
Both WPA3 SAE and WPA2 PSK meet the need of secure
wireless without the need for user accounts.
However, the pre-shared key makes WPA2 PSK less convenient.
Security architecture & engineering
02 ANSWER
3. SMS messages are not encrypted
1. Wardriving
2. A site survey
3. Warwalking
4. Network design diagram
identity and access management
This option provides certainty through due
03 ANSWER care and is well-suited to this use case.
2. A site survey
A site survey meets the need through physical, real-world
validation, demonstrating due care in the response. A network
diagram offers clues, but not direct confirmation. Wardriving and
Warwalking can indirectly expose this issue but are not primarily
intended for this purpose.
Security operations
1. SDWAN
2. VXLAN
3. FCoE
4. VLAN
Security operations
04 ANSWER
VXLAN achieves with least
2. VXLAN complexity, effort, disruption.
HOW TO ANSWER
DIFFICULT questions
with the field - tested
“READ” strategy
THANKS
F O R W A T C H I N G!