CISSP & CISM - Summary of domain 1: 'Security and Risk Management'
47 views 0 purchase
Course
CISSP
Institution
CISSP
Book
Destination CISSP
Summary of the first domain ' Security and Risk Management' based on the book: 'Destination CISSP; A Concise Guide'.
It is also useful for CISM, but not a direct translation.
CISSP & CISM - Summary of domain 2 'Asset Security'
All for this textbook (2)
Written for
CISSP
All documents for this subject (316)
Seller
Follow
RSCHO
Reviews received
Content preview
ABSTRACT
Summary of all the first domain of
CISSP official study guide based on the
book: ‘Destination CISSP: A concise
guide’.
Remco van der Schoot
DOMAIN ONE
EXPLAINED; CISSP
A summary of the information needed in order to achieve
certification in CISSP
, domain one explained; CISSP | Remco van der Schoot
INHOUDSOPGAVE
Introduction ............................................................................................................................................................ 4
Domain one: Security and Risk Management ....................................................................................................... 5
1. Understand, adhere to, and promote professional ethics .................................................................................. 5
2. Understand and apply security concepts ............................................................................................................ 5
2.1. Focus of security........................................................................................................................................... 5
2.2. CIA-triad ....................................................................................................................................................... 5
2.2.1. Confidentiality (need to know) ............................................................................................................. 6
2.2.2. Integrity (Correctness) .......................................................................................................................... 6
2.2.3. Availability (access) ............................................................................................................................... 6
2.3. Other security concepts ............................................................................................................................... 6
2.3.1. Triple A .................................................................................................................................................. 6
2.3.2. DAD ....................................................................................................................................................... 7
3. Evaluate and apply security governance principles ............................................................................................ 7
3.1. Planning levels .............................................................................................................................................. 8
3.1.1. Strategic plans (+/- 5 years) .................................................................................................................. 8
3.1.2. Tactical plan (1 year) ............................................................................................................................. 8
3.1.3. Operational plans (short time / < 1 year) .............................................................................................. 8
3.2. Accountability versus Responsibility ............................................................................................................ 8
3.3. Organizational roles and responsibilities ..................................................................................................... 8
3.3.1. Senior management -> Making decisions ............................................................................................. 8
3.3.2. Security Professionals -> Executing decisions ....................................................................................... 9
3.3.3. Data owners -> Managing data ............................................................................................................. 9
3.3.4. End-users -> use data ............................................................................................................................ 9
3.3.5. Auditor -> verify security (policy) .......................................................................................................... 9
3.3.6. Overview ............................................................................................................................................... 9
3.4. Due Care versus Due Dillgence .................................................................................................................. 10
4. Determine complaince and other requirements .............................................................................................. 10
5. Understanding Legal and regulatory issues that pertain to information security in a holistic context ............ 11
5.1. Licensing and intellectual property requirements ..................................................................................... 11
5.2. Import/export controls .............................................................................................................................. 11
5.3. Transborder data flow ................................................................................................................................ 11
5.4. Privacy ........................................................................................................................................................ 11
5.5. Privacy requirements ................................................................................................................................. 12
5.6. Privacy assessments ................................................................................................................................... 13
6. Understanding requirements for investigation types ....................................................................................... 15
7. Develop, document, and implement security policies, procedures, standards, baselines, and guidelines ...... 16
P a g i n a 2 | 32
, domain one explained; CISSP | Remco van der Schoot
7.1. Document hierarchy ................................................................................................................................... 16
7.2. Policies, standards, procedures, baselines, and guidelines ....................................................................... 16
8. Identify, analyze, and prioritize business conitnuity (BC) requirements .......................................................... 17
8.1. BCM, BCP, and DRP .................................................................................................................................... 17
8.2. RPO, RTO, WRT, and MTD .......................................................................................................................... 18
8.3. Business Impact Analysis (BIA) ................................................................................................................... 19
8.4. Disaster Response Process ......................................................................................................................... 19
8.5. Restoration order ....................................................................................................................................... 19
9. Contribute to and enforce personnel security policies and procedures ........................................................... 20
9.1. Personnel security controls ........................................................................................................................ 20
9.2. Enforce personnel security controls........................................................................................................... 20
10. Understand and apply risk management concepts ......................................................................................... 21
10.1. Risks Management ................................................................................................................................... 21
10.2. Asset valuation ......................................................................................................................................... 22
10.3. Risk analysis.......................................................................................................................................... 22
10.3. Types of controls ...................................................................................................................................... 23
10.4. Categories of controls .............................................................................................................................. 23
10.5. Functional and assurance ......................................................................................................................... 23
10.6. Selecting controls ..................................................................................................................................... 24
10.7. apply supply chain risk management concepts........................................................................................ 24
10.8. Risk management framework .................................................................................................................. 25
10.8.1. COBIT ................................................................................................................................................. 25
10.8.2. Other standards and guidelines ........................................................................................................ 25
11. Understand and apply threat modeling concepts and methodologies ........................................................... 26
11.1. Threat modeling methodologies .............................................................................................................. 26
11.1.1. STRIDE ............................................................................................................................................... 26
11.1.2. PASTA ................................................................................................................................................ 27
11.1.3. DREAD ............................................................................................................................................... 30
11.2. Social engineering .................................................................................................................................... 30
12. Apply supply chain risk management (SCRM) concepts ................................................................................. 31
12.1. SLR, SLA, and service level reports ........................................................................................................... 31
13. Establish and maitain a security awareness, education and training programs ............................................. 32
13.1. Awareness, training, and education ......................................................................................................... 32
P a g i n a 3 | 32
, domain one explained; CISSP | Remco van der Schoot
INTRODUCTION
The exam consists of 100-150 multiple-choice questions and 70% is needed to pass. You have three hours to
complete the exam.
Percentage on the exam
Software
Development Security Security and Risk
10% Management
15%
Security Operations
13%
Asset Security
10%
Security Assessment
and Testing
Security Architecture
12%
and Engineering
13%
Identity and Access
Management Communications and
14% Network Security
13%
P a g i n a 4 | 32
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller RSCHO. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $6.44. You're not tied to anything after your purchase.