2023+CISSP+Domain+1+Study+guide+by+ThorTeaches Com+v3 1
2023+CISSP+Domain+1+Study+guide+by+ThorTeaches Com+v3 1
This domain is highly weighted on the exam (15%) and is the foundation of everything. Every other
knowledge domain builds on top of this chapter.
1 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
• Confidentiality, Integrity and Availability.
▪ We use:
⬥ Encryption for data at rest (for instance AES256), full disk encryption.
⬥ Secure transport protocols for data in motion. (SSL, TLS or IPSEC).
⬥ Best practices for data in use - clean desk, no shoulder surfing, screen
view angle protector, PC locking (automatic and when leaving).
⬥ Strong passwords, multi-factor authentication, masking, access control,
need-to-know, least privilege.
▪ Threats:
⬥ Attacks on your encryption (cryptanalysis).
⬥ Social engineering.
⬥ Key loggers (software/hardware), cameras, Steganography.
⬥ IoT (Internet of Things) – The growing number of connected devices we
have pose a new threat, they can be a backdoor to other systems.
▪ Threats:
⬥ Malicious attacks (DDOS, physical, system compromise, staff).
⬥ Application failures (errors in the code).
⬥ Component failure (Hardware).
2 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
• Disclosure, Alteration, and Destruction
▪ The opposite of the CIA Triad is
DAD.
⬥ Disclosure – Someone
not authorized getting
access to your
information.
⬥ Alteration – Your data
has been changed.
⬥ Destruction – Your data
or systems have been
destroyed or rendered
inaccessible.
3 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
➢ Security Governance Principles
• Least Privilege and Need to Know.
▪ Least Privilege – (Minimum necessary access) Give users/systems exactly the
access they need, no more, no less.
▪ Need to Know – Even if you have access, if you do not need to know, then you
should not access the data.
• Non-repudiation.
▪ A user cannot deny having performed a certain action. This uses both
Authentication and Integrity.
• Subject and Object.
▪ Subject – (Active) Most often users, but can also be programs – Subject
manipulates Object.
▪ Object – (Passive) Any passive data (both physical paper and data) – Object is
manipulated by Subject.
▪ Some can be both at different times, an active program is a subject; when
closed, the data in program can be object.
4 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
• Top-Down vs. Bottom-Up Security Management and Organization structure.
▪ Bottom-Up: IT Security is seen as a nuisance and not a helper, often changes
when breaches happen.
▪ Top-Down: IT leadership is on board with IT Security, they lead and set the
direction. (The exam).
5 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
⬥ ISO 27005: Standards based approach to risk management.
⬥ ISO 27799: Directives on how to protect PHI (Protected Health
Information).
Links on all these as well as ones from previous slides in the “Extras” lecture.
6 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
• Liability:
▪ If the question is who is ULTIMATELY liable, the answer is Senior Leadership.
This does not mean you are not liable; you may be, that depends on Due Care.
Who is held accountable? Who is to blame? Who should pay?
• Evidence:
How you obtain and handle evidence is VERY important.
▪ Types of evidence:
⬥ Real Evidence: Tangible and physical objects in IT Security: Hard disks,
USB drives – NOT the data on them.
⬥ Direct Evidence: Testimony from a firsthand witness, what they
experienced with their 5 senses.
⬥ Circumstantial Evidence: Evidence to support circumstances for a point
or other evidence.
⬥ Collaborative Evidence: Supports facts or elements of the case: not a
fact on its own, but support other facts.
⬥ Hearsay: Not first-hand knowledge – normally inadmissible in a case.
🢭 Computer-generated records - For us, that means log files are
considered hearsay, but case law and updates to the Federal
Rule of Evidence have changed that.
7 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
▪ Best Evidence Rule – The courts prefer the best evidence possible.
⬥ Evidence should be accurate, complete, relevant, authentic, and
convincing.
▪ Secondary Evidence – This is common in cases involving IT.
⬥ Logs and documents from the systems are considered secondary
evidence.
• Reasonable Searches:
▪ The Fourth Amendment to the United States Constitution protects citizens from
unreasonable search and seizure by the government.
▪ In all cases, the court will determine if evidence was obtained legally.
▪ Exigent circumstances apply if there is an immediate threat to human life or of
evidence destruction.
▪ Your organization needs to ensure that our employees are aware their actions
are monitored.
• Entrapment and Enticement:
▪ Entrapment (Illegal and unethical): When someone is persuaded to commit a
crime, they had no intention of committing and is then charged with it.
▪ Enticement (Legal and ethical): Making committing a crime more enticing, but
the person has already broken the law or at least has decided to do so.
⬥ Honeypots can be a good way to use Enticement.
🢭 If there is a gray area in some cases between Entrapment and
Enticement, it is ultimately up to the jury to decide which one it
was.
🢭 Check with your legal department before using honeypots. They
pose both legal and practical risks.
• Intellectual Property:
▪ Copyright © - (Exceptions: first sale, fair use).
⬥ Books, art, music, software.
⬥ Automatically granted and lasts 70 years after creator’s death or 95
years after creation by/for corporations.
▪ Trademarks ™ and ® (Registered Trademark).
8 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
⬥ Brand names, logos, slogans – Must be registered, is valid for 10 years at
a time, can be renewed indefinitely.
▪ Patents: Protects inventions for 20 years (normally) –
⬥ Cryptography algorithms can be patented.
⬥ Inventions must be:
🢭 Novel (New idea no one has had before).
🢭 Useful (It is actually possible to use and it is useful to
someone).
🢭 Nonobvious (Inventive work involved).
▪ Trade Secrets.
⬥ You tell no one about your formula, your secret sauce. If discovered,
anyone can use it; you are not protected.
▪ Attacks on Intellectual Property:
⬥ Copyright.
🢭 Piracy - Software piracy is by far the most common attack on
Intellectual Property.
🢭 Copyright infringement – Use of someone else’s copyrighted
material, often songs and images.
⬥ Trademarks.
🢭 Counterfeiting – Fake Rolexes, Prada, Nike, Apple products –
Either using the real name or a very similar name.
⬥ Patents.
🢭 Patent infringement – Using someone else’s patent in your
product without permission.
⬥ Trade Secrets.
🢭 While an organization can do nothing if their Trade Secret is
discovered, how it is done can be illegal.
⬥ Cyber Squatting – Buying a URL you know someone else will need (gray
area legally).
⬥ Typo Squatting – Buying a URL that is VERY close to real website name
(Can be illegal in certain circumstances).
• Privacy:
▪ You as a citizen and consumer have the right that your Personally Identifiable
Information (PII) is being kept securely.
⬥ There are a number of Laws and Regulations in place to do just that.
▪ US privacy regulation is a patchwork of laws, some overlapping, and some areas
with no real protection.
▪ EU Law – Very pro-privacy, strict protection on what is gathered, how it is used
and stored.
⬥ There are a lot of large lawsuits against large companies for doing what
is legal in the US (Google, Apple, Microsoft, etc.)
9 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
• Rules, Regulations and Laws you should know for the exam (US):
▪ HIPAA (Not HIPPA) – Health Insurance Portability and Accountability Act.
⬥ Strict privacy and security rules on handling of PHI (Protected Health
Information).
▪ Security Breach Notification Laws.
⬥ NOT Federal, all 50 states have individual laws, know your state.
▪ Electronic Communications Privacy Act (ECPA):
⬥ Protection of electronic communications against warrantless
wiretapping.
⬥ The Act was weakened by the Patriot Act.
▪ PATRIOT Act of 2001:
⬥ Expands law enforcement electronic monitoring capabilities.
⬥ Allows search and seizure without immediate disclosure.
▪ Computer Fraud and Abuse Act (CFAA) – Title 18 Section 1030:
⬥ Most commonly used law to prosecute computer crimes.
▪ Gramm-Leach-Bliley Act (GLBA):
⬥ Applies to financial institutions; driven by the Federal Financial
Institutions
▪ Sarbanes-Oxley Act of 2002 (SOX):
⬥ Directly related to the accounting scandals in the late 90s.
▪ Payment Card Industry Data Security Standard (PCI-DSS)
Technically not a law, created by the payment card industry.
⬥ The standard applies to cardholder data for both credit and debit cards.
⬥ Requires merchants and others to meet a minimum set of security
requirements.
⬥ Mandates security policy, devices, control techniques, and monitoring.
⬥ NOT Federal, all 50 states have individual laws, know your state.
⬥
• General Data Protection Regulation (GDPR)
▪ Restrictions: Lawful Interception, national security, military, police, justice
▪ Personal data – covers a variety of data types including: Names, Email
Addresses, Addresses, Unsubscribe confirmation URLs that contain email and/or
names, IP Addresses
⬥ Right to access: Data controllers must be able to provide a free copy of
an individual’s data if requested.
⬥ Right to erasure: All users have a “right to be forgotten”.
⬥ Data portability: All users will be able to request access to their data “in
an electronic format”.
⬥ Data breach notification: Users and data controllers must be notified of
data breaches within 72 hours.
⬥ Privacy by design: When designing data processes, care must be taken
to ensure personal data is secure. Companies must ensure that only
data is “absolutely necessary for the completion of duties”.
⬥ Data protection officers: Companies whose activities involve data
processing and monitoring must appoint a data protection officer.
10 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
• Rules, Regulations and Laws you should know for the exam (EU):
▪ Legacy laws in the EU and between the EU and the US
⬥ EU Data Protection Directive
⬥ EU-US Safe Harbor
⬥ Privacy Shield
11 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
• 3rd party, Acquisitions and Divesture.
▪ As our organizations rely more and more on 3rd party vendors for services and
applications, we need to ensure their security standards, measures, and controls
meet the security standards of our organization.
▪ Procurement: When we buy products or services from a 3rd party, security is
included and not an afterthought.
▪ A common agreement is a SLA (Service Level Agreement) where for instance a
99.9% uptime can be promised.
▪ Industry Standard Attestation should be used:
⬥ The 3rd party vendor must be accredited to the standards of your
industry. This could be ISO, SOC, PCI-DSS.
⬥ “Rights to penetration test” and ”Rights to audit” are often part of
agreement (clearly defined).
▪ Acquisitions: Your organization has acquired another.
⬥ How do you ensure their security standards are high enough?
⬥ How do you ensure data availability in the transition?
▪ Divestures: Your organization is being split up.
⬥ How do you ensure no data crosses boundaries it shouldn’t?
⬥ Who gets the IT Infrastructure?
➢ Professional Ethics
• ISC² Code of Ethics
▪ You agree to this before the exam, and the code of ethics is very testable.
▪ There are only four mandatory canons in the code. By necessity, such high-level
guidance is not intended to be a substitute for the ethical judgment of the
professional.
▪ Code of Ethics Preamble:
⬥ The safety and welfare of society and the common good, duty to our
principles, and to each other, requires that we adhere, and be seen to
adhere, to the highest ethical standards of behavior.
⬥ Therefore, strict adherence to this code is a condition of certification.
▪ Code of Ethics Canons:
⬥ Protect society, the common good, necessary public trust and
confidence, and the infrastructure.
⬥ Act honorably, honestly, justly, responsibly, and legally.
⬥ Provide diligent and competent service to principals.
⬥ Advance and protect the profession.
12 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
⬥ Thou shalt not use a computer to bear false witness.
⬥ Thou shalt not copy or use proprietary software for which you have not
paid.
⬥ Thou shalt not use other people's’ computer resources without
authorization or proper compensation.
⬥ Thou shalt not appropriate other people's’ intellectual output.
⬥ Thou shalt think about the social consequences of the program you are
writing or the system you are designing.
⬥ Thou shalt always use a computer in ways that ensure consideration
and respect for your fellow humans.
13 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
▪ What do we need to do and how do we know when we achieved it? Actions,
Recourses, Outcomes, Owners, and Timeframes.
▪ Policies – Mandatory.
⬥ High level, non-specific.
⬥ They can contain “Patches, updates, strong encryption”
⬥ They will not be specific to “OS,
encryption type, vendor
Technology”
▪ Standards – Mandatory.
⬥ Describes a specific use of
technology (All laptops are W10,
64bit, 8gig memory, etc.)
▪ Guidelines – non-Mandatory.
⬥ Recommendations, discretionary
– Suggestions on how you would
to do it.
▪ Procedures – Mandatory.
⬥ Low level step-by-step guides,
specific.
⬥ They will contain “OS, encryption type, vendor Technology”
▪ Baselines (Benchmarks) - Mandatory.
⬥ Benchmarks for server hardening, apps, network. Minimum
requirement, we can implement stronger if needed.
14 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
▪ Outsourcing and Offshoring - Having someone else do part of your (IT in our
case) work.
⬥ This can lower cost, but a thorough and accurate Risk Analysis must be
performed. Offshoring can also pose problems with them not having to
comply with the same data protection standards.
• Access Control Types (Many can be multiple types – On the exam look at question
content to see which type it is).
▪ Preventative:
⬥ Prevents action from happening – Least privilege, drug tests, IPS,
firewalls, encryption.
▪ Detective:
⬥ Controls that Detect during or after an attack – IDS, CCTV, alarms, anti-
virus.
▪ Corrective:
⬥ Controls that Correct an attack – Anti-virus, patches, IPS.
▪ Recovery:
⬥ Controls that help us Recover after an attack – DR Environment,
backups, HA Environments .
▪ Deterrent:
⬥ Controls that Deter an attack – Fences, security guards, dogs, lights,
Beware of the dog signs.
▪ Compensating:
⬥ Controls that Compensate – other controls that are impossible or too
costly to implement.
15 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
➢ Risk Identification, Assessment, Response, Monitoring
and Reporting
• Risk Assessment.
▪ Quantitative and Qualitative Risk
Analysis.
▪ Uncertainty analysis.
▪ Everything is done using cost-benefit
analysis.
▪ Risk Mitigation/Risk Transference/Risk
Acceptance/Risk Avoidance.
▪ Risk Rejection is NEVER acceptable.
▪ We assess the current countermeasures.
⬥ Are they good enough?
⬥ Do we need to improve on
them?
⬥ Do we need to implement
entirely new countermeasures?
• Risk Analysis:
▪ Qualitative vs. Quantitative Risk Analysis.
For any Risk analysis we need to identify our assets. What are we
protecting?
▪ Qualitative Risk Analysis – How likely is it to happen and how bad is it if it
happens?
▪ Quantitative Risk Analysis – What will it actually cost us in $? This is fact based
analysis, Total $ value of asset, math is involved.
▪ Threat – A potentially harmful incident (Tsunami, Earthquake, Virus, ... )
▪ Vulnerability – A weakness that can allow the Threat to do harm. Having a data
center in the tsunami flood area, not earthquake resistant, not applying patches
and anti-virus, …
16 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
▪ Risk = Threat x Vulnerability.
▪ Impact - Can at times be added to give a fuller picture. Risk = Threat x
Vulnerability x Impact (How bad is it?).
▪ Total Risk = Threat x Vulnerability x Asset Value.
▪ Residual Risk = Total Risk – Countermeasures.
• Risk Registers:
▪ A risk category to group similar risks.
▪ The risk breakdown structure identification number.
▪ A brief description or name of the risk to make the risk easy to discuss.
▪ The impact (or consequence) if event actually
occurs rated on an integer scale.
▪ The probability or likelihood of
its occurrence rated
on an integer scale.
▪ The Risk Score (or Risk Rating)
is the multiplication
of Probability and Impact, and
is often used to rank
the risks.
▪ Common mitigation steps (e.g.
within IT projects)
⬥ Identify
⬥ Analyze
⬥ Plan Response
⬥ Monitor
⬥ Control
17 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
• Quantitative Risk Analysis
This is where we put a number on our assets and risks.
▪ We find the asset’s value: How much of it is compromised, how much one
incident will cost, how often the incident occurs and how much that is per year.
⬥ Asset Value (AV) – How much is the asset worth?
⬥ Exposure factor (EF) – Percentage of Asset lost?
⬥ Single Loss Expectancy (SLE) = (AV x EF) – What does it cost if it happens
once?
⬥ Annual Rate of Occurrence (ARO) – How often will this happen each
year?
⬥ Annualized Loss Expectancy (ALE) – This is what it costs per year if we
do nothing.
▪ Total Cost of Ownership (TCO) – The mitigation cost: upfront + ongoing cost
(Normally Operational
The Laptop ($1,000) + PII ($9,000) per loss (AV) The Data Center is valued at $10,000,000 (AV)
It is a 100% loss, it is gone (EF) If a flooding happens 15% of the DC is compromised (EF)
Loss per laptop is $10,000 (AV) x 100% EF) = (SLE) Loss per Flooding is $10,000,000 (AV) x 15% EF) = (SLE)
The organization loses 25 Laptops Per Year (ARO) The flooding happens every 4 years = 0.25 (ARO)
The annualized loss is $250,000 (ALE) The annualized loss is $375,000 (ALE)
Doing nothing costs us $1,000,000 per tech refresh cycle ($250,000 per year).
Implementing full disk encryption and remote wipe will cost $231,000 per tech refresh cycle ($57,750
per year).
18 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
The laptop hardware is a 100% loss, regardless. What we are mitigating is the 25 x $9,000 = $225,000 by
spending $57,750.
This is our ROI (Return On Investment): TCO ($57,750) < ALE ($250,000). This makes fiscal sense, we
should implement.
• This area is very testable. Learn the formula, the risk responses to differentiate
Qualitative and Quantitative Risk.
▪ Qualitative = Think “quality.” This concept is semi-vague, e.g., “pretty good
quality. “
▪ Quantitative = Think “quantity.” How many; a specific number.
19 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
• NIST 800-30 - United States National Institute of Standards and Technology Special
Publication
▪ A 9-step process for Risk Management.
1. System Characterization (Risk Management scope, boundaries, system
and data sensitivity).
2. Threat Identification (What are the threats
to our systems?).
3. Vulnerability Identification (What are the
vulnerabilities of our systems?).
4. Control Analysis (Analysis of the current
and planned safeguards, controls and
mitigations).
5. Likelihood Determination (Qualitative –
How likely is it to happen)?
6. Impact Analysis (Qualitative – How bad is it
if it happens? Loss of CIA).
7. Risk Determination (Look at 5-6 and determine Risk and Associate Risk
Levels).
8. Control Recommendations (What can we do to Mitigate, Transfer, … the
risk).
9. Results Documentation (Documentation with all the facts and
recommendations).
20 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
▪ Do we stop issuing laptops, or do we add full-disk encryption and remote wipe
capabilities?
▪ We update the risk register, with the mitigations, the risk responses we chose
and see if the new risk level is acceptable.
21 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
➢ RACI Chart
• Responsible, Accountable, Consulted, Informed
▪ R (Responsible) - The person or people that
does the actual work to complete the task.
▪ A (Accountable) - The person ultimately
accountable for the correct and thorough
completion of the task.
▪ C (Consulted) - The people who provide
information for the task and with whom
there is two-way communication.
▪ I (informed) - The people who are kept
informed about the task’s progress and
with whom there is one-way communication.
22 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
➢ Governance, Risk Management, Compliance
• GRC – aligning our risk management strategies to our business objectives and
compliance standards.
▪ Governance – ensures that IT goals and processes aligns with our business
objectives.
▪ Risk Management – the process of identifying, assessing, and responding to
risks.
▪ Compliance – conforming with a stated requirement.
⬥ Laws and regulations.
⬥ Auditing and monitoring.
⬥ Ethics and privacy.
23 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
4. To integrate privacy risk management processes into
the RMF to better support the privacy protection
needs for which privacy programs are
responsible.
5. To promote the development of
trustworthy secure software and systems.
6. To integrate security-related, supply chain
risk management (SCRM) concepts into
the RMF.
7. To allow for an organization-generated
control selection approach to complement
the traditional baseline control selection
approach and support the use of the
consolidated control catalog in NIST Special
Publication 800-53, Revision 5.
24 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
• Types of attackers:
▪ Hackers:
⬥ Now: Anyone trying to get access to or disrupt any leg of the CIA Triad
(Confidentiality, Integrity, Availability).
⬥ Original use: Someone using something in a way not intended.
⬥ White Hat hackers: Professional pen testers trying to find flaws so we
can fix it (Ethical hackers).
25 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
▪ Insiders:
⬥ Authorized individuals - Not necessarily to the compromised system,
who intentionally or unintentionally compromise the system or data.
⬥ This could be: Assault on an employee, blackmail, browsing of
proprietary information, computer abuse, fraud and theft, information
bribery, input of falsified or corrupted data.
⬥ 38-52% of risks are from insiders, another reason good Authentication
and Authorization controls are needed.
▪ Hacktivism/Hacktivist (hacker activist): Hacking for political or socially
motivated purposes.
⬥ Often aimed at ensuring free speech, human rights, freedom of
information movement.
▪ Governments:
⬥ State sponsored hacking is common; often you see the attacks
happening between the hours of 9 and 5 in that time zone; this is a day
job.
⬥ Approximately 120 countries have been developing ways to use the
internet as a weapon to target financial markets, government computer
systems and utilities.
⬥ Famous attacks: US elections (Russia), Sony websites (N. Korea), Stuxnet
(US/Israel), US Office of Personnel Management (China), …
• Types of Attacks
▪ Phishing, spear phishing and whale phishing
(Fisher spelled in hacker speak with Ph not F).
⬥ Phishing (Social engineering email attack):
26 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
🢭 Click to win, Send information to get your inheritance …
🢭 Sent to hundreds of thousands of people; if just 0.02% follow
the instructions they have 200 victims.
⬥ Spear Phishing: Targeted phishing, not just random spam, but targeted
at specific individuals.
🢭 Sent with knowledge about the target (person or company);
familiarity increases success.
⬥ Whale Phishing (Whaling): Spear phishing targeted at senior leadership
of an organization.
🢭 This could be: “Your company is being sued if you don’t fill out
the attached documents (with trojan in them) and return them
to us within 2 weeks”.
⬥ Vishing (Voice Phishing): Attacks over automated VOIP (Voice over IP)
systems, bulk spam similar to phishing.
🢭 These are: “Your taxes are due”, “Your account is locked” or
“Enter your PII to prevent this” types of calls.
▪ Lists a range of disaster scenarios and the steps the organization must take in
any particular scenario to return to regular operations.
▪ BCPs often contain COOP (Continuity of Operations Plan), Crisis
Communications Plan, Critical Infrastructure Protection Plan, Cyber Incident
Response Plan, DRP (Disaster Recovery Plan), ISCP (Information System
Contingency Plan), Occupant Emergency Plan.
▪ We look at what we would do if a critical supplier closed, the facility was hit by
an earthquake, what if we were snowed in and staff couldn't get to work, ...
▪ They are written ahead of time, and continually improved upon, it is an iterative
process.
▪ We write the BCP with input from key staff and at times outside BCP
consultants.
27 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
▪ Business Impact Analysis: We identify and prioritize critical systems and
components.
▪ Identify Preventive Controls: We identify the current and possible preventative
controls we can deploy.
▪ Recovery Strategy: How do we recover efficiently? What are our options? DR
site, system restore, cloud, ...
▪ Plan Design and Development: We build a specific plan for recovery from a
disaster; procedures, guidelines, and tools.
▪ Implementation, Training, and Testing: We test the plan to find gaps and we
train staff to be able to act on the plan.
▪ BCP/DRP Maintenance: It is an iterative process. Our organization develops,
adds systems, facilities, or technologies and the threat landscape constantly
changes, we have to keep improving and tweaking our BCP and DRP.
▪ RPO (Recovery Point Objective): The acceptable amount of data that cannot be
recovered.
⬥ The RPO must ensure that the maximum tolerable data loss for the
system, function, or activity is not exceeded.
▪ MTD (Maximum Tolerable Downtime): MTD ≥ RTO + WRT:
⬥ System rebuild time, configuration, and reinsertion into production
must be less than or equal to our MTD.
28 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
⬥ The total time a system can be inoperable before our organization is
severely impacted.
⬥ RTO (Recovery Time Objective): The amount of time to restore the
system (hardware).
🢭 The recovery time objective must ensure that the MTD for each
system, function or activity is not exceeded.
⬥ WRT (Work Recovery Time): (software)
🢭 How much time is required to configure a recovered system.
▪ MTBF (Mean Time Between Failures): How long a new or repaired
system/component will function on average.
▪ MTTR (Mean Time to Repair): How long it will take to recover a failed system.
▪ MOR (Minimum Operating Requirements): The minimum requirements for our
critical systems to function.
29 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
They need to be part of at least the initiation and the final approval of the plans.
▪ They are responsible for the plan, they own the plan and since they are
ultimately liable, they must show due-care and due-diligence.
▪ We need top-down IT security in our organization (the exam assumed we have
that).
▪ In serious disasters, it will be Senior Management or someone from our legal
department who should talk to the press.
▪ Most business areas often feel they are the most important area and because of
that their systems and facilities should receive the priority, senior management
being ultimately liable and the leaders of our organization, obviously have the
final say in priorities, implementations, and the plans themselves.
• BCPs/DRPs are often built using the waterfall project management methodology.
30 | Page
https://thorteaches.com/
CISSP Domain 1Lecture notes
31 | Page
https://thorteaches.com/