Destination Cert - CISSP - Domain 1
Destination Cert - CISSP - Domain 1
Have a look at everything you need to know for the CISSP certification exam
for domain 1 in this article.
Security needs to enable the organization's goals and objectives, not just
enforce information processes or fix technical issues, and must be managed
top down instead of bottom up.
On the other hand, scoping and tailoring are used to align security objectives
with organizational goals and objectives:
Scoping looks at potential control elements and determines which ones
are in scope—for example, security control elements that could adhere to
applicable laws and regulations—and which ones are out of scope.
Tailoring looks specifically at applicable—in scope—security control
elements and further refines or enhances them so they're most effective
and aligned with the goals and objectives of an organization.
Design, implementation,
Information management, and review of
Systems Security the organization's security
Responsible for: policies, standards,
Professionals / IT
Security Officer baselines, procedures, and
guidelines
Managing, troubleshooting,
and applying hardware and
software patches to systems
as necessary
Operator / Managing user permissions
Responsible for: per the owner's
Administrator
specifications
Administering and managing
specific applications and
services
The responsibility for the corruption rests with the custodian. However,
accountability for corruption rests with the asset owner.
Not every attack can be prevented, but effective security strategies can
reduce attacks by making them:
Not worthwhile
Too time-consuming
Too expensive
Bottom line: Don't be the low-hanging fruit that can be easily picked!
The following table will show what trade secrets, patents, copyrights, and
trademarks protect.
Disclosure Term of
Term Protects Protects Against
Required Protection
Trade Potentially
Business information No infinitive Misappropriation
Secret
Privacy
Privacy is the state or condition of being free from being observed or
disturbed by other people, and personal data is information on its own or in
combination that uniquely identifies an individual.
It's essential that personal data is well protected to comply with current
privacy laws and to protect the value of the information and of the
organization itself. This can become complex for multinational organizations
since there's a significant variation around the world in both the definition of
personal data and the laws that determine how to protect it.
Personal data
Depending on the location in the world, personal data may be referred to in
different ways, and what constitutes personal data can vary significantly.
Personal data can be referred to as:
PI: Personal Information
PII: Personally Identifiable Information
SPI: Sensitive Personal Information
PHI: Personal Health Information
Privacy requirements
One privacy law that you should have a deeper understanding of is the GDPR,
which is one of the most comprehensive privacy laws in the world, and many
countries have modeled or are in the process of modeling their privacy laws
on GDPR or plan to in the future.
Privacy assessments
Privacy Impact Assessment (PIA) is a process undertaken on behalf of an
organization to determine if personal data is being protected appropriately
and to minimize risks to personal data where appropriate.
The committee, reporting to the Board of Directors and CEO, should develop
an overarching security policy that is aligned with organizational goals and
objectives that covers the entire organization and clearly articulates the goals
and objectives of the security function.
While policies don't need to be reviewed every year, standards, procedures,
baselines, and guidelines may need to be updated frequently.
Employee duress
An employee acting under duress may be forced to perform an action or set
of actions that they wouldn't do under normal circumstances. One common
practice to handle these stressful situations is to have keywords that denote
that an employee is acting under duress.
Job rotation. Job rotation is quite useful for protecting against fraud and
provides cross-training. It entails rotating staff (especially individuals in
key positions) so that an individual can't commit fraud and cover it up.
Mandatory vocation. Mandatory vacation is a control also used by
organizations to detect fraud. Employees are required to go on vacation
for a set period of time, during which time another employee can step
into the role and determine if any malicious or nefarious activity has
taken place or is actively taking place.
Separation of duties. Separation of duties is used to prevent fraud by
requiring more than one employee to perform critical tasks.
Need-to-know and Least privilege. Least privilege ensures that only
the minimum permissions needed to complete the work are granted to
any employee. Need to know ensures that access to sensitive assets is
restricted only to those who require the information to complete the work.
Value. identifying the assets of the organization and ranking those assets
from most to least valuable. This process is referred to as asset valuation,
and the ranking of assets can be achieved via two methods or, most
commonly, a combination of both quantitative value analysis and
qualitative value analysis.
Risk analysis. Determine the risks associated with each asset via the risk
analysis process. The four key components are threat, vulnerability,
impact, and probability/likelihood.
Treatment. There are four risk treatment methods: avoid, transfer,
mitigate, and accept.
Asset valuation
Before risks can be identified and managed, valuable assets of the
organization must first be identified.
Two different forms of analysis can be used to rank the assets of the
organization from most to least valuable: qualitative and quantitative:
After the asset valuation process, related threats and vulnerabilities must be
identified for each asset, and owners must be deeply involved in the risk
analysis process.
Although risk can never be entirely eliminated, it can be managed via the
following approaches:
Avoid. Choosing to stop doing whatever exposes the asset to risk. Not
jumping can avoid the risk, but you can miss significant opportunities (the
opportunity cost).
Transfer. Transferring risk means sharing some risk with another party,
usually an insurance company.
Mitigate. Mitigate risk means implementing controls that reduce the risk
to an acceptable level.
Accept. Accepting risk simply means taking no action or no further action
where the risk to a particular asset is concerned.
Types of controls
Seven major types of controls can be put in place, as shown in the following
table:
Categories of controls
A way to categorize the security controls is as safeguards or as
countermeasures.
Safeguards are proactive controls; they are put in place before the risk has
occurred to deter or prevent it from manifesting.
Countermeasures are reactive controls. They are put in place after risk has
occurred and aim to allow us to detect and respond to it accordingly.
Administrative
Logical/Technical
Physical
Functional Assurance
Continuous improvement
STRIDE
STRIDE is a threat-focused methodology that's less strategic and thorough
than PASTA. It is an acronym of:
Spoofing
Tampering
Repudiation
Information disclosure
Denial-of-service
Elevation of privilege
PASTA
Process for Attack Simulation and Threat Analysis (PASTA), contrary to
STRIDE, is an attacker-focused, risk-centric methodology. It is much more
detailed than STRIDE and performs threat analysis from a strategic
perspective.
The stages in PASTA are as follows:
Define objectives
Define technical scope
Application decomposition
Threat analysis
Vulnerability and weakness analysis
Attack modeling
Risk and impact analysis
DREAD
DREAD is a threat model primarily used to measure and rank the severity of
threats. DREAD is often used in combination with the STRIDE model, where
STRIDE identifies the threats, and DREAD is then used to rank the severity
of threats. The acronym means:
Damage
Reproducibility
Exploitability
Affected users
Discoverability
Social engineering
Social engineering can be defined as using deception or intimidation to get
people to provide sensitive information that they shouldn't in order to
facilitate fraudulent activities.
It is a prevalent means of attack against organizations and employees (the
biggest security weakness that exists in most companies) because it's very
effective. Common social engineering tactics include intimidation, deception,
and rapport.
Social engineering attacks can be mitigated through awareness, training,
and education.
The topics selected should directly align with the organization's goals and
objectives. At the same time, training and education programs and materials
should also evolve and be updated accordingly to be most effective.