CISSP Models Process Frameworks Handout
CISSP Models Process Frameworks Handout
CISSP
EXAM
CRAM Security Models, Processes,
and Frameworks
I N T R O D U C T I O N : SERIES OVERVIEW
1 2 3 4 5 6 7 8
1
CISSP
EXAM
Available on PREP!
CISSP
EXAM
CRAM How do I master the
“CISSP Mindset”?
QUANTITATIVE RISK ANALYSIS
CISSP
EXAM
CRAM
MEMORIZATION TIPS
ULTIMATE GUIDE
CISSP
EXAM
Available on CRAM
CISSP
EXAM
CRAM
CRYPTOGRAPHY DRILL-DOWN
A pdf copy of the presentation is
available in the video description!
Subscribed
SUBSCRIBE
50 question CISSP practice
quiz now available FREE
(link in description)
CISSP
EXAM STUDY GUIDE
& PRACTICE TESTS BUNDLE
STEP 6 STEP 2
MONITOR
Security Controls
Risk SELECT
Security Controls
Management
STEP 5 Framework STEP 3
AUTHORIZE IMPLEMENT
Security Controls Security Controls
STEP 4
ASSESS
6 stepS Security Controls
D O M A I N 1 : RISK MANAGEMENT FRAMEWORK
OCTAVE
Operationally Critical Threat, Asset, and
Vulnerability Evaluation
FAIR
Factor Analysis of Information Risk
issues that
pertain to information security in
1. Strategy
2. Provisions and
3. Plan
4. Plan
5. Training and
D O M A I N 1 : THREAT MODELING
Spoofing
Tampering
Repudiation
Information disclosure
developed by
Microsoft Denial of service
Elevation of privilege
D O M A I N 1 : THREAT MODELING
Visual
Agile
based on Agile
Simple
PM principles Threat
Damage potential
Reproducibility
Exploitability
based on answer Affected users
to 5 questions
Discoverability
D O M A I N 1 : THREAT MODELING
Secret Private
Class 2 Serious damage
Serious damage
Confidential Sensitive
Damage
Class 1 Damage
Selection of Security
5 Functional Requirements 2 Identification
of Threats
System &
Environment
Objectives
Determination of
4 Security Objectives
3 Analysis & Rating
of Threats
government (DoD)
Biba Bell-LaPadula
State machine model (SMM)
No read up, no write down
Sutherland
preventing interference
(information flow and SMM) chunking
D O M A I N 3 : SECURITY MODELS
Bell-LaPadula is , the
others are generally the opposite of this.
D O M A I N 3 : SECURITY MODELS
picmonic
acronym
2 Data Link ARP, SLIP, PPP, L2F, L2TP, PPTP, FDDI, ISDN
Specifications Mechanisms
documents associated with controls used within an
the system being audited. information system to meet
the specifications.
Activities Individuals
actions carried out by people people who implement specifications,
within an information system. mechanisms, and activities.
CISSP
EXAM
CRAM Security Operations
DOMAIN 7
change management
Destruction Classification
Usage
Creation The Information Lifecycle
Destruction Classification
Archive Storage
Usage
Creation The Information Lifecycle
Destruction Classification
Archive Storage
Usage
Creation The Information Lifecycle
Destruction Classification
Archive Storage
Usage
Creation The Information Lifecycle
Destruction Classification
Archive Storage
Usage
Creation The Information Lifecycle
Destruction Classification
Archive Storage
Usage
D O M A I N 7 : INCIDENT RESPONSE FRAMEWORK
3 Mitigation
4 Reporting
|
5 Recovery
6 Remediation
7 Lessons Learned
managing INCIDENT response
Monitoring tools, IPS, firewalls, users, notification
Detection
to management and/or help desk
— detection
— response limiting damage
— lessons learned
D O M A I N 1 : BUSINESS CONTINUITY
issues that
pertain to information security in
1. Strategy
2. Provisions and
3. Plan
4. Plan
5. Training and
Business Continuity Planning (BCP)
Scan networks
vulnerability
Identify vulnerable systems scans
Level 1: Initial
No plan.
Level 2: Repeatable.
Basic lifecycle mgmt.
Level 3: Defined.
Formal, documented SW development processes.
Level 4: Managed.
Quantitative measures to gain detailed understanding.
Level 5: Optimizing. CI/CD
Continuous development process, w/ feedback loops.
Capability Maturity Model Integration (CMMI)
Focused on CONTINIOUS
LEVEL 5 OPTIMIZING process improvement
REQUIRE PEER
process QUANTITATIVELY
REVIEWS LEVEL 4 QUANTITATIVELY
MANAGED measured and controlled
Characterized for
LEVEL 2 REPEATABLE PROJECTS and MANAGED
REQUIREMENTS ANALYSIS
DESIGN
repeat !
IMPLEMENTATION
TESTING
EVOLUTION
software development lifecycle ( SDLC )
REQUIREMENTS ANALYSIS
DESIGN
Real
Developers
IMPLEMENTATION
Ideas
TESTING
Take
Effort
EVOLUTION
agile model software development model
PRELIMINARY DESIGN
DETAILED DESIGN
in a word – “iterative”
INSIDE CLOUD
THANKS
F O R W A T C H I N G!