Security+ Week 2
Security+ Week 2
SY0-701
Attention Attendees:
Remember to type your messages to all panellists and attendees
Course Structure
Week / Module 1
Introduction & Security Fundamentals
Week / Module 2
Compliance & Operational Security
Week / Module 3
Threats & Vulnerabilities
Week / Module 4
Application, Data & Host Security
Attention Attendees:
Remember to type your messages to all panellists and attendees
Compliance & Operational Security
Security Governance Concepts
Policies
• Vital in establishing effective governance and ensuring organizational compliance
• Form the framework for operations, decision-making, and behaviors, and rules for a compliant and
ethical corporate culture
• Align the organization around common goals, prevent misconduct, and remove inefficiencies
• Common Policies
• Acceptable Use Policy (AUP)
• Information Security Policies
• Business Continuity & Continuity of Operations Plans (COOP)
• Disaster Recovery
• Incident Response
• Software Development Life Cycle (SDLC) Policy
• Change Management
Attention Attendees:
Remember to type your messages to all panellists and attendees
Policies (cont’d)
Guidelines:
• Recommendations that steer actions in a particular job role or department
• They are more flexible than policies and
• Allow flexibility for their implementation
Attention Attendees:
Remember to type your messages to all panellists and attendees
Procedures
• Define step-by-step instructions and checklists
• Ensure a task is completed in a compliant and repeatable way
• Playbooks
• Collection of critical actions generally associated with Security Operations (SOC)
• Examples
• Onboarding/Offboarding
• Background Checks
• Service/Software Provisioning
• Desktop Deployment
• Patching and updating
• “Go-Live” actions
• After hours support
• Ticket management
Attention Attendees:
Remember to type your messages to all panellists and attendees
Standards
• Define a set of best practices and include specific details
• Often associated with regulations and polices
• Regulations and policies use standards to offload details
• Standard can change often while policy remains the same
• Standard can be managed by subject matter experts
• Industry Standards
• ISO 27k series, NIST 800 series Special Publications, PCI-DSS, FIPS, many others…
• Internal Standards
• Encryption, coding Practices, audit, many others…
Attention Attendees:
Remember to type your messages to all panellists and attendees
Legal Environment
• Governance committees ensure their organizations abide by all applicable cybersecurity laws and
regulations to protect them from legal liability
• Frameworks, benchmarks, and configuration guides may be used to demonstrate compliance with
legal/regulatory requirements
• Global Law
• National Law
• State/Local Law
• Industry Regulations
• Privacy Legislation
Attention Attendees:
Remember to type your messages to all panellists and attendees
Legal Environment (cont’d)
• Privacy • Healthcare
• GDPR • Health Insurance Portability and
• CCPA Accountability Act (HIPAA) (United States)
• Many others • Financial Services
• Energy • Gramm-Leach-Bliley Act (GLBA) (United
• North American Electric Reliability States)
Corporation (NERC) (United States and • Payment Card Industry Data Security
Canada) Standard (PCI DSS) (Contractual obligation)
• Education & Children • Government
• Family Educational Rights and Privacy • Federal Information Security Modernization
Act (FERPA) (United States) Act (FISMA) (United States)
• Children's Internet Protection Act (CIPA) • Criminal Justice Information Services
(United States) Security Policy (CJIS) (United States)
• Children's Online Privacy Protection Act • The Government Security Classifications
(COPPA) (United States) (GSC) (United Kingdom)
Attention Attendees:
Remember to type your messages to all panellists and attendees
Compliance & Operational Security
Change Management
Change Management Programs
Attention Attendees:
Remember to type your messages to all panellists and attendees
Change Management Programs (cont’d)
• Stakeholder Input
• Change Review Board
• Impact Analysis
• Test Results
• Rollout Plans
• Backout Plans
• Maintenance Windows
• Standard Operating Procedures (SOPs)
Attention Attendees:
Remember to type your messages to all panellists and attendees
Allowed & Blocked Changes
Attention Attendees:
Remember to type your messages to all panellists and attendees
Restarts, Dependencies & Downtime
Attention Attendees:
Remember to type your messages to all panellists and attendees
Documentation & Version Control
Attention Attendees:
Remember to type your messages to all panellists and attendees
Compliance & Operational Security
Automation & Orchestration
Automation & Scripting
Attention Attendees:
Remember to type your messages to all panellists and attendees
Automation & Orchestration Implementation
Attention Attendees:
Remember to type your messages to all panellists and attendees
Compliance & Operational Security
Data Classification & Compliance
Data Types
• Categorizing or classifying data based on its inherent characteristics, structure, and intended use
• Regulated Data
• Trade Secrets
• Intellectual Property
• Legal and Financial Data
• Many Others
Attention Attendees:
Remember to type your messages to all panellists and attendees
Data Classifications
Attention Attendees:
Remember to type your messages to all panellists and attendees
Data Sovereignty and Geographical Considerations
• Data Sovereignty
• A legal jurisdiction restricting processing and storage of data on systems
that do not physically reside within that jurisdiction
• Geographical Considerations
• Organizations must ensure data remains within a designated boundary
• Access controls to validate a user's geographic location
Attention Attendees:
Remember to type your messages to all panellists and attendees
Privacy
Attention Attendees:
Remember to type your messages to all panellists and attendees
Privacy (cont’d)
• Legal Implications
• Protecting privacy data carries significant local, national, and global legal implications
• Many countries have specific privacy laws and regulations that dictate how personal data should
be handled within their jurisdiction
• The General Data Protection Regulation (GDPR) in the European Union has had a substantial
impact globally by setting high privacy and data protection standards
• GDPR applies to organizations that process the personal data of EU residents, regardless of their
physical location
• Roles and Responsibilities
• Data Controller and Data Processor
• Both roles are responsible for ensuring personal data protection in compliance with data protection laws
and regulations
• Data Subject
Attention Attendees:
Remember to type your messages to all panellists and attendees
Privacy (cont’d)
• Right to Be Forgotten
• Fundamental principle outlined in the General Data Protection Regulation (GDPR)
• Grants data subjects the right to request the deletion of their personal data under certain
circumstances
• Ownership of Privacy Data
• It is not easy to attribute traditional notions of ownership to privacy data
• Many data protection laws place the emphasis on protecting the data subject
• Data Inventories and Retention
• Detailed record of personal data being collected, processed, and stored
• Retain personal data only for as long as necessary to fulfill the intended purpose or as required by
law
Attention Attendees:
Remember to type your messages to all panellists and attendees
Privacy Breaches and Data Breaches
Attention Attendees:
Remember to type your messages to all panellists and attendees
Compliance
Attention Attendees:
Remember to type your messages to all panellists and attendees
Monitoring & Reporting
Attention Attendees:
Remember to type your messages to all panellists and attendees
Data Protection and Data Loss Prevention
Attention Attendees:
Remember to type your messages to all panellists and attendees
Questions
Attention Attendees:
Remember to type your messages to all panellists and attendees