Ebook CISSP Domain 01 Security and Risk Management
Ebook CISSP Domain 01 Security and Risk Management
Unauthorized disclosure,
access, and use Disruption
Information
Security
Destruction Modification
Deletion
Introduction to Information Security
• Cybersecurity is a component of
information security.
Terrifying Cybercrime Statistics
Risk based
This approach relies on identifying
the unique risk a particular
organization faces and designing
and implementing security
controls to address that risk
Understand, Adhere to, and Promote Professional Ethics
(ISC)2 Code of Professional Ethics
• The safety and welfare of society and the common good, duty to
our principles, and to each other, requires that we adhere, and be
Code of Ethics
seen to adhere, to the highest ethical standards of behavior.
Preamble
• Therefore, strict adherence to this Code is a condition of
certification.
Integrity
Availability
Confidentiality
The principle of confidentiality asserts that information and functions can be accessed only by
authorized parties.
Threats to Confidentiality:
• Hackers
• Masqueraders Integrity
The principle of integrity asserts that information and functions can be added, altered, or removed
only by authorized people and means.
Threats to Integrity:
• Hackers
• Masqueraders Integrity
• Unauthorized user activity
• Unprotected files downloaded
Availability
Availability
• Unprotected networks
• Unauthorized programs Confidentiality
The principle of availability asserts that systems, functions, and data must be available on-demand
according to the agreed-upon parameters based on levels of service.
Threats to Availability:
• Denial of service
• Distributed denial of service attacks Integrity
Information security
investments are
appropriately directed
Introduction to GRC
Ultimate responsibility of GRC program is to
protect their assets and operations, including
their IT infrastructure and information.
Governance, Risk Management, and Compliance (GRC)
Governance
Information security can be aligned with organizational goals, mission, and objectives in two ways.
Kevin has understood the importance of the mission, goals, and objectives of
his organization and the importance of aligning its security to these.
He read the following statement on the company website.
“Nutri Worldwide Inc. will pursue and foster opportunities for growth and
enrichment for its employees and stakeholders with the customer being the
focal point.”
Kevin has understood the importance of the mission, goals, and objectives of
his organization and the importance of aligning its security to these.
He read the following statement on the company website.
“Nutri Worldwide Inc. will pursue and foster opportunities for growth and
enrichment for its employees and stakeholders with the customer being the
focal point.”
• Example:
o COBIT (Control Objectives for Information and
Related Technologies)
o ISO 17799/27001
Control Objectives for Information and Related Technologies (COBIT)
• Compliance
Due Care
It’s a legal term. It pertains to the legal duty of the organization. Lack of due care is
considered negligence.
Service Requirements
SLAs may be defined for:
Service Delivery
Client Provider
Managing Third-Party Governance
• On-site assessment
• Document exchange and review
Secure • Policy and process review
Outsourcing
Offshoring: Privacy Requirements and Compliance
Cybercrime: Definition
• Intellectual property laws are designed to protect both the tangible and intangible items
and properties.
• The main goal is to protect properties from those who want to copy or use it without due
compensation to the inventor or creator.
IP Law Categories
Patent Trademark
• A patent grants the owner a legally • Trademark laws protect the goodwill a
enforceable right to exclude others from merchant or vendor invests in the
practicing the invention. products.
• A patent is applicable for 20 years. • A trademark grants exclusive rights to the
• A patent protects new, useful, and owner of the trademark.
nonobvious inventions. • A trademark consists of any word, name,
• After the expiry of a patent, the invention symbol, color, sound, product shape,
is open to the public domain. device, or a combination of these.
o The invention should be new and an • One trademark must not be similar to
original idea another trademark.
o The invention must be useful • The trademark should not be descriptive
o The invention must not be obvious of the goods or service that you will offer.
Types of Intellectual Property (IP) Law
Copyright
Copyright Trade Secret
Trade Secret
• A copyright covers the expression of ideas • Trade secret law protects certain types of
• It usually protects artistic properties, such information or resources from
as writing, recordings, databases, and unauthorized use or disclosure.
computer programs. • A trade secret is something that is
• The duration of protection is longer. proprietary to a company and important for
its survival and profitability.
• Works of one or more authors are protected
until 70 years after the death of the last • Examples include the formula used for a
surviving author. soft drink such as Coke or Pepsi, a new form
of mathematics, the source code of a
• Anonymous works are provided protection program, or a method of making the perfect
for 95 years from the first publishing date or jellybean.
120 years from the date of creation,
whichever is shorter. • You can protect a trade secret by having
your own control structures depending on
the type of trade secret and by making your
employees sign an NDA.
Digital Millennium Copyright Act (DMCA)
• Software licenses are a contract between the provider of a software and the consumer.
• The four categories of software licensing are:
o Contractual license agreement: It is a written contract between the software vendor
and the customer.
o Shrink-wrap license: A shrink-wrap license is an end-user agreement (EULA) that is
enclosed with a software in a plastic-wrapped packaging. Once the end-user opens
Licenses the packaging, the EULA is in effect.
o Clickwrap license: This type of agreement is often used in connection with software
licenses. Most clickwrap agreements require the end-user to manifest his or her
assent by clicking an OK or agree button on a dialog box or a pop-up window.
o Cloud services license agreement: It is similar to a clickwrap agreement and is
mainly concentrated on the services provided by cloud vendors.
Business Scenario
Kevin Butler was studying about intellectual property laws as a part of his
preparation for the CISSP exam. While studying the topic, he remembered a
recent case in which his organization had successfully won a lawsuit against a
competitor organization.
The case in question was regarding the use of Nutri Worldwide Inc.’s
product name for a similar product by the competitor organization.
The court gave its verdict in favor of Nutri Worldwide Inc., and the opposite
party had to pay a heavy fine.
Kevin Butler was studying about intellectual property laws as a part of his
preparation for the CISSP exam. While studying the topic, he remembered a
recent case in which his organization had successfully won a lawsuit against a
competitor organization.
The case in question was regarding the use of Nutri Worldwide Inc.’s
product name for a similar product by the competitor organization.
The court gave its verdict in favor of Nutri Worldwide Inc., and the opposite
party had to pay a heavy fine.
Following are the basic concepts of import or export controls and transborder data flow:
• They ensure that software complies • It involves transfer of data from one
with the local laws. country to another.
Companies must also allow users to export their data and delete it.
Under the existing right to be forgotten provisions, people who don’t want
certain data about them online can request companies to remove it.
GDPR: Roles and Responsibilities
The EU General Data Protection Regulation (EU GDPR) outlines six data protection principles that
organizations need to follow for collecting, processing, and storing individuals’ personal data.
6. Integrity and
4. Accuracy 5. Storage limitations
confidentiality
The data controller is responsible for complying with the principles and must be able
to demonstrate the organization’s compliance practices.
Data Protection Principles
Lawfulness, fairness,
Purpose limitation Data minimization
and transparency
Personal data shall be processed Personal data shall be collected for Personal data shall be adequate,
lawfully, fairly, and in a specified, explicit, and legitimate relevant, and limited to what is
transparent manner in relation to purposes and not further processed necessary in relation to the
the data subject. in a manner that is incompatible purposes for which they are
with those purposes. processed.
Data Protection Principles
Integrity and
Accuracy Storage limitations
confidentiality
Personal data shall be accurate Personal data shall be kept in a Personal data shall be processed
and, where necessary, kept up to form which permits identification of in a manner that ensures
date; every reasonable step must data subjects for no longer than is appropriate security of the
be taken to ensure that personal necessary for the purposes for personal data, including
data that are inaccurate, having which the personal data are protection against unauthorized
regard to the purposes for which processed. or unlawful processing and
they are processed, are erased or against accidental loss,
rectified without delay. destruction or damage, using
appropriate technical or
organizational measures.
Business Scenario
“An investigation is a fact-finding process of logically, methodically, and lawfully gathering and
documenting information for the specific purpose of objectively developing a reasonable conclusion
based on the facts learned through the process.”
Civil investigation
deals with offense Punishment usually
committed against involves recovering
individuals or money to compensate
companies that result the victim for
in damages or loss. damages.
Investigation Types: Administrative Investigation
Kevin Butler was studying the major legal systems, which are followed throughout
the world. He then thought of going through the archives of legal cases involving
Nutri Worldwide Inc.
He came across a recent case where Nutri Worldwide Inc. lost a legal battle
against one of its partner organizations. The dispute was regarding breach of
some clause of the partner agreement. The partner filed a lawsuit against
Nutri Worldwide Inc. for violation of its rights and claimed a compensation of
$2 million.
Question: Under which type of law had the partner filed the lawsuit?
Business Scenario
Kevin Butler was studying the major legal systems, which are followed throughout
the world. He then thought of going through the archives of legal cases involving
Nutri Worldwide Inc.
He came across a recent case where Nutri Worldwide Inc. lost a legal battle
against one of its partner organizations. The dispute was regarding breach of
some clause of the partner agreement. The partner filed a lawsuit against
Nutri Worldwide Inc. for violation of its rights and claimed a compensation of
$2 million.
Question: Under which type of law had the partner filed the lawsuit?
Answer: The partner had filed the lawsuit under the Civil Law.
Develop, Document, and Implement Security Policy, Standards,
Procedures, and Guidelines
Security Policies
Security policy is a broad statement produced by the senior management that dictates the role of
security within the organization.
Policy documents often come with the endorsement or signature of the executive
powers within an organization.
Policy documents often come with the endorsement or signature of the executive
powers within an organization.
Policy Avoiding errors that can lead to legal challenges and ensuring compliance
enforcement with policy
Policy Chart
A strategic goal can be viewed as the ultimate endpoint, while tactical goals are the steps
necessary to achieve it.
Standards Guidelines
Procedures Baseline
Business operations are interrupted by unexpected events. Companies must develop Business
Continuity and disaster recovery plans to face these issues.
Any incident, act, or occurrence that suspends normal operations can be termed as a disruptive
event or disaster.
• Disruptive events can be intentional or unintentional.
• BCP aims at minimizing the effects of a disruptive event on a company.
Few types of
disruptive
events are: Human
Natural
Environmental
Basic Concepts: Business Continuity Planning
The goal of a BCP is to ensure business continuity before, during, and after a disaster strikes.
Importance of Business Continuity Planning
The high-level phases as per NIST 800-34 for achieving comprehensive BCP or DRP are:
According to NIST 800-34, project initiation and scoping is the first step to achieve a
comprehensive BCP or DRP.
According to NIST 800-34, business impact analysis is the second phase to achieve a
comprehensive BCP or DRP.
Identify the
Select individuals to Calculate risk for
resources on which
interview for data each business
the critical business
gathering function
functions depend
For each major business unit within the organization, the following steps will be performed:
The alternate terms for MTD include Maximum Allowable Downtime (MAD), Maximum Acceptable
Outage (MAO), and Maximum Tolerable Outage (MTO).
• Level of data, work loss, or system inaccessibility resulting from a disruptive event
• Usually expressed in units of time
• The predicted elapsed time between inherent failures of a system during operation
• Calculated as the arithmetic mean time between failures of a system
The various stages of failure and recovery are shown in the figure.
Normal Normal
Operations Disruptive Recovery Time Frame Operations
Event
MTD
1 2 3 4
BCP or DRP Phase 3: Identify Preventive Controls
According to NIST 800-34, Identify Preventive Controls is the third phase to achieve a comprehensive
BCP or DRP. Preventive controls avert the potential impact of disruptive events.
The types of preventive controls include:
Procedural controls Hiring and termination policies and clean desk policy
Separation of duties
Job rotation
Mandatory vacations
Split knowledge
Dual control
Importance of Managing Personnel Security
The people inside the organization need access to data and resources to complete their assigned
work and, therefore, have the potential to abuse these access privileges. It is important to:
Controls for vendors, contractors, and consultants mostly act as preventive controls.
Any organization collecting any personal information from their customers, clients,
or end users, are legally required to publish a privacy policy on their site.
The exact content of a privacy policy will depend on the nature of the business,
location of the business, location of the users, and the applicable laws.
Countermeasure or Safeguard: 7
Countermeasure or safeguard is put into
place to mitigate the potential risk.
Information Risk Management
Information Risk Management is the process of identifying and assessing risk, reducing it to an
acceptable level, and implementing the right mechanisms to maintain it at that level.
Recognition
Threat of the Annualized
Impact Uncertainty Cost
Risk
Management
Life Cycle
IT Risk IT Risk Identification
Assessment
Business Scenario
While studying the Information Risk Management process, Kevin made notes
on the security definitions based on examples from his day-to-day work:
While studying the Information Risk Management process, Kevin made notes
on the security definitions based on examples from his day-to-day work:
Risk analysis is the analysis of the probability and consequences of each known risk.
To identify organizational
assets and their value
An organization needs to form a risk analysis team to analyze risks effectively. These are the stakeholders
in a risk analysis team:
Information Risk
Security Manager
Officer
Executive System or
Sponsor Network
Risk Analysis Administrator
Team
System System
Technical Business
Owner Owner
Risk Analysis Team
Countermeasure
Asset and information value
selection and
assignment
implementation
Information and Asset Valuation
There are two major types of approaches to risk analysis and their features are as follows:
Step 6: Perform
Step 2: Calculate
cost or benefit
exposure factor
analysis of
countermeasure
Steps in
Quantitative
Risk Analysis
Step 4: Assess
annualized rate of
occurrence
Quantitative Risk Analysis: Problem
Qualitative analysis techniques include judgment, best practices, intuition, and experience. Examples of
qualitative techniques to gather data are:
The following table deals with some of the threats, the level of threat, and countermeasures:
Threat
Threat Impact Countermeasure
Probability
• The type of approach to risk analysis will be decided based on the risk analysis team,
management, risk analysis tools, and culture of the company.
• The chart below sorts different attributes into qualitative and quantitative risk analysis.
Problem:
• ALE of the threat of a fire bringing down a web server prior to implementing the suggested
safeguard = $10,000
• ALE after implementing the safeguard= $2,000
• Annual cost of maintenance and operation of the safeguard = $500
Solution:
• Value of the safeguard to the company = $10,000 -$2,000 -$500
= $7,500
Countermeasure Selection: Other Factors
Total Cost of
TCO is the total cost of a mitigating safeguard
Ownership (TCO)
Return on
Investment (ROI) ROI is the amount of money saved by implementing a safeguard
3
Take measures
Handling Risk
Here is a flowchart that explains the steps in the risk mitigation process:
No
Physical control
Compensating control
Controls Based on Implementation
Deterrent Intends
• Usesto discourage
risk a potential
calculations attacker
that attempt to predict the level of
Corrective
Corrective Fixes components or systems after an incident has occurred
Recovery
Recovery Intends to bring the environment back to regular operations
• Uses risk calculations that attempt to predict the level of
Compensating
Compensating
Uses risk
•Provides an calculations that attempt
alternative measure to predict the level of
of control
Security Control Assessment (SCA)
SCA results • An indication of the quality of the risk management processes employed
provide: Security
within Control Assessment (SCA)
the organization
• Information about the strengths and weaknesses of information systems
that are supporting organizational missions and business functions
Assurance for Security Control Effectiveness
To ensure security control effectiveness, one should compile evidence that the controls are:
Implemented correctly
Operating as intended
KRIs and KPIs can be used to measure, monitor, and report risk. The two are
explained below in detail.
Defined
Initial Managed
Continuous Risk
Focus Risk Management is Basic Risk Management
Standardized Risk Quantitative Risk
Management Process
informal and Adhoc Management Process Management Process
Medium Quality/
Result Lowest Quality / Highest
Low Quality/ High Risk Medium Risk High Quality / Low Risk Highest Quality / Lowest Risk
Risk
Risk Frameworks
ENISA Risk
NIST Risk Management Management/
ISO 31000
Framework Risk Assessment
(RM/RA) Framework
Understand and Apply Threat Modeling Concepts and Methodologies
Threat Modeling
Threat Modeling
• Also known as the defensive approach • Also known as the adversarial approach
• Takes place during early stages of • Takes place after a product has been
systems development created and deployed
• Based on predicting threats and • This is the core concept behind ethical
design-specific countermeasures hacking, PT, source code review, and fuzz
during the coding and crafting process testing
Threat Modeling Steps
• Focused on assets
Identifying threats • Focused on attackers
• Focused on software
Categorization of
threats • STRIDE model
• Trust boundaries
• Data flow path
Performing reduction
analysis • Input points
• Privilege operation
• Security stance and approach
Spoofing An attack with the goal of gaining access to a target system through the
use of a falsified identity
Authenticate
Login Request User()
Web Login
Users Servlet Process
Authenticate
User Result
Data
Step 4: Performing Reduction Analysis
• Rates the threats in order to prioritize and address the most significant threats first
• Risk posed by a particular threat is equal to the probability of the threat occurring
against the potential damage
Risk = Probability * Potential Damage
• Low-level threats can be ignored depending upon the effort and cost required to
address these
Step 5: Prioritization and Response
Damage
How severe is the damage likely to be if the threat is realized?
potential
Affected users How many users are likely to be affected by the attack?
Risk rating
Use a regular expression to validate the username and use a stored procedure
Countermeasures
that uses parameters to access the database
Threat Template
Risk rating
Attacker appends SQL commands to user name, which is used to form SQL
Attack techniques
query
Use a regular expression to validate the user name, and use a stored
Countermeasures
procedure that uses parameters to access the database
Threat Modeling Outcomes
Countermeasures
Relevant threats
Apply Supply Chain Risk Management (SCRM) Concepts
Supply-Chain Risk Management
Supply chain is the network of all the individuals, organizations, resources, activities, and technology
involved in the creation and sale of a product, from the delivery of source materials from the supplier
to the manufacturer through to its eventual delivery to the end user.
Supply-chain risk management (SCRM) is a process to help identify, monitor, detect, and mitigate
threats to supply chain continuity and profitability.
A supply chain compromise is an occurrence within the supply chain whereby an adversary
jeopardizes the confidentiality, integrity, or availability of a system or the information the system
processes, stores, or transmits.
It can occur anywhere within the system development life cycle of the product or service.
Risks Associated with Hardware, Software, and Services
Here are a few risks associated with hardware, software, and services:
• A third party is a company that is not under direct business control of the organization
that engages it. A third-party relationship is any business arrangement between a
company and another entity, by contract or otherwise.
Financial Viability
Third party products, services, or Third party does not possess the necessary licenses
systems are not consistent with your to operate. It lacks the expertise to enable the
policies and procedures, applicable company to remain compliant with domestic and
laws, regulations, and ethical standards. international laws and regulations.
Third-Party Risk Management
The diagram given below will help us to understand the third-party risk management.
Planning
Due
Termination
Diligence
Ongoing Contract
Monitoring Negotiation
The plan should oversee the full lifecycle of a third-party relationship including:
• Company's strategy for why it is using the third party and the inherent risks the
relationship presents
• Proper due diligence in selecting the third party
• Written contracts that outline the rights and responsibilities of all parties
• Ongoing monitoring of the third party’s activities and performance
• Contingency plans for terminating the relationship in an effective manner
• Clear roles and responsibilities for overseeing and managing the relationship and
risk management process
• Documentation and reporting that facilitate oversight, accountability, monitoring,
and risk management
• Independent reviews that allow organization's management to determine that
processes align with its strategy and effectively manage risks
Third-Party Risk Management Lifecycle
Contract Ongoing
Planning Due Diligence Termination
Negotiation Monitoring
Develop a plan to manage the relationship. This is often the first step in the third-party risk
management process.
Contract Ongoing
Planning Due Diligence Termination
Negotiation Monitoring
Conduct a review of a potential third party before signing a contract to ensure that the organization
selects an appropriate third party and understands and controls the risks posed by the relationship,
consistent with the organization’s risk appetite. On-site visits may be useful to fully understand the
third party’s operations and capability to serve.
Contract Ongoing
Planning Due Diligence Termination
Negotiation Monitoring
Develop a written contract that clearly defines expectations and responsibilities of the third party to
ensure the contract’s enforceability, limit the organization’s liability, and mitigate disputes about
performance.
Contract Ongoing
Planning Due Diligence Termination
Negotiation Monitoring
After entering into a contract with a third party, organization management should dedicate sufficient
staff with the necessary expertise, authority, and accountability to oversee and monitor the third
party’s activities and performance.
Contract Ongoing
Planning Due Diligence Termination
Negotiation Monitoring
A contingency plan need to be developed to ensure that the organization can transition the activities to
another third party. Termination can happen for bringing the activities in-house, or discontinuing the
activities when a contract expires, when the terms of the contract have been satisfied, in response to
contract default, or changes to the organization’s or third party’s business strategy.
• Third-party security requirements standard document sets out the minimum information
security requirements expected of third parties.
• Product or service specifications must include the requirements for security controls.
• Contracts with the third-party must address the identified security requirements.
• If the security functionality in a proposed product does not satisfy specific security
requirements, then the risk introduced must be evaluated and additional controls must be
reconsidered prior to purchasing the product.
• When additional functionality is supplied and causes a security risk, it must be disabled or
the proposed control structure must be reviewed to determine if advantage can be taken of
the available enhanced functionality.
Service-Level Requirements
• Verizon’s partner Nice Systems logged customer files that contained sensitive
and personal information (including customer names, corresponding cell
phone numbers, and specific account PINs) on an Amazon S3 bucket.
• For reasons unknown, that bucket was left unsecured, thus exposing more
than 14 million Verizon customer records to anyone who discovered the
bucket.
Question: Among Verizon, NICE Systems, and Amazon, who is accountable for the data loss?
Real World Scenario
• Verizon’s partner Nice Systems logged customer files that contained sensitive
and personal information (including customer names, corresponding cell
phone numbers, and specific account PINs) on an Amazon S3 bucket.
• For reasons unknown, that bucket was left unsecured, thus exposing more
than 14 million Verizon customer records to anyone who discovered the
bucket.
Question: Among Verizon, NICE Systems, and Amazon, who is accountable for the data loss?
Answer: Verizon. They should have ensured visibility into how partners and other stakeholders keep
their data secure.
Establish and Maintain a Security Awareness, Education, and Training Program
Importance of Security Awareness Training
Security awareness
training is important to:
The table given below describes the three parts of security awareness training.
Basis of
Awareness Training Education
Distinction
To integrate security skills
To produce required and relevant and competencies into a
Objective To focus on security
security skills and competencies common body of
knowledge
The following table represents the steps to develop and implement a good security
awareness training program.
Basis of
Education Training Awareness
Difference
Attribute Why How What
Level Insight Knowledge Information
Objective Understanding Skills Exposure
Teaching Theoretical instructions Practical instructions Media
• Discussion • Lecture
• Videos
• Seminar • Case study
Method • Newsletter
• Background reading • Workshop
• Posters
• Research • Hands-on practice
• True or false
Problem solving
Test measure Essay (interpret learning) • Multiple choice (identify
(apply learning)
learning)
Impact
Long term Intermediate Short term
timeframe
Methods and Techniques to Present Awareness and Training
Organizations should identify and train a security champion within a team who
then becomes an enabler and promoter of security best practices.
The security champion should be the single point of contact within a department
and should act as a liaison between the security team and the employees.
Security leaders can use gamification to enhance cyber security training for
their employees.
Employees can use a simulated environment to test and improve their readiness
for cyber incidents.
Business Scenario
Reaction
To what degree participants react favorably to the training
Results
Program Effectiveness Evaluation
Reaction
• To what degree participants apply what they learned during training
when they are back on the job
Learning
• Sample questions:
o Have the trainees put any of their learnings to use?
Behavior o Are trainees able to teach their new knowledge, skills, or attitudes to
other people?
o Are trainees aware that they've changed their behavior?
Results
Program Effectiveness Evaluation
Reaction • To what degree targeted outcomes occur as a result of the training event
and subsequent reinforcement