2022 FRSecure CISSP Mentor Program - 2022 - Class Eight - Updated 5-12-2022
2022 FRSecure CISSP Mentor Program - 2022 - Class Eight - Updated 5-12-2022
INTRODUCTION
2022
Class #8 – Domain 5
Ron Woerner
Cyber-AAA Founder & CEO & vCISO
Bellevue University CyberSecurity Studies Professor
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 1
CISSP® MENTOR PROGRAM – SESSION EIGHT
WELCOME BACK!
• How ya doing?
• By now, you should have made (at least) your first pass
through chapters 1-4.
• If you have questions about any of the content so far,
check out the Slack study group or reach out!
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 1
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 2
#MissionBeforeMoney
WHOAMI
Ron Woerner, CISSP, CISM
• Chief Security Officer, Cyber-AAA
• Cybersecurity Professor, Bellevue University
https://linktr.ee/cyberron
Hackers Wanted
https://www.linkedin.com/in/ronwoerner/ TEDx Omaha
@ronw123
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 3
CISSP® MENTOR PROGRAM – SESSION FOUR
GETTING GOING…
Managing Risk!
Studythrough
We’re Tips: Chapters 1, 2, 3, and part way into Chapter
4!
• Study in small amounts frequently (20-30 min)
•• Check-in.
Flash card and practice test apps help
•• How many
Take naps have read
after Chapter
heavy 1, 2(aka
topics & 3?Security Models)
•• Questions?
Write things down, say them out loud
• Use the Slack Channels
• Exercise or get fresh air in between study sessions
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 4
#MissionBeforeMoney
INTRODUCTION
Before we get too deep into this. Start with a “dad joke”
What do you call someone with no body and no nose?
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 5
#MissionBeforeMoney
INTRODUCTION
Before we get too deep into this. It’s been too long since we did a “dad
joke” Is that possible?
Nobody knows.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 5
#MissionBeforeMoney
WHAT IS A CISSP?
The Certified Information Systems Security Professional (or “CISSP”)
Get your Ultimate Guide to the CISSP @
https://www.isc2.org/Certifications/Ultimate-Guides/CISSP?
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 7
#MissionBeforeMoney
Quick Review
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 8
#MissionBeforeMoney
Monday Review
(In 1 slide)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 9
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 10
#MissionBeforeMoney
QUIZ…
Will the real test be this easy too?!
1. What is the most secure type of firewall?
A.Packet Filter
B.Stateful Firewall
C.Circuit-level Proxy Firewall
D.Application-layer Proxy Firewall
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 7
#MissionBeforeMoney
QUIZ…
Will the real test be this easy too?!
1. What is the most secure type of firewall?
A.Packet Filter
B.Stateful Firewall
C.Circuit-level Proxy Firewall
D.Application-layer Proxy Firewall
Why?
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 8
#MissionBeforeMoney
QUIZ…
Will the real test be this easy too?!
2. What WAN Protocol has no error recovery, relying on
higher-level protocols to provide reliability?
A. ATM
B. Frame Relay
C. SMDS
D. X.25
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 9
#MissionBeforeMoney
QUIZ…
Will the real test be this easy too?!
2. What WAN Protocol has no error recovery, relying on
higher-level protocols to provide reliability?
A. ATM
B. Frame Relay
C. SMDS
D. X.25
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 10
#MissionBeforeMoney
QUIZ…
Will the real test be this easy too?!
3. Which endpoint security technique is the most likely to
prevent a previously unknown attack from being
successful?
A. Signature-based antivirus
B. Host Intrusion Detection Systems (HIDS)
C. Application Whitelisting
D. Perimeter firewall
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 13
#MissionBeforeMoney
QUIZ…
Will the real test be this easy too?!
3. Which endpoint security technique is the most likely to
prevent a previously unknown attack from being
successful?
A. Signature-based antivirus
B. Host Intrusion Detection Systems (HIDS)
C. Application Whitelisting
D. Perimeter firewall
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 14
#MissionBeforeMoney
QUIZ…
Will the real test be this easy too?!
4. Restricting Bluetooth device discovery relies on the
secrecy of what?
A. MAC Address
B. Symmetric key
C. Private Key
D. Public Key
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 17
#MissionBeforeMoney
QUIZ…
Will the real test be this easy too?!
4. Restricting Bluetooth device discovery relies on the
secrecy of what?
A. MAC Address
B. Symmetric key
C. Private Key
D. Public Key
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 18
#MissionBeforeMoney
New Topic!
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 19
CISSP® MENTOR PROGRAM – SESSION EIGHT
New Topic!
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 20
CISSP® MENTOR PROGRAM – SESSION EIGHT
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 21
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 21
#MissionBeforeMoney
DOMAIN 5: IAM
pp. 377 – 418 (or 514-581 pdf)
Topics:
• CONTROL PHYSICAL AND LOGICAL ACCESS TO ASSETS
• MANAGE IDENTIFICATION AND AUTHENTICATION OF
PEOPLE, DEVICES, AND SERVICES
• FEDERATED IDENTITY WITH A THIRD-PARTY SERVICE
• IMPLEMENT AND MANAGE AUTHORIZATION
MECHANISMS
• MANAGE THE IDENTITY AND ACCESS PROVISIONING
LIFECYCLE
• IMPLEMENT AUTHENTICATION SYSTEMS
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 23
#MissionBeforeMoney
DOMAIN 5: IAM
CONTROL PHYSICAL AND LOGICAL ACCESS TO ASSETS
Definitions
• Objects are assets that require access control.
• Files, datasets, resources, networks
• Facilities, paper
• Subjects are an active entity, generally in the form of a
person, process, or device, that causes information to
flow among objects or changes the system state. (NIST)
• Human or non-human
• Access is anything a subject is permitted to do with or to
an object.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 24
#MissionBeforeMoney
DOMAIN 5: IAM
CONTROL PHYSICAL AND LOGICAL ACCESS TO ASSETS
Authenticity Confidentiality
Non-
Integrity
repudiation
Availability
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 25
#MissionBeforeMoney
DOMAIN 5: IAM
CONTROL PHYSICAL AND LOGICAL ACCESS TO ASSETS
Definitions
• Centralized IAM uses a dedicated access control
function or system, to manage all access control.
• Easier management
• Single point of failure
• Decentralized IAM assigns access control decisions
to system or information owners. (Greater freedom)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 26
#MissionBeforeMoney
DOMAIN 5: IAM
CONTROL PHYSICAL AND LOGICAL ACCESS TO ASSETS
Data / Information
Application Identifying the needs for
information access control is
System a fundamental requirement
for the security practitioner.
Device
Network
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
DOMAIN 5: IAM
CONTROL PHYSICAL AND LOGICAL ACCESS TO ASSETS
Access Control Layers
Data / Information
Application
System
Device
Network
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 28
#MissionBeforeMoney
DOMAIN 5: IAM
CONTROL PHYSICAL AND LOGICAL ACCESS TO ASSETS
Devices
• Anything with an IP Address
• Devices can be both objects and subjects in an
access control model
• Endpoint detection and response(EDR)
• Mobile device management (MDM)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 29
#MissionBeforeMoney
DOMAIN 5: IAM
CONTROL PHYSICAL AND LOGICAL ACCESS TO ASSETS
Device Security
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 30
#MissionBeforeMoney
DOMAIN 5: IAM
CONTROL PHYSICAL AND LOGICAL ACCESS TO ASSETS
Device Security
• Device Protection - enforces security policies on
each device, including password complexity,
software updates, and restricting apps
• Device Restrictions - identifies hardware that is not
supported or systems that have been jailbroken
• Remote lock or wipe - allows the organization to
prevent unauthorized users from gaining access
• Containerization - BYOD
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 31
#MissionBeforeMoney
DOMAIN 5: IAM
CONTROL PHYSICAL AND LOGICAL ACCESS TO ASSETS
Data / Information
Application
System Physical Security
Device
Network
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 32
#MissionBeforeMoney
DOMAIN 5: IAM
CONTROL PHYSICAL AND LOGICAL ACCESS TO ASSETS
Physical Access Control Systems (PACS)
• Traditional Physical Security – 3 G’s – Guards, Guns & Gates
• Access Controls – Badges, Keys, Visitor management
See Chapter 7
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 33
#MissionBeforeMoney
DOMAIN 5: IAM
CONTROL PHYSICAL AND LOGICAL ACCESS TO ASSETS
Physical Access Control Systems (PACS)
• User Identification –
• ID, Badge, Sticker
• RFID, QR code, Barcode
• Device identification – Non-human assets
See Chapter 7
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 34
#MissionBeforeMoney
DOMAIN 5: IAM
CONTROL PHYSICAL AND LOGICAL ACCESS TO ASSETS
Physical Access Control
• Fences & gates
Delay, Deter, Deny
• Secured doors
• Locks & keys
See Chapter 7
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 35
#MissionBeforeMoney
DOMAIN 5: IAM
CONTROL PHYSICAL AND LOGICAL ACCESS TO ASSETS
Physical Access Control
• Guards
• Turnstile / Mantrap
• Intrusion Detection Sensors
Detect
• CCTV Surveillance
See Chapter 7
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 36
#MissionBeforeMoney
DOMAIN 5: IAM
CONTROL PHYSICAL AND LOGICAL ACCESS TO ASSETS
DOMAIN 2 5: IAM
CONTROL PHYSICAL AND LOGICAL ACCESS TO ASSETS
DOMAIN 5: IAM
CONTROL PHYSICAL AND LOGICAL ACCESS TO ASSETS
Access Control Layers
Data / Information
Application
System
Device
Network
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 39
#MissionBeforeMoney
DOMAIN 5: IAM
CONTROL PHYSICAL AND LOGICAL ACCESS TO ASSETS
Application Access (objects)
• Access to applications
Role-based access control (RBAC) More on this later
• Access to data in applications
• Data flows between applications Data Maps
• BYOD & MDM – isolating / containerizing apps
• Access within applications
• Multiple levels – General vs admin
• Granularity – Controlling access based on level
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 40
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 41
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 42
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 43
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 44
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
WARNING!
CISSP® MENTOR PROGRAM – SESSION EIGHT
Jumping
DOMAIN 5: IDENTITY AND ACCESS MANAGEMENT
ahead in the
Credential Management System (CMS) book
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 25
#MissionBeforeMoney
Something you Something you Something you are: Where you are:
know: have: ▪ Fingerprints ▪ Geolocation
▪ Password ▪ Smartcard ▪ Face
▪ Passphrase ▪ Token ▪ Eyes
▪ PIN ▪ Device ▪ Biometrics
▪ Application
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 25
#MissionBeforeMoney
Long is Strong
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
Long is Strong
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
https://docs.microsoft.com/en-us/windows-server/security/kerberos/passwords-technical-overview
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
Password Managers
• A software application that can manage authentication
material like passwords, passphrases, and answers to secret
questions
• Support across desktop and mobile operating systems
• Can serve to offload the work of creating, remembering, and
filling in passwords.
What password
manager do you use?
Investopedia – Best Password Managers –
https://www.investopedia.com/best-password-managers-5080381
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
How long is a
standard “good”
password?
https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-63b.pdf
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 31
#MissionBeforeMoney
How long is a
standard “good”
password?
https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-63b.pdf
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 31
#MissionBeforeMoney
https://www.microsoft.com/en-us/research/wp-
content/uploads/2016/06/Microsoft_Password_
Guidance-1.pdf
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 31
#MissionBeforeMoney
https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-63b.pdf
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
https://nvlpubs.nist.gov/nistpubs/
specialpublications/nist.sp.800-63b.pdf
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 65
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
https://venturebeat.com/2022/05/05
/passwordless-authentication/
Homework
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
Conditional MFA
• Dynamic trusted device authentication can also be used to both increase
security and provide greater usability
• A key element of attribute-based access control (ABAC)
• Time or location based
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
Homework
https://www.knowbe4.com/hubfs/KB4-11WaystoDefeat2FA-RogerGrimes.pdf & https://blog.knowbe4.com/author/roger-grimes
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
Biometric Controls
• Fingerprints
• Hand Geometry Not really covered
• Retina Scan in the book.
• Iris Scan Still know…
• Keyboard Dynamics
See last years slides
• Dynamic Signature
• Voice
• Facial Scan
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
Biometric Accuracy
• Should be considered before implementing a biometric control program
• Three metrics are used to judge biometric accuracy:
• False Reject Rate (FRR),
• False Accept Rate (FAR),
• Crossover Error Rate (CER).
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
Biometric Accuracy
Crossover Error Rate (CER)
• Describes the point where the False Reject Rate (FRR) and
False Accept Rate (FAR) are equal
• Also known as the Equal Error Rate (EER)
• The overall accuracy of a biometric system
• As the accuracy of a biometric system increases, FARs will
rise and FRRs will drop
• As the accuracy is lowered, FARs will drop and FRRs will rise
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 93
#MissionBeforeMoney
Exam Warning - Do not get confused on the CISSP exam if asked about DAC
compared to decentralized access control. DAC stands for discretionary access
control. Decentralized access control will always be spelled out on the exam.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 93
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 95
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 95
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 95
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 91
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
Practice Question
Which of the following statements about single sign -on
(SSO) is not true?
A. A user can sign on a system once and access other systems
without re-authentication
B. An SSO user account causes more serious impact then non -SSO
if breached
C. Systems require federation protocols to support SSO
D. A user can create multiple user accounts across systems that
support SSO
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 95
#MissionBeforeMoney
Practice Question
Which of the following statements about single sign -on
(SSO) is not true?
A. A user can sign on a system once and access other systems
without re-authentication
B. An SSO user account causes more serious impact then non -SSO
if breached
C. Systems require federation protocols to support SSO
D. A user can create multiple user accounts across systems that
support SSO
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 95
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
Image Source:
https://www.pingidentity.com/en/reso
urces/blog/posts/2021/sso-vs-
federated-identity-management.html
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
Continued from
earlier
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 107
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
GO RIGHT NOW!
Key steps of OIDC authentication
(developer.okta.com/blog/2019/10/21/illustrated-guide-to-oauthand-oidc)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
https://docs.microsoft.com/en-
us/azure/security/fundamental
s/identity-management-
overview
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 132
#MissionBeforeMoney
SESSION 8 - FIN
We made it!
Next Session (Monday, 16 May 2022) -
Domain 6 (Security Assessment & Testing)
• Design and Validate Assessment, Test, and Audit
Strategies
• Conduct Security Control Testing
• Collect Security Process Data
• Analyze Test Output and Generate Report
• Conduct or Facilitate Security Audits
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 133
#MissionBeforeMoney
SESSION 8 - FIN
Homework:
Review Domains 1-5.
Take practice tests.
Review at least two of the references we provided in this
class (download for later use).
Post at least one question/answer in the Slack Channel.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 134
#MissionBeforeMoney
WHOAMI
Ron Woerner, CISSP, CISM
• Chief Security Officer, Cyber-AAA
• Cybersecurity Professor, Bellevue University
https://linktr.ee/cyberron
Hackers Wanted
https://www.linkedin.com/in/ronwoerner/ TEDx Omaha
@ronw123
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 135
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION ONE
INTRODUCTION
2022
Class #8 – Domain 5
Ron Woerner
Cyber-AAA Founder & CEO & vCISO
Bellevue University CyberSecurity Studies Professor
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 1