CISM Domain4
CISM Domain4
References:
Drew Hamilton Lecture Notes
CISM Review Manual, 15th Edition
CISM All-in-One Exam Guide, 1st Edition
Domain 4:
Information Security Incident Management
References: ISACA CISM Review Manual 15th Ed.
NIST SP 800-61r2 Incident Response
• Preparation
• Identification
• Containment
• Eradication
• Recovery
• Lessons Learned
• Organization’s ISP.
– An organization may need assistance from its ISP in
blocking a major network-based attack or tracing its
origin.
• Owners of Attacking Addresses.
– If attacks are originating from an external organization’s
IP address space, incident handlers may want to talk to
the designated security contacts for the organization to
alert them to the activity or to ask them to collect
evidence.
– It is highly recommended to coordinate such
communications with US-CERT or an ISAC.
Domain 4:
Information Security Incident Management
Category Definition
Category Definition
None No information was exfiltrated, changed, deleted, or
otherwise compromised
Privacy Sensitive personally identifiable information (PII) of
Breach taxpayers, employees, beneficiaries, etc. was accessed or
exfiltrated
Proprietary Unclassified proprietary information, such as protected
Breach critical infrastructure information (PCII), was accessed or
exfiltrated
Integrity Sensitive or proprietary information was changed or
Loss deleted
Category Definition
Domain 4:
Information Security Incident Management
• IT Department
• Internal Audit
• Legal Department
• Physical Security
• Risk Management
• Insurance Department
• PR Department
• Sales and Marketing
• Senior Management
• Compliance Office
• Privacy Officer
Certified Information Security Manager – Domain 4 58
Incident Response Plan (IRP)
Source: https://www.us-cert.gov/bsi/articles/best-practices/incident-
management/defining-computer-security-incident-response-teams
Domain 4:
Information Security Incident Management
1. Detection success
2. Detection to decision
3. Decision speed
4. False positive rates
5. Time to mitigation/containment
Bonus Metric
• Security versus administrative tasks
– Cody Cornell, Swimlane
Domain 4:
Information Security Incident Management
https://www.cmu.edu/iso/governance/procedures/docs/incidentresponseplan.pdf
Certified Information Security Manager – Domain 4 83
CMU Incident Response Plan Intro
• Purpose
• Scope
• Maintenance
• Authority
• Relationship to other Policies
• Relationship to Other Groups at CMU
• Event
• Incident
• Insider Threats
• Law Enforcement
• Officers
• Users
Certified Information Security Manager – Domain 4 86
CMU Incident Response Phases
• Communications Plan
• Privacy
• Left as an exercise
• Document found on
resource page of
course web site
Domain 4:
Information Security Incident Management
Additional References:
Dr. C.W. Perr
ISC2 CISSP CBK
Certified Information Security Manager – Domain 4 103
Business Continuity Planning
• a “disaster” is:
– Trying to make red chili ribs in a crock pot
– He lost a laptop with the only copy of his thesis
– She lost her research and papers in the lab fire
– Payroll system failed the day before payday
– Asbestos released in a dorm renovation
– The death of a student
– The Northeast blackout
– Hurricane Katrina
• Source: ISC2
• Disaster
– is an event, often unexpected, that seriously disrupts
your usual operations or processes and can have long
term impact on your normal way of life or that of your
organization.
• RTO [Recovery Time Objective]
– the point in time when you must have at least the critical
aspects of your business operational again.
• RPO [Recovery Point Objective]
– The last copy of your data that is out of harm’s way –
hopefully it is recently current.
PROBABILITY
LOW HIGH
LOW NORMAL
IGNORE
PROCEDURES
IMPACT
CHANGE
HIGH PLAN
SOMETHING
Power
Hardware
BOMB
MISC
ENVIRON
DATA
SOFTWARE
CIVIL
TELECOMM
FLOOD
HURR
EARTH
TORNADO
LIGHTNING
HARDWARE
POWER
FIRE/EXPL
Lost Data
Restore Communications
(If necessary)
Restore Business Functions Data Synchronization
Data Recovery Objective
© Lucent technologies
Most companies outline the scope of their BCP to encompass only the larger
threats. The smaller threats are then covered by independent departmental
contingency plans.
• Objective-to-task mapping
• Resource-to-task mapping
• Milestones
• Budget estimates
• Success factors
• Deadlines
• Data Backups
• Different types of media stored in different
locations
• Definitions and steps –
– 1) full backup – all data saved
– 2) differential process – saves the modified files since↓,
restore full, then differential
– 3) last full backup – last full backup
– 4) incremental process – back up all the files that have
changed since the last full backup
Source: https://www.isaca.org/Journal/archives/2015/volume-6/
Pages/a-business-integrated-approach-to-incident-response.aspx
Source: https://www.isaca.org/Journal/archives/2015/volume-6/
Certified Information Security Manager – Domain 4 186
Pages/a-business-integrated-approach-to-incident-response.aspx
MIL-STD-882E System Safety