CISSP-Domain 1-Security and Risk Management Ver 1.1 2021 June 2021
CISSP-Domain 1-Security and Risk Management Ver 1.1 2021 June 2021
▪ Common attacks against Integrity: Malicious code & software, system changes, software bugs and data changes and modification
a. Alteration ( Detect modification of information & Corruption )
b. Controls:- Checksum , Hashes , Digital Signature , Dual Control
c. Integrity is dependent on confidentiality. Other concepts, conditions, and aspects of integrity include the following:
1- Accuracy: Being correct and precise
2- Truthfulness: Being a true reflection of reality
3- Authenticity: Being authentic or genuine
4- Validity: Being factually or logically sound
5- Nonrepudiation: Not being able to deny having performed an
6- action or activity or being able to verify the origin of a
7- communication or event
8- Accountability: Being responsible or obligated for actions and results
9- Responsibility: Being in charge or having control over something or someone
10- Completeness: Having all needed and necessary components or parts
11- Comprehensiveness: Being complete in scope; the full inclusion of all needed elements
3. Availability
a. Destruction ( Provide timely and reliable access to resources )
b. Controls :- Backups , RAID Level , Remote Site ,HA , Succession Planning ,Load Balancers.
availability depends on both integrity and confidentiality. Without integrity and confidentiality, availability cannot be maintained. Other concepts,
conditions, and aspects of availability include the following:
□ Usability: The state of being easy to use or learn or being able to be understood and controlled by a subject
□ Accessibility: The assurance that the widest range of subjects can interact with a resource regardless of their capabilities or
□ Limitations Timeliness: Being prompt, on time, within a reasonable time frame, or providing low-latency response
Common attacks against availability: DOS, DDOS, software flaws, physical attacks and natural disaster
Important
❖ Organizational/Corporate Governance
○ Governance
▪ Governance is the process of how an organization is managed
▪ Organization has its own unique governance structure, it will also have security governance specific to its purposes and obje ctives
□ Enterprise Governance
The set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic
direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately and verifying that the organization's
resources are used responsibly.
□ Strategy, Goals, Mission
▪ Vision, Mission, Strategy ( 3-5 years) , Tactical ( 1-3 years) and Operations ( 0-6 months)
▪ Risk Management is part of strategy plan, Risk assessment and analysis is part of Tactical plan ( operational Plan VAPT)
▪ Security governance that does not align properly with organizational goals can lead to implementation of security policies and
decisions that unnecessarily inhibit productivity, impose undue costs ,and hinder strategic intent.
▪ governance is the set of responsibilities and practices exercised by those responsible for an organization
▪ include the policy, roles, and procedures the organization uses to make those decisions
▪ Security governance, is the entirety of the policies, roles, and processes the organization uses to make security decisions.
□ information security investments are appropriately directed, and the executive management has visibility into the program and is asking the
CISSP-Domain 1-Security and Risk Management Ver 1.1 2021 June 2021 Page 1
▪ governance is the set of responsibilities and practices exercised by those responsible for an organization
▪ include the policy, roles, and procedures the organization uses to make those decisions
▪ Security governance, is the entirety of the policies, roles, and processes the organization uses to make security decisions.
□ information security investments are appropriately directed, and the executive management has visibility into the program and is asking the
appropriate questions to deter mine the effectiveness of the program
□ Provides the mechanisms for the board of directors and management to have the proper oversight to manage the risk to the enterprise to
an acceptable level.
□ Ultimate Goal is to Mitigate risk to an ACCEPTABLE LEVEL
□ Security is a continues function
1- Drive Security Governance
a) Budget
2- Roles of the information Security officer in the organization
a) Is Accountable for ensuring the protection of all the business information assets from intentional & Unintentional loss , dis closure ,
alternative , destruction & unavailability.
b) Report as high as possible in the organization.
c) Avoid any conflict of interest.
6- Security Officer Reporting Models
Reporting to the CEO = Best reporting model
Reporting to the Information Technology (IT) Department
Reporting to the Administrative Services Department
Reporting to the Insurance and Risk Management Department
Reporting to the Internal Audit Department
Reporting to the Legal Department
7- Control Frameworks
Consistent
Measurable
Standardized
Comprehensive
Modular
8- Control Frameworks examples
COSO
ISO27000
ITIL
COBIT
9- Due care
The care a “reasonable person” with the same training and experience would exercise under given circumstances. An injured party
cannot prove negligence. what the organization owes its customers
10- Due Diligence
An act of management in furtherance of due care
The actions taken to ensure that policies are being properly applied
Training records are an example of Due Diligence
any activity used to demonstrate or provide due care
Due Diligence – Before you get your license to drive a car, you are required to study to learn the rules of the road. A failure to
practice this due diligence could result in you failing to pass your test. If you do pass, and do not maintain a regular kno wledge of
automotive laws, you may unknowingly break the law and then be found liable regardless of your knowledge of the law.
Due Care – To keep your car running safely, you take it in for maintenance every 5-10 thousand miles. If you do not maintain your
car, and it is found that a part which should have been replaced or maintained during regular maintenance caused an accident, you
will be found liable because you did not practice Due Care.
LIVE EXAMPLE = before enrolling for CISSP Training it was ur due dilligence and once you enrolled make sure you follow my
guideline its your duties. Before making friends doing cyberstalking about person is due dillgence and then you become friend to
carry duties with loaylity :)
CISSP-Domain 1-Security and Risk Management Ver 1.1 2021 June 2021 Page 2
❖ Legal and Regulatory Issues that Pertain to Information Security in a Global Context
1. Intellectual Property :- Protecting product of mind and ideas
□ There is an organization called WIPO ( www.wipo.int ) World Intellectual Property Organization
□ local regulations for every country. for ex: register under the regulation.
4. Computer Crime
▪ Crime using a computer against a computer is called Computer Crime. When assessing the effect of cybercrime evaluate loss of intellectual
property and sensitive data, opportunity costs, damage and brand image/reputation, penalties and compensatory payments, cost of
countermeasures, cost of mitigation strategies, recovery from cyber-attacks.
▪ Data Breach Terminology - A data breach is when data is exfiltrated or extracted or there is a loss of control. A data breach may trigger reporting
and notification requirements. As a hacker, Vector of attacks is breach, confirmed disclosure ( 5000 records) i.e Data Disclo sure there is a
security breach but no data disclosure (Breach) & there is a security breach with confirmed
records disclosure (Data disclosure).
▪ Why Crimes are committed: you need to remember MOM stands for Motivations , Opportunities and Means If DAD do something wrong MOM
will do investigation CIA - DAD - MOM - Remember
5. Privacy
▪ Privacy is the right of an individual to control the use of his personal information.
CISSP-Domain 1-Security and Risk Management Ver 1.1 2021 June 2021 Page 3
❖ Professional Ethics
▪ ISC2 Code of professional ethics, support organizational code of Ethics
▪ Approved by Senior Management ( Influence ,Behaviors ,Except ). First Create Policy = > Standard=>Procedure
▪ Policy Scope
□ Purpose
□ Related document
□ Cancellation
□ Background
□ Scope
□ Policy statement
□ Responsibility
□ Ownership
○ Standard (WHAT)-
▪ Standards serve as specifications for the implementation of policy and dictate mandatory requirements requirement , What is r equired
▪ A standard describes the specific use of technology, often applied to hardware and software.
CISSP-Domain 1-Security and Risk Management Ver 1.1 2021 June 2021 Page 4
▪ A standard describes the specific use of technology, often applied to hardware and software.
“All employees will receive an ACME Nexus-6 laptop with 8 GB of memory, a 3.3 GHZ quad core central processing unit (CPU), and 500-gigabyte
disk” is an example of a hardware standard. “The laptops will run Windows 10 Enterprise, 64-bit version” is an example of a software (operating system)
standard
Standards are mandatory. Not only do they lower the TCO of a safeguard, but they also support disaster recovery.
○ Guidelines
Guidelines are discretionary recommendations. A guideline can be a useful piece of advice, such as “To create a strong passwo rd, take the first
letter of every word in a sentence, and mix in some numbers and symbols. ‘I will pass the CISSP® exam in six months!’ becomes ‘Iwptcei6m!’”
○ Baseline
▪ Baselines are uniform ways of implementing a standard
▪ “Harden the system by applying the Center for Internet Security Linux benchmarks”
It is acceptable to harden the system without following the aforementioned benchmarks, as long as it is at least as secure as a system hardened using the
benchmarks. Formal exceptions to baselines will require senior
management sign-off
CISSP-Domain 1-Security and Risk Management Ver 1.1 2021 June 2021 Page 5
▪ Risk Policy: Contains overall risk management objectives or policies
4 . Risk Management
▪ Mitigating risks to an acceptable level - important function of security governance and management.
□ Risk Identification
Asset Valuation
◊ Critical Component of Risk Identification ( Inventory of Assets )
◊ Identify the value of the assets by contacting business owners/Senior Management. 100% Security is not possible in
all assets.
Threat Analysis
◊ Next step is identify the possible threats , possible consequence to the organization ,determine the probable
frequency of threat events.
Vulnerability Assessment
◊ A vulnerability assessment provides the baseline for determining appropriate and necessary safeguards.
□ Risk Analysis
Risk analysis is all about analyze the result of a risk assessment in order to make the risk management the decision.
Provide outputs from Risk Identification, Threat Analysis and Vulnerability assessment to Risk Analysis phase.
Risk Analysis involves four steps
- Identify the assets to be protected including sensitivity
- Define Specific Threats
- Calculate Annualized Loss Expectancy ( ALE) in case of Quantitative
- Select appropriate safeguards.
Qualitative Risk Analysis - FAST ( High , low , medium)
Qualitative risk analysis is subjective, as it's carried out by individuals participating in a project based on their
personal perceptions of the risk likelihood and consequences. The purpose of such analysis is to increase the
awareness of the most likely and severe risks, identify weak spots of a project, and create risk responses to reduce
the effect that these risks will have on a project.
◊ Produce descriptive versus measurable results
Typically Conducted when
– The Risk assessors have limited expertise in Qualitative Risk Assessment
– Time frame to complete Risk Assessment is short
– The organization doesn’t have significant amount of data readily available
– The available assessors and team are long-term employees and have significant experience with business
and critical systems. - driven by experience & judgement.
Qualitative Risk Assessment Process:
– Approval - > form Risk assessment Team -> analyze data -> calculate risk -> countermeasure
recommendations
Quantitative Risk Analysis - Effective ( Numbers , Dollars )
◊ Quantitative risk analysis is objective and requires a list of prioritized potential project risks, usually created during
the qualitative risk analysis. To save time, quantitative risk analysis is usually carried out only for the highest
probability and impact risks. The main purpose of this analysis is to analytically identify the most effective risk
response strategies that will minimize the risk influence on project objectives.
◊ Quantitative risk assessments assign numeric and monetary values to all elements of the assessment.
◊ The ALE (annualized loss expectancy) formula is used for quantitative risk analysis
◊ Quantitative risk assessment elements include:
Asset Value ( AV ) -$
Exposure Factor (EF) - %
Single loss Expectancy (SLE) - $ (SLE = EF * AV)
Annualized rate of occurrence (ARO) -# (Default Value is 1 is no ARO)
Annualized loss Expectancy (ALE) -$ (ALE=SLE*ARO)
Annual Cost Safeguard (ACS)
= ACS = ALE before safeguards - ALE after safeguard - cost of the safe guard
□ Risk Treatment
Risk Treatment is the process of selecting and implementing of measures to modify risk.
Risk treatment measures can include avoiding, optimizing, transferring or retaining risk.
Once risks have been identified and assessed, all techniques to manage the risk fall into one or more of these four major categories
◊ Risk Avoidance (eliminate, withdraw from or not become involved)
◊ Risk Reduction (optimize – mitigate)
◊ Risk Transfer (transfer – outsource or insure)
◊ Risk Retention (accept and budget)
Risk appetite: The level of risk the organization is willing to accept. Organization decides on the risk appetite.
Risk Avoidance: The practice of coming up with alternatives so that risk in question is not realized, stop the source of the risk. Not doing
something risky.
For example, have you ever heard a friend, or parents of a friend, complain about the costs of insuring an underage driver? How about
the risks that many of these children face as they become mobile? Some of these families will decide that the child in question will not
be allowed to drive the family car, but will rather wait until he or she is of legal age (that is, 18 years of age) before committing to
owning, insuring, and driving a motor vehicle.
Risk Transference: The practice of passing on the risk in question to another entity, still accountable. SLE is best control for risk transfer.
CISSP-Domain 1-Security and Risk Management Ver 1.1 2021 June 2021 Page 6
Risk Transference: The practice of passing on the risk in question to another entity, still accountable. SLE is best control for risk transfer.
Risk Acceptance: The practice of accepting certain risks based on business decision that weighs the cost vs benefit of a risk. Ex: Business
opportunity is higher than risk, risk value is less than risk appetite, Cost of controls is greater than risk.
The decision to accept risk should not be taken lightly, nor without appropriate information to justify the decision. The cost versus
benefit, the organization’s willingness to monitor the risk long term, and the impact
it has on the outside world’s view of the organization must all be taken into
account when deciding to accept risk.
It is important to note that there are organizations who may also track containment of risk. Containment lessens the impact to an
organization if or when an exposure is exploited through distribution of critical asset (that is, people, processes, data, technologies, and
facilities).
▪ Countermeasure Selection
When selecting the countermeasures there are factors must be considered.
◊ Accountability: who is accountable
◊ Auditability:
◊ Whether source is trusted
◊ Cost effectiveness
◊ Security - How secure it is
◊ Protections for CIA of assets
◊ If it creates additional issues during operation. ( Identity RCA, reassess the solution, notify owners, 24-72 Hours until it
creates high risk to the organization )
◊ If it leaves residual data from its function.
CISSP-Domain 1-Security and Risk Management Ver 1.1 2021 June 2021 Page 7
□ Mechanisms implemented in Digital and electronic infrastructure of an organization enforces organization security strategy.
□ Ex: Network access, remote access, system access, application access, malware control and cryptography.
3. Security/Control Assessment
▪ The assessment results provide organizational officials
□ Evidence about effectiveness of the security controls.
□ Indication of quality of risk management processes.
□ Information about strengths/weaknesses of systems which supports org mission and business function in global environment
▪ Security Control Assessment is the principle which ensures that the security policies are enforced in an organization
and are meeting their goals and objectives.
□ Security Control Assessment result provides the surety or evidence enforcement of security control in an organization as well as its
effectiveness over the organization’s system. CSA also reports about the quality of risk management processes including the
incident response action plans.
CISSP-Domain 1-Security and Risk Management Ver 1.1 2021 June 2021 Page 8
– Specific areas covered in documentation areas ,Vulnerabilities discovered in target system, gaps in network measure.
– intrusion detection and response capability, observe of log activities and suggested countermeasures
Different Methods
DOS Testing - availability point of view
War Dialing - penetrate the modems/telephones
War Driving - Check for Open WIFI
Social Engineering - that relies heavily on human interaction and often involves manipulating people into breaking normal
security procedures .
Pivoting Method: Penetration of one network to other network is called pivoting.
Traffic Padding: is not a technique used to perform penetration test.
Threat Modeling
2.
□ Approach to identifying and categorizing potential threats.
□ Ultimate goal of threat Modelling is to identify the outcome of the possible threat.
Scope - Network, System, Application or Data
Identify Threat agents and possible threats
Understand Current Controls
Identify exploitable vulnerabilities
Priorities identified risk
Identify controls to reduce risk to acceptable levels
□ Attacker-centric
Threat models starts with identifying an attacker and then evaluates the attacker’s goals and potential techniques.
□ Architecture-centric
Threat models focus on system design and potential attacks against each component.
□ Asset-centric
Threat models begin by identifying asset value and motivation of threat agents.
3. Threat Analysis
□ Motivation
Why would an adversary target my organization?
□ Work factor
How hard would it be for an adversary to achieve their objective?
□ Threat Intelligence
Are we aware of the latest threats, tools, and techniques?
□ Threat Detection
Would we know if we were being attacked?
□ Resiliency
Are we prepared to respond to an attack?
4. Attack Vectors
□ Digital Infrastructure
Disruption, manipulation, or compromise of network or host hardware, services, application, data, or transmission
Subset is cryptographic which is disruption, manipulation, or compromise of cryptographic algorithms, protocols, services,
applications, or data
STRIDE ( EXAM NOTE IMP )
◊ Created by Microsoft, is actually a threat classification system used to inform software developers during the
development process.
S - SPOOFING - the type of threat wherein an attacker poses an entity other than the attacker.
T - TEMPER - when the attacker attempts to modify the target data in an unauthorized way.
R - REPUDIATION - when the attacker, as a participant of a transaction, can deny the attacker’s participation in
that transaction.
CISSP-Domain 1-Security and Risk Management Ver 1.1 2021 June 2021 Page 9
that transaction.
I - INFORMATION DISCLOUSER - where an authorized user discloses protected data accidentally to
unauthorized users
D - DOS - an attack on the availability system.
E - ELEVATION OF PRIVILAGE - when an attacker not only gains access to the target but can attain a level of
control with which to completely disable/destroy the entire target
◊ PASTA ( PROCESS FOR ATTACK SIMULATION & THREAT ANALYSIS )
It provides a seven-step process for aligning business objectives and technical requirements, taking into account compliance
issues and business analysis
Stages
– Stage 1 - Definition of Objectives for the Analysis of Risks
– Stage 2 - Definition of Technical Scope
– Stage 3 - Application of Decomposition and Analysis
– Stage 4 - Threat Analysis
– Stage 5 - Weakness and Vulnerability Analysis
– Stage 6 - Attack Modelling and Simulation
– Stage 7 - Risk Analysis and Management
□ Physical Infrastructure
Disruption or destruction of physical structures and facilities
◊ Tailgating Attacks
An attacker, seeking entry to a restricted area secured by unattended electronic access control simply walks in behind a
person who has legitimate access, following common courtesy, the legitimate person will usually hold the door open
for the attacker. Tailgating is mostly physical point of view.
◊ Piggybacking
With Consent someone just follows the person through door.
□ Human
Disruption, manipulation, or compromise of people
◊ Social Engineering Attack
Attacker use human interaction to obtain or compromise information about
user/organization/computer
◊ Phishing Attacks
A form of social engineering, use email or malicious web sites to solicit personal information by posing as a trustworthy
organization / person.
◊ Pretexting Attacks
The act of creating and using an invented scenario ( the pre text) to engage a targeted victim in a manner that
increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary
circumstances
◊ Baiting Attacks
The attacker leaves a malware infected CD-ROM or USB flash drive
in a location sure to be found, gives it a legitimate looking and curiosity-piquing label, and simply waits for the victim to
use the device
○ Acquisition Strategy
▪ Conduct Risk management during acquisition
▪ A Policy, process or produce to reduce security risks and related incidents for acquired products,
▪ Address anything that could introduce risk to the system,
▪ Applies to ALL externally acquired products and services,
▪ Should include supply chain management or create a separate supply chain policy
CISSP-Domain 1-Security and Risk Management Ver 1.1 2021 June 2021 Page 10
between the provider and the customer.
□ Assurance can only gained through inspection ,review and assessment, SLA are defined from SLR (Service Level Requirements) -
required shared by the customer to vendor, SLA signed between customer and vendor.
□ Most important element to include in SLA is Services metrics and Right to Audit - customer can ask audit report SOC, ISO
Reports..Etc.,
□ Review Annually
□ Single SLA covers multiple services.
▪ Service Level Requirement (SLR)
□ contains the requirement for a service from the client view point - detailed service level targets, mutual responsibilities, other
requirements specific to a certain group of customers. Draft of SLA.
▪ Service Level Report (SLRep)
□ Shared from Vendor to customer.
□ Includes comparison agreed vs. achieves service levels (primary concern) talks about Information service usage, Provides ongoing
measures for measurement, Exceptional events.
▪ Operational Level Agreement (OLA)
□ Agreement describes the responsibilities of each internal support group toward other support groups, including the process and
timeframe for delivery of their services.
□ Review Internally , Weekly meeting.
❖ Business Continuity (BC) Requirements
CISSP-Domain 1-Security and Risk Management Ver 1.1 2021 June 2021 Page 11
▪ The objective of business continuity planning is to prepare for the continued operation of essential functions and services during disruption of normal
operating conditions.
▪ The documentation of predetermined set of instructions or procedures that describe how an organization's mission/business processes will be sustained
during and after a significant disruption
▪ BCP implementation is accountability of Senior Management
▪ BCP is a strategic Plan
○ Disaster Recovery Plan
▪ A Written plan for recovering one or more information systems at an alternate facility in response to a major hardware or sof tware failure or
destruction of facilities
▪ Tactical/Operational Plan for only IT. DR is subset of BCP
○ Phases of BCP (CBK)
1. Project Scope and Planning
□ First step in building the BC Program is Project Initiation and Management
□ Obtain senior management support to forward the project
□ Define a project scope, objectives to be achieved and planning assumptions - responsibility of the project manager.
□ Estimate project resources needs to be successful both human and financial resources
□ Define timeline and major project deliverables.
□ The BCP committee should be as large as it needs to be in order to represent each department within the organization.
□ There are two points to be considered -
the risk they are accepting by not having one.
second potential cost to the organization if disaster strikes.
2. Business Impact Assessment (BIA)
□ The objective of a Business Impact Analysis (BIA) is a BCP Phase to identify essential services, systems, and infrastructure.
□ Essential means that the absence of or disruption of services would result in significant, irrecoverable, or irreparable harm
to the organization, employees, business partners, constituents, community, or country.
□ Outcome of BIA is a prioritized matrix of services, systems ,and infrastructure
□ The first step in a business impact analysis (BIA) is creating data-gathering techniques.
□ Business Impact Analysis (BIA) is used by management to
Make investment decisions
Prioritize resources.
Guide the development of incident response, disaster recovery, and business contingency (continuity) plans.
□ BIA Includes
A vulnerability assessment and risk analysis.
A prioritization of critical processes.
Estimates of tolerable downtime.
CISSP-Domain 1-Security and Risk Management Ver 1.1 2021 June 2021 Page 12
Recovered
CISSP-Domain 1-Security and Risk Management Ver 1.1 2021 June 2021 Page 13
❖ Compliance Requirements
○ Compliance is mandate , regardless of the source.
○ Compliance is used in our industry as a term that means both the action on the part of the organization to fulfill the mandate and the tools,
processes, and documentation that demonstrate adherence.
○ Compliance is components of GRC (Governance Risk Compliance)
▪ Governance
□ Governance is corporate management, Strategy, Policy management. Address Strategic planning, Business/IT Alignment, Policy
creation and Vision Setting.
▪ Risk Management
□ Identifying risks, evaluating risks, and managing the risks. Addresses System Threats, System vulnerability, Protection of IT Assets,
and Risks to Management objectives
▪ Compliance
□ Measure to ensure guarantee and conformity with laws, policies and formalities Addresses adherence of a laws, regulations,
policies and standards, best practices and frameworks
□ Policy is the best tool by which you can achieve the compliance - Act of Abiding
□ Legislative and Regulatory compliance - Law, regulations and compliance must be met, you must understand the law of your
country, you must also understand regulations as well, they are an important driver to your security
□ First course of action - information about the law, understand country regulations and build policy according to these.
○ Regulations
▪ Regulations are mandates set by government bodies
▪ List of Regulations
□ GDPR ( General Data Protection Regulation) -- EU
Data Protection for all individual within the EU, effective May 2018.
Also addresses the export of personal data outside of the EU.
□ HIPAA (Health Insurance Portability and Accountability Act) -- US
Security and Privacy of Medical Records.
Legislation that provides data privacy and security provisions for safeguarding medical information.
Covered entities are defined in the HIPAA rules as
Very Important
□ GLBA ( Graham–Leach–Bliley Act ) -- US
Security and Privacy of Financial Records
Law that requires financial institutions to explain how they share and protect their customers' private information
□ SOX (Sarbanes–Oxley Act) -- US
Known as the "Public Company Accounting Reform and Investor Protection Act" (in the Senate) and "Corporate and Auditing
Accountability, Responsibility, and Transparency Act"
□ PIPEDA Canada’s (Personal Information Protection and Electronic Documents Act)
Personal Information & Protection of Electronics & Document Act - Canada
penalties up to $100,000 per violation
□ FERPA (U.S)
Security and Privacy of Students Educational Records
□ COPPA (U.S)
Security and Privacy of Online collection and use of data for minors under 13 years
□ PCI DSS
Payment Card Industry Data Security Standard
□ FISMA
Applicable to Government Contract
CISSP-Domain 1-Security and Risk Management Ver 1.1 2021 June 2021 Page 14
❖ Personnel Security Policies and Procedures
○ Employee Life Cycle
▪ Hiring Process
□ During employment screening the below practices must be covered
Job description
Reference checks ( also called personal reference check)
Education, Licensing, Certification and Verification
Background checks. Play very important role whenever we hire any resource
□ Background investigation: is basically one of the important part, background check can uncover the gaps in employment
misrepresentation of job title, reason of leaving the job, validating of certifications and criminal history.
▪ On-Boarding Process
□ Agreement varies from organization to organization.
□ The agreement includes Code of Conduct, Conflict of interest, Gift-handling, Ethics statements, Non-disclosure, Non-compete,
Acceptable use.
□ NDA is always aligned with the profile/bind with legal . when you leave the organization, NDA is still
applicable, Acceptable Use policy is limited to the organization. If you were involved any wrongdoing, company has right to terminate.
□ Steps process = Must review
• The new employee attends all required security awareness training.
• The new employee must read all security policies, be given an opportunity to have any questions
about the policies answered, and sign a statement indicating they understand and will comply with
the policies.
• The new employee is issued all appropriate identification badges, keys, and access tokens pursuant
to their assigned roles.
▪ Off-Boarding
□ Voluntary (friendly)
The primary concern for ISM is return assets back and disable the access.
Notice period - 30d/60d based on the organization.
Followed by Exit interview. User manager (employee manager) will notify the security department of the termination.
□ Involuntary (unfriendly)
Involuntarily means you did not solicit or request the action or result
Terminated would mean that something has been abruptly halted. In the world of employer employee relationships it would
tend to imply that someone got fired. They did not quit and voluntarily terminate but the employer asked them to leave.
○ Employment
▪ User Security Controls
□ Policy/Agreements
Confidentiality Agreement, Acceptable Use Policy and Agreement (AUP)
□ Training
Ongoing education, training, and awareness programs
□ Job Rotation
Rotating assignments - Job rotation is compensatory control,
Job rotation is like a preventative action that we can take to prevent fraud in addition to Separation of Duties.
Business unit head is responsible for job rotations, ISM is only enforcing these controls
Also, it reduces the risk of Collusion
□ Separation of Duties / Segregation of Duties
Breaking a task into processes so that no one subject is in complete control
But promote collusion
□ Mandatory Vacation
Requiring employees to take a set amount of vacation time.
Primary objective of Mandatory vacation is to detect a fraud not to prevent a fraud.
□ Dual Control
Requiring more than one subject or key to complete a specific task
□ Need to know
What I can do with this information
Proper clearance must be in place as well
□ Least Privilege
give user & process only required privilege removes ability to abuse of the system
Grant users only the rights and permissions they need to perform their job and no more
□ Clean Desk
Requirement to never leave confidential data (paper, monitor, whiteboard) unattended or within view of unauthorized
personnel
▪ Personnel Agreement
□ Confidentiality /Non-disclosure (NDA)
Protect data from unauthorized disclosure
Establish data ownership
Protect information from disclosure
Prevent forfeiture of patent rights
CISSP-Domain 1-Security and Risk Management Ver 1.1 2021 June 2021 Page 15
Prevent forfeiture of patent rights
Define handling standards including disposal
□ Acceptable Use Policy (AUP) Agreement
Set forth proper use of information systems, handling standards, monitoring, and privacy expectations
An AUP should be written in language that can be easily and unequivocally understood.
By signing the associated agreement, the user acknowledges, understands, and agrees to the stated rules and obligations
❖ For last moment Review Domain 1 Security and Risk Management (Part1) Link
❖ For last moment Review Domain 1 Security and Risk Management (Part 2) Link
❖ For last moment Review Domain 1 Security and Risk Management (Part 3) Link
CISSP-Domain 1-Security and Risk Management Ver 1.1 2021 June 2021 Page 16