Module 1: Security Management: Lesson 1: Confidentiality, Integrity, and Availability
Module 1: Security Management: Lesson 1: Confidentiality, Integrity, and Availability
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 1: Security Management
Least Privilege: Provides subjects with privilege levels necessary to perform their tasking
o Examples of enforcing: Separating administrators, privileged, and other users. Appropriate privileges to
directories, applications, etc.
Authorization (Privilege) Creep: User privileges exceed what is needed to perform their job
o Examples to prevent: Remove or revoke privileges when they are no longer needed, Remove upon personnel
changes, Review all system privileges at least annually
Separation of Duties: Restricts a single subject from having sole responsibility or excessive control
o Examples of application: Banking transactions, Military weapons, User’s Personally Identifiable Information (PII),
Implementing system changes
Job Rotation: Prevents a single person from having excessive control of their responsibilities within the organization
o Examples of roles: Security managers, Bank managers, System administrators, Government officials, Human
resource personnel
Mandatory Vacation: Aimed at detecting or uncovering fraudulent activities
o Examples of roles: Department managers, System administrators, Account managers, Government officials
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 1: Security Management
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 1: Security Management
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 1: Security Management
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 1: Security Management
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 1: Security Management
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.