2022 FRSecure CISSP Mentor Program - 2022 - Class Ten
2022 FRSecure CISSP Mentor Program - 2022 - Class Ten
INTRODUCTION
2022
Class #10 – Domain 7
Evan Francen
Evan Francen – FRSecure and SecurityStudio Co-Founder & CEO
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 1
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
I’M BACK!
Lucky you…
UGH! Again?!
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 1
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
INTRODUCTION
Agenda
• Welcome, Reminders, & Introduction
• Questions
• Domain 7 – Communication and Network
Security (pp. 463 - Kindle)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 2
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
INTRODUCTION
Agenda
• Welcome, Reminders, & Introduction
• Questions
• Domain 7 – Communication and Network
Security (pp. 463 - Kindle)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 3
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 4
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
GETTING GOING…
Managing Risk!
Studythrough
We’re Tips: Chapters 1, 2, 3, and part way into Chapter
4!
• Study in small amounts frequently (20-30 min)
•• Check-in.
Flash card and practice test apps help
•• How many
Take napshave read
after Chapter
heavy 1, 2(aka
topics & 3?Security Models)
Write things down, say them out loud
•• Questions?
• Use the Slack Channels
• Exercise or get fresh air in between study sessions
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 5
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
GETTING GOING…
Managing Risk!
Studythrough
We’re Tips: Chapters 1, 2, 3, and part way into Chapter
4!
• Study in small amounts frequently (20-30 min)
•• Check-in.
Flash card and practice test apps help
•• How many
Take napshave read
after Chapter
heavy 1, 2(aka
topics & 3?Security Models)
Write things down, say them out loud
•• Questions?
• Use the Slack Channels
• Exercise or get fresh air in between study sessions
GETTING GOING…
THANK YOU!
• Christophe – GREAT job Monday on Domain #6 -
Security Assessment and Testing!
• Ryan is keeping us ready with all the live streamy
techy stuff!
• Ron is still EL MEJOR PROFESOR! Answering
questions ALL DAY.
• Brandon Matis running things and things.
• Many unsung FRSecure heroes doing heroey
things.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 7
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
GETTING GOING…
THANK YOU!
• Christophe – GREAT job Monday on Domain #6 -
Security Assessment and Testing!
• Ryan is keeping us ready with all the live streamy
techy stuff!
• Ron is still EL MEJOR PROFESOR! Answering
questions ALL DAY.
• Brandon Matis running things and things.
• Many unsung FRSecure heroes doing heroey
things.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 8
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
INTRODUCTION
Agenda
• Welcome, Reminders, & Introduction
• Questions
• Domain 7 – Security Operations (pp. 463 -
Kindle)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 9
#MissionBeforeMoney
QUESTIONS. 2
1
6
5
4
8
3
0
7
10
9
How about some practice ones?
1. What is the essential difference between a self-
audit and an independent audit?
a. Tools used
b. Competence
c. Results
d. Objectivity
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 10
#MissionBeforeMoney
QUESTIONS.
How about some practice ones?
1. What is the essential difference between a self-
audit and an independent audit?
a. Tools used
b. Competence
c. Results
d. Objectivity
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 11
#MissionBeforeMoney
QUESTIONS. 2
1
6
5
4
8
3
0
7
10
9
How about some practice ones?
2. Which of the following is the process of
repeating a portion of a test scenario or test plan
to ensure that changes in information system
have not introduced any errors?
a. Black box testing
b. Pilot Testing
c. Parallel Test
d. Regression Testing
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 12
#MissionBeforeMoney
QUESTIONS.
How about some practice ones?
2. Which of the following is the process of
repeating a portion of a test scenario or test plan
to ensure that changes in information system
have not introduced any errors?
a. Black box testing
b. Pilot Testing
c. Parallel Test
d. Regression Testing
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 13
#MissionBeforeMoney
QUESTIONS. 2
1
6
5
4
8
3
0
7
10
9
How about some practice ones?
3. What would a significant benefit be from
conducting an unannounced penetration test?
a. The pen test would be a more realistic analysis of the
target network
b. The security analyst could not provide an honest analysis
c. It is best to catch critical infrastructure unpatched:
d. Network security would be in a "best state" posture
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 14
#MissionBeforeMoney
QUESTIONS.
How about some practice ones?
3. What would a significant benefit be from
conducting an unannounced penetration test?
a. The pen test would be a more realistic analysis of the
target network
b. The security analyst could not provide an honest analysis
c. It is best to catch critical infrastructure unpatched
d. Network security would be in a "best state" posture
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 15
#MissionBeforeMoney
QUESTIONS. 2
1
6
5
4
8
3
0
7
10
9
How about some practice ones?
4. Which of the following answers represents part
of the attack phase of a penetration test?
a. Getting the legal documents signed
b. Active or Passive Reconnaissance
c. Escalate Privileges
d. Removing all tools and exploits:
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 16
#MissionBeforeMoney
QUESTIONS.
How about some practice ones?
4. Which of the following answers represents part
of the attack phase of a penetration test?
a. Getting the legal documents signed
b. Active or Passive Reconnaissance
c. Escalate Privileges
d. Removing all tools and exploits:
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 17
#MissionBeforeMoney
QUESTIONS. 2
1
6
5
4
8
3
0
7
10
9
How about some practice ones?
5. Which well-known model is used for
understanding the maturity level of a process?
a. The Zachman Framework
b. CMM - Capability Maturity Model
c. HIPAA
d. PCI-DSS
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 18
#MissionBeforeMoney
QUESTIONS.
How about some practice ones?
5. Which well-known model is used for
understanding the maturity level of a process?
a. The Zachman Framework
b. CMM - Capability Maturity Model
c. HIPAA
d. PCI-DSS
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 19
#MissionBeforeMoney
QUESTIONS.
How about some practice ones?
5. Which well-known model is used for
understanding the maturity level of a process?
a. The Zachman Framework
b. CMM - Capability Maturity Model
c. HIPAA
d. PCI-DSS
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 20
#MissionBeforeMoney
QUESTIONS. 2
1
6
5
4
8
3
0
7
10
9
How about some practice ones?
6. What would you call a collection of tools that allow
enterprises to continually and consistently simulate the
full attack cycle (including insider threats, lateral
movement, and data exfiltration) against enterprise
infrastructure, using software agents, virtual machines,
and other means?
a. The pandora toolbox
b. Advanced Persistent Threats
c. Such a collection of tools does not exist
d. Breach & attack Simulation
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 21
#MissionBeforeMoney
QUESTIONS.
How about some practice ones?
6. What would you call a collection of tools that allow
enterprises to continually and consistently simulate the
full attack cycle (including insider threats, lateral
movement, and data exfiltration) against enterprise
infrastructure, using software agents, virtual machines,
and other means?
a. The pandora toolbox
b. Advanced Persistent Threats
c. Such a collection of tools does not exist
d. Breach & attack Simulation
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 22
#MissionBeforeMoney
QUESTIONS. 2
1
6
5
4
8
3
0
7
10
9
How about some practice ones?
7. Organizations should not view disaster recovery
as which of the following?
a. Committed expense
b. Enforcement of legal statutes
c. Compliance with regulations
d. Discretionary expense
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 23
#MissionBeforeMoney
QUESTIONS.
How about some practice ones?
7. Organizations should not view disaster recovery
as which of the following?
a. Committed expense
b. Enforcement of legal statutes
c. Compliance with regulations
d. Discretionary expense
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 24
#MissionBeforeMoney
QUESTIONS. 2
1
6
5
4
8
3
0
7
10
9
How about some practice ones?
8. What is a common way of preventing users from
running code that has been altered or corrupted
since it was originally approved and installed?
a. Software Accreditation
b. IDEA - International Data Encryption Algorithm
c. Code Signing
d. Code Hashing
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 25
#MissionBeforeMoney
QUESTIONS.
How about some practice ones?
8. What is a common way of preventing users from
running code that has been altered or corrupted
since it was originally approved and installed?
a. Software Accreditation
b. IDEA - International Data Encryption Algorithm
c. Code Signing
d. Code Hashing
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 26
#MissionBeforeMoney
QUESTIONS. 2
1
6
5
4
8
3
0
7
10
9
How about some practice ones?
9. Which answer is generally not associated with a
resource exhaustion attack?
a. Teardrop Attack
b. Fork Bomb
c. Smurf Attack
d. Memory Leak
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
QUESTIONS.
How about some practice ones?
9. Which answer is generally not associated with a
resource exhaustion attack?
a. Teardrop Attack
b. Fork Bomb
c. Smurf Attack
d. Memory Leak
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 28
#MissionBeforeMoney
QUESTIONS. 2
1
6
5
4
8
3
0
7
10
9
How about some practice ones?
10. What process can tell an executive manager
about the state of the organization's security
program?
a. Internal Risk Assessment
b. A Security Audit
c. Change Control Processes
d. Security Incident Logs
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 29
#MissionBeforeMoney
QUESTIONS.
How about some practice ones?
10. What process can tell an executive manager
about the state of the organization's security
program?
a. Internal Risk Assessment
b. A Security Audit
c. Change Control Processes
d. Security Incident Logs
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 30
#MissionBeforeMoney
QUESTIONS.
How about some practice ones?
10. What process can tell an executive manager
about the state of the organization's security
program?
a. Internal Risk Assessment
b. A Security Audit
There!
c. Change Control Processes
10 outta 10.
d. Security Incident Logs
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 31
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
INTRODUCTION
Agenda
• Welcome, Reminders, & Introduction
• Questions
• Domain 7 – Security Operations (pp. 463 -
Kindle)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 32
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
INTRODUCTION
Agenda
• Welcome, Reminders, & Introduction
• Questions
• Domain 7 – Security Operations (pp. 463 -
Kindle)
Now this…
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 33
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
INTRODUCTION
Agenda
Domain 7 – Security Operations (pp. 463 -
Kindle)
• 7.1 - Understand and comply with investigations
• 7.2 - Conduct logging and monitoring activities
• 7.3 - Perform Configuration Management (CM) (e.g., provisioning,
baselining, automation)
• 7.4 - Apply foundational security operations concepts
• 7.5 - Apply resource protection
• 7.6 - Conduct incident management
• 7.7 - Operate and maintain detective and preventative measures
• 7.8 - Implement and support patch and vulnerability management
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 34
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
INTRODUCTION
Agenda
Domain 7 – Security Operations (pp. 463 -
Kindle)
• 7.9 - Understand and participate in change management processes
• 7.10 - Implement recovery strategies
• 7.11 - Implement Disaster Recovery (DR) processes
• 7.12 - Test Disaster Recovery Plans (DRP)
• 7.13 - Participate in Business Continuity (BC) planning and exercises
• 7.14 - Implement and manage physical security
• 7.15 - Address personnel safety and security concern
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 35
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
INTRODUCTION
Agenda
Domain 7 – Security Operations (pp. 463 -
Kindle)
• 7.9 - Understand and participate in change management processes
• 7.10 - Implement recovery strategies
• 7.11 - Implement Disaster Recovery (DR) processes
• 7.12 - Test Disaster Recovery Plans (DRP)
• 7.13 - Participate in Business Continuity (BC) planning and exercises
• 7.14 - Implement and manage physical security
• 7.15 - Address personnel safety and security concern
INTRODUCTION
Agenda
Domain 7 – Security Operations (pp. 463 -
Kindle)
•
• Hold up a second
7.9 - Understand and participate in change management processes
7.10 - Implement recovery strategies
though…
• 7.11 - Implement Disaster Recovery (DR) processes
• 7.12 - Test Disaster Recovery Plans (DRP)
• 7.13 - Participate in Business Continuity (BC) planning and exercises
• 7.14 - Implement and manage physical security
• 7.15 - Address personnel safety and security concern
DAD JOKE…
If you don’t like it, it’s Brad’s fault!
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 38
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
DAD JOKE…
If you don’t like it, it’s Brad’s fault!
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 39
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
DAD JOKE…
If you don’t like it, it’s Brad’s fault!
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 40
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
DAD JOKE…
If you don’t like it, it’s Brad’s fault!
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 41
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
DAD JOKE…
If you don’t like it, it’s Brad’s fault!
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 42
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
DAD JOKE…
If you don’t like it, it’s Brad’s fault!
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 44
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
https://www.findlaw.com/criminal/criminal-procedure/real-and-demonstrative-evidence.html
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 46
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
https://www.findlaw.com/criminal/criminal-procedure/real-and-demonstrative-evidence.html
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 47
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
https://www.findlaw.com/criminal/criminal-procedure/real-and-demonstrative-evidence.html
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 49
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
https://www.findlaw.com/criminal/criminal-procedure/real-and-demonstrative-evidence.html
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 50
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
https://www.findlaw.com/criminal/criminal-procedure/real-and-demonstrative-evidence.html
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 51
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 52
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 53
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 54
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 56
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 57
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 58
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 59
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 60
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 61
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 62
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 63
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 64
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
https://www.linkedin.com/pulse/cyber-security-incident-
handlers-jump-bag-jean-francois-stenuit/
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 65
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 66
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 67
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 68
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 69
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 70
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 71
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 72
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 73
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 74
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 75
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 76
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 77
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 78
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 79
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 80
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 81
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 82
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 83
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
Locard’s Principle
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 84
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 85
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 86
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 89
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 93
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 94
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 95
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 96
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 97
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 98
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 99
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 100
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 101
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 102
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 103
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 104
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 105
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 106
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 108
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 109
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 110
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 111
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 112
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 113
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 114
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 115
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 116
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
incidents.– setup
Provisioning Useand automation
deployment of where
the secure
possible. (baseline).
configuration
• The CI must be entered into the asset inventory.
• Baseline, standard baselines include DISA STIGs, CIS
Maintain
Benchmarks,theand/or
secure configuration
vendor-supplied configuration
information.
through strict change management.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 117
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 118
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 119
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 120
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 121
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 122
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 123
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 124
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 125
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 126
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
https://frsecure.com/information-classification-policy-
template/
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 127
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
https://frsecure.com/information-classification-policy-
template/
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 128
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 129
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 130
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 131
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 132
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 133
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 134
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 135
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 136
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 137
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 138
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 139
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 140
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 141
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 142
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 143
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 144
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 145
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 146
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
Let me know if you want a copy of this…
DOMAIN 7 – SECURITY OPERATIONS
CONDUCT INCIDENT MANAGEMENT
Incident Management Plan
Contains how the organization will manage an incident from
beginning to end (and into the next).
The book, “tools, resources, and processes needed to identify,
categorize, and remediate the impact of incidents.”
Plenty of standards to draw from:
• ITIL framework incident management processes
• NIST Special Publication 800-61, “Computer Security Incident Handling
Guide”
• ISO 27035, “Security incident management”
https://frsecure.com/incident-response-log-template/
• European Network and Information Security Agency (ENISA), “CSIRT Setting
Up Guide”
• ISACA, “Incident Management and Response”
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 147
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 148
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 149
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 150
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 151
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 152
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 153
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 154
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 155
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
Firewalls (review)
• Static packet inspection (stateless)
• Stateful packet inspection
• Web application firewall (WAF) and API gateway -
Specialized network access control devices designed to
handle specific types of traffic, unlike a generic firewall that
handles all network traffic. WAFs and API gateways analyze
traffic destined specifically for a web application or an
application's API.
• Host-based firewalls - These are installed on a specific
endpoint and use a ruleset specific to that endpoint.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 156
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
Firewalls (review)
• Next-generation firewalls (NGFW) - These are more of a
marketing term than a unique type of firewall. Combines
network security services into a single device/system. Lower
overhead and cost (maybe), but higher complexity in a single
device (point of failure).
• Security groups: These exist in software defined networks
(SDNs) and cloud environments and serve many of the same
functions as a firewall.
Firewalls, security groups, and microsegmentation are useful
access control devices in a zero-trust network architecture,
where no part of the network is implicitly trusted.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 157
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 158
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 159
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
Whitelisting/Blacklisting
Mostly changed to allowlisting and blocklisting.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 160
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 161
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
Sandboxing
• Run code, observe and analyze and code in a safe, isolated environment
on a network that mimics end-user operating environments.
• Designed to prevent threats from getting on the network and is
frequently used to inspect untested or untrusted code.
Honeypots/Honeynets
• Network-attached system as a decoy to lure cyber attackers.
• Used to detect, deflect and study hacking attempts to gain unauthorized
access to information systems.
• A honeynet is a collection of honeypots.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 162
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
Be careful
Sandboxing with honeypots, entrapment
•versus enticement.
Run code, observe and analyze and code in a safe, isolated environment
on a network that mimics end-user operating environments.
• Designed to prevent threats from getting on the network and is
frequently used to inspect untested or untrusted code.
Honeypots/Honeynets
• Network-attached system as a decoy to lure cyber attackers.
• Used to detect, deflect and study hacking attempts to gain unauthorized
access to information systems.
• A honeynet is a collection of honeypots.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 163
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 164
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 165
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 168
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION TEN
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 169
#MissionBeforeMoney
Homework:
• Catchup in you reading. You should be through (or at
least beginning) Domain 7 soon.
• Take practice tests.
• Review at least two of the references we provided in this
class (download for later use).
• Post at least one question/answer in the Slack Channel.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 170
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION ONE
INTRODUCTION
2022
Class #10 – Domain 7
Evan Francen
Evan Francen – FRSecure and SecurityStudio Co-Founder & CEO
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 1