The 8 CISSP domains explained
The 8 CISSP domains explained
The CISSP® (Certified Information Systems Security Professional) qualification is one of the
most respected certifications in the information security industry, demonstrating an advanced
knowledge of cyber security.
It ranks alongside CCSP (Certified Cloud Security Professional) and CSSLP (Certified Secure
Software Lifecycle Professional) as one of the most in-demand credentials when hiring C-level
leaders in information security.
CISSP was launched in 1994 and its structure was last updated by (ISC)2 in 2015, moving from
ten domains to eight. The domain weightings in the CISSP exam were changed in 2021, but from
15 April 2024 they will change again.
These regular updates made by (ISC)2 ensure that the exam remains aligned with real-world job
role expectations.
Our CISSP exam preparation course covers these eight domains in depth.
The confidentiality, integrity and availability of information (known as the CIA triad);
Security governance principles;
Compliance requirements;
Legal and regulatory issues relating to information security;
IT policies and procedures;
Risk-based management concepts; and
(ISC)2 Code of Ethics.
This domain highlights the complexities of classifying information and helps candidates
appreciate how an organisation’s information security function interacts with other areas, such as
compliance, operational risk and IT. It also includes fundamental concepts that carry through in
every other domain.
2. Asset Security
Mastering this domain involves understanding how the principles can be applied in context,
considering multiple stakeholders and not just fixing a problem.
This domain covers the design and protection of an organisation’s networks. This includes:
This domain helps information security professionals understand how to control the way users
can access data. It covers:
Identity and access management are considered the first line of defence for protecting
information assets.
A number of prominent laws, regulations, standards and frameworks (such as the GDPR and the
PCI DSS) implicitly require security controls (policies, procedures and technology) to be
designed and implemented to reflect this.
This domain focuses on the design, performance and analysis of security testing. It includes:
Designing and validating assessment and test strategies;
Security control testing;
Collecting security process data;
Test outputs; and
Internal and third-party security audits.
As cyber attacks and threats evolve, regular security audits, penetration tests and ethical hacking
are increasingly important.
7. Security Operations
This domain addresses how information security management principles are integrated into the
day-to-day running of IT functions to support business objectives. It covers:
Software Development Security comprises 11% of the CISSP exam (10% from 15 April 2024).
This domain helps professionals understand, apply and enforce software security principles in
the development lifecycle. It covers:
These principles can be applied when developing software for internal or commercial use, as
well as part of due diligence processes when sourcing suppliers.
Vulnerabilities, Threats, and Risks Explained
By David Puzder • April 27, 2023
These three fundamental cybersecurity concepts are related but have distinct meanings. Security
experts define these three concepts in a variety of ways, and the terms threat and risk are
sometimes used interchangeably. This article’s definitions come from paraphrasing Computer
Security: Principles and Practice by William Stallings and Lawrie Brown. Each term can be
thought of in reference to an asset or “something that needs to be protected.”
Vulnerability
Identifying vulnerabilities is akin to answering the question, “How could harm occur?”
Sometimes, a vulnerability can exist simply from an asset’s implementation or deployment. For
example, a vulnerability is leaving your car unlocked in a public parking lot. Leaving the doors
unlocked does not necessarily mean harm will occur, but it is an opening for someone to go
through your car. Our office looks for vulnerabilities in WashU systems to catch them before bad
actors can exploit them.
Threat
Identifying threats is akin to answering the question, “Who or what could cause harm?” In a
broad sense, a threat is anything that could exploit a vulnerability and hinder the confidentiality,
integrity, and availability of anything valuable. Threats can either be natural or human-made and
accidental or deliberate. In our car example, the owner of the car did not lock their door, so a
carjacker could exploit the opportunity. This means the threat is human-made and deliberate.
Risk
Once we know an asset’s vulnerabilities and threats, we can determine how much risk is posed to
the asset owner. This measure is the combination of the likelihood that a threat exploits a
vulnerability and the scale of harmful consequences.
Despite the quantitative-looking nature of risk calculation, many risk analyses use qualitative
ratings. This is because it can be extremely difficult to determine accurate probabilities and
realistic costs, especially for intangible assets like trade secrets. The aim of risk analysis is to put
risks in order of what is most urgent. This can also help the owner figure out how much effort
and resources should go into protecting the asset.
Once again, let us circle back to the car example. If you drive a fancy car and keep valuables in
it, then your cost is high. Also, if you park the unlocked car in a crime-laden area, then the
probability that a threat occurs is also high. Combining these two factors shows your car is at
elevated risk in this situation.
Managing Risk
The problem with risk is that, no matter how advanced our systems are, we cannot eliminate all
threats. This is where risk assessment and management come in: a routine, ongoing practice
where our office regularly reviews risks to minimize the potential for certain threats to occur.
You can find a list of our forms – including risk assessment forms such as the IT Procurement
Vendor Intake Form and Web Application Risk Assessment – at Forms | Office of Information
Security. For a list of approved external websites or cloud services to store, create or transmit
WashU confidential or Protected information, visit Secure Storage and Communication Services.
Reference
Stallings, W., & Brown, L. (2017). Computer security: Principles and practice (4th ed.). Pearson
Education, Inc.
Ransomware attacks are typically carried out using a Trojan disguised as a legitimate file that the
user is tricked into downloading or opening when it arrives as an email attachment. However,
one high-profile example, the WannaCry worm, traveled automatically between computers
without user interaction.[6]
Starting as early as 1989 with the first documented ransomware known as the AIDS trojan, the
use of ransomware scams has grown internationally.[7][8][9] There were 181.5 million ransomware
attacks in the first six months of 2018. This record marks a 229% increase over this same time
frame in 2017.[10] In June 2014, vendor McAfee released data showing that it had collected more
than double the number of ransomware samples that quarter than it had in the same quarter of the
previous year.[11] CryptoLocker was particularly successful, procuring an estimated US$3 million
before it was taken down by authorities,[12] and CryptoWall was estimated by the US Federal
Bureau of Investigation (FBI) to have accrued over US$18 million by June 2015.[13] In 2020, the
IC3 received 2,474 complaints identified as ransomware with adjusted losses of over $29.1
million. The losses could be more than that, according to the FBI.[14] Globally, according to
Statistica, there were about 623 million ransomware attacks in 2021, and 493 million in 2022.[15]