CISSP_DAY1_part1
CISSP_DAY1_part1
https://www.isc2.org/ethics
"ISC2 members who intentionally or knowingly
violate any provision of the Code will be subject to
action by a peer review panel, which may result in
the revocation of certification.
https://www.isc2.org/ethics
• Keep in mind that this high-level guidance is
not intended to be a substitute for the ethical
judgment of the security professional
• Preamble: "The safety and welfare of society
and the common good, duty to our principals,
and duty to each other, require that we adhere,
and be seen to adhere, to the highest ethical
standards of behavior."
• Therefore, strict adherence to this code is a
condition of certification
1. Protect society, the common good, necessary
public trust and confidence, and the
infrastructure
VXLAN datacenters
Restrict to
Integrate with
specific IP Classless Watermark Track Integrate with
command line
Inter-Domain Routing PDF document e-commerce
interface (CLI)
(CIDR) files usage solutions
for automation
Ranges
• The U.S. Department of Commerce's Bureau of Industry
and Security (BIS) administers U.S. laws, regulations and
policies controlling the export and re-export of
commodities, software, and technology placed under
the jurisdiction of the Export Administration Regulations
(EAR)
• The main objective of BIS is to progress national
security, foreign policy, and economic goals by
safeguarding an effective export control and treaty
compliance system, as well as promote continual U.S.
strategic technology leadership
• BIS is answerable for deploying and enforcing
the EAR, which regulates the export,
re-export, and transfer (in-country) of items
with commercial uses that can also be used
in conventional arms, weapons of mass
destruction, terrorism, or human trafficking
and rights abuses, and less sensitive
military items
• The BIS Export Administration (EA) reviews
license applications for exports, re-exports,
transfers and deemed exports subject to
the EAR
• Transborder data flow (TDF) can be defined as
the electronic transmission of data across
political borders for processing and storage in
file, block, and object storage
• For private-sector entities, cross-border data
flows reinforce daily operations, logistics, supply
chains, and global communications
• Accountable cross-border data flows can reduce
human rights abuses, support cybersecurity,
promote economic development, financial
inclusion, health, sustainability, and more
• How will companies protect privacy in the target
country?
• How will governments seek access to that data
for national security and law enforcement
auditing and forensic initiatives?
• How do organizations that use the cloud to
distribute content to other areas handle different
local laws, regional differences, and varying
cultural and religious sensitivities?
• Is there a realistic global framework open to
democracies operating under the rule of law, that
is rights-protective, practicable, and scalable?
• The European Union's General Data Protection
Regulation (GDPR) is concerned with data
protection and privacy in the EU and European
Economic Area
• It introduces strict privacy controls for how
organizations worldwide collect, use, and store
the personal information of EU citizens
• GDPR covers all countries, citizens, and areas
under its jurisdiction regardless of where the data
is created, processed, or stored
• GDPR violations can bring stiff penalties, so
organizations everywhere must be mindful of its
requirements
• The Privacy Shield Framework replaced Safe
Harbor when on Oct 6, 2015, the European
Court of Justice (ECJ) – Europe's highest court
– concluded that the US-EU Safe Harbor
agreement between the European
Commission and the U.S. Department of
Commerce was invalid
• Although the Court of Justice subsequently
invalidated the Privacy Shield framework in
2020, participants are still obliged to comply
with some of its requirements
• The California Consumer Privacy Act (CCPA) is a
privacy law that controls how businesses can
gather, use, and share the personal information of
California residents
• The law also grants consumers the right to know
what data companies collect about them, to
request destruction of their data, and to opt out of
sharing or selling their data
• The law applies to businesses that have customers
in California, regardless of their location or
operation
• The China Personal Information Protection Law
(PIPL) is a relatively new data privacy law in
China that is aimed at personal information
protection and challenges with personal data
leakage and loss
• PIPL applies not only to entities physically
located in mainland China that handle PII, but
also to entities located outside mainland China
that engage in certain activities involving the
personal information of persons physically
located in China
• The Protection of Personal Information
Act (PoPIA or the PoPI Act) is a set of laws
that govern data protection and privacy in
South Africa
• The act was passed to regulate the right
to privacy, as enshrined by section 14 of
the Constitution of South Africa and
functions in concert with the Promotion
of Access to Information Act
• In cloud computing, for instance, the legal
responsibility for data processing falls to the
consumer or user who solicits the services of a CSP
• As in all other cases in which a third party is given
the task of processing personal data, the user, or
data controller, is responsible for ensuring that the
relevant requirements for the protection and
compliance with requirements for PII and Protected
Health Information (PHI) are satisfied or met
• Contractual PII is where an organization or entity
processes, transmits, or stores PII as part of its
business or services
• This information is required to be adequately
protected in line with relevant local, state,
national, regional, federal, or other laws
• The relevant contract should list the applicable
rules and requirements from the organization
who "owns" the data and the applicable laws to
which the provider should adhere
• With regulated PII, the key focus and
distinct criteria to which the regulated
PII must adhere is required under law
and statutory requirements
• PCI-DSS
• GDPR
• Sarbanes-Oxley
• This is different than the contractual
criteria that may be based on best
practice or organizational security
policies
Objectives
Applicable Comprehensive
Realistic Enforced
• The policies must be authorized
• A policy requires the support of executive
management or the C-suite
• There is often one owner or accountable
entity
for the security policy (i.e., RACI)
• This demands visible involvement and
ongoing activities such as communication,
funding, championing, prioritization, due
diligence, and
due care
• The policies must be appropriate and relevant
to the organization
• They must be in concert with the charters,
missions, strategies, and value propositions of
the enterprise
• Strategically, the information security policy
must support the guiding principles (i.e., ITIL4)
and objectives of the organization
• Tactically, policies must be closely related to
those stakeholders and principals who must
conform
• Templates should be customized as needed to
meet this objective
• In actuality, the policies can be effectively executed
• Policies must mirror the actual state of the
environment in which they will be applied
• Information security policies and procedures should
only demand what is possible in the given time frame
• If the assumption is that the policy goals are to reduce
risk and advance the organization’s guiding principles,
then a positive result is anticipated
• Policies (i.e., mock phishing campaigns) should never
set up principals for failure or retribution but rather
offer a clear track for success
• Polices must be agile and changeable
• An information security policy should
accommodate sudden and rapid
modifications when necessary
• An adaptable set of policies will realize
that information security is not a static,
point-in-time initiative
• This ongoing process designed to support
the organizational mission must adapt to
new opportunities, technologies,
competitors, and business continuity
challenges (i.e., pandemics)
• The scope of information security policies must
be inclusive and include all applicable internal
and external parties (stakeholders)
• The policies must consider :
• Customers (internal and external)
• Shareholders
• Organization objectives
• Laws and regulations
• Cultural norms of employees and consumers
• Business and strategic partners
• Vendors and suppliers (supply chain)
• Environmental impacts and sustainability
• Global cyber threats
• The information policies should first be enforceable
and then subsequently be enforced
• Enforceable entails that countermeasures have been
implemented to support the policy and adherence to
policies is measurable
• When necessary, proper actions will be taken:
1. Email or phone call reminder
2. Verbal and/or written warning
3. Sanctions or removal of privileges
4. Suspension with pay
5. Suspension without pay
6. Termination
7. Criminal or civil legal action (incarceration,
reimbursement, and/or restitution)
Endpoint use policy Rotation of duties