ISC2 CISSP Study Guide
ISC2 CISSP Study Guide
(Study Guide)
ISC2 CISSP
Study Guide
Introduction
● Introduction
○ Key Information and Concepts
■ Overview of the CISSP Certification
● One of the most prestigious certifications in information security
● Created and governed by the International Information System
Security Certification Consortium (ISC2)
● Demonstrates expertise in designing, implementing, and
managing information security
○ Audience Qualification
■ Recommended 3-5 years of experience in cybersecurity or IT
■ Other certifications, such as CompTIA Security+, ISC2 SSCP, or
equivalents, can be helpful
■ Not strictly required, as individuals from various professional
backgrounds have succeeded
○ CISSP Exam Structure
■ Based on the Common Body of Knowledge (CBK) covering eight domains
■ The exam is computer-based and adaptive (CAT) with 100-150 questions
over 4 hours
1
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
2
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Exam Tips
○ Understand the Purpose of the CISSP Exam
■ Recognize it as a leadership-focused exam aiming at managing security
risk, not just technical knowledge
■ The exam tests your ability to apply concepts to real-world scenarios
○ Learn and Understand vs. Memorizing
■ Focus on understanding concepts deeply rather than memorizing terms
or acronyms
■ ISC2 exams spell out acronyms to challenge comprehension, not recall
○ Create a Structured Study Plan
3
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Plan your study time around your life commitments; about an hour a day
is recommended
■ Include rest days and review sessions to consolidate learning
○ Limit Study Resources
■ Avoid information overload by sticking to a few trusted sources
■ Recommended resources include the official CISSP study guide and CISSP
CBK books
○ Use Practice Exams Properly
■ Practice exams are critical for getting used to the question format and
testing your understanding
■ Focus on understanding why answers are correct or incorrect to identify
knowledge gaps
○ Manage Time During the Exam
■ Develop a strategy to allocate time appropriately across questions, aiming
to spend no more than 1.5 minutes per question
○ Prepare for Exam Day
■ Ensure rest the night before and arrive early at the testing center
■ Bring necessary identification and confirmation details, and manage
stress and time during the test efficiently
4
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Objectives:
5
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
6
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Code of Ethics
○ Confidentiality
■ Ensure data/information is not disclosed to an unauthorized person or
process (preventing people from seeing data they are not allowed to see)
Integrity
7
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Availability
○ Authenticity
○ Non-repudiation
○ Security Governance
■ Defines how to ethically align business objectives to laws, standards, or
regulations
■ Sets the stage for how an organization’s management will act in the best
interest of the business stakeholders
○ Aligning Security
■ The security program must support the objectives, principles, and
strategies of the organization
■ Security must be supported by senior management to be effective
8
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ A top-down approach
○ Top-down approach
■ Support for security starts with senior management, then middle
management, then all other personnel
○ Security Planning
■ Strategic plan (long-term)
■ Outlines the business goals and objectives over a 3–5-year period, and is
typically updated annually
■ Tactical plan (mid-term)
■ Outlines the business goals and objectives over 1 year
■ Designed to meet the security objectives in the strategic plan
■ Operational plan (short-term)
■ Outlines business goals and objectives to meet the tactical and strategic
plan objectives over a 1–3-month period
○ Organizational Processes
■ Changes within the organizational structure must be evaluated to ensure
it meets organizational policy
■ Security plans must be reviewed and updated upon any purchases,
acquisitions, sales, and/or divestitures
9
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
10
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Data Steward
■ Provides subject matter expertise for specific data.
○ System roles and responsibilities
■ Administrator
■ Responsible for implementing and maintaining the information system –
privileged
■ Auditor
■ Responsible for auditing compliance with security policy
■ User
■ A subject with access to the information system
11
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Methods
● Emails, posters, workshops, and regular updates on security
protocols
○ Security Training
■ Focus
● Enhance skills to adhere to security policies
■ Approaches
● Hands-on training sessions, simulations, and role-specific training
○ Security Education
■ Goal
● Provide comprehensive knowledge and skills beyond immediate
job functions
■ Platforms
● Formal courses, certifications, and advanced training programs
○ Practical Applications and Scenarios
■ Administrative Security Controls
● Implementation through policies and procedures distributed
during employee onboarding and regular intervals
■ Regulatory Compliance
● Adherence to standards such as PCI DSS, FISMA, and ISO 27001
through targeted training programs
■ Risk Reduction Strategies
● Incorporation of findings from risk assessments into training
materials
12
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Social Engineering
○ Social Engineering
■ Psychological manipulation used to deceive individuals into divulging
confidential or personal information, often for fraudulent purposes
○ Common Social Engineering Techniques
■ Pretexting
● Creating a fabricated scenario to obtain information or persuade
the target
■ Quid Pro Quo
● An attacker provides something in exchange for information or
access
■ Phishing
● Fraudulent communications, usually via email, meant to lure
individuals into revealing sensitive information
○ Phishing Variants
■ Spear Phishing
● Targeted phishing aimed at specific individuals or groups.
■ Whaling
● Phishing attacks targeted at high-profile or executive-level
individuals
■ Vishing
13
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
14
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
15
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
16
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Non-Compete Agreement
● Prevents employees from joining competing firms for a specified
period post-employment
■ Acceptable Use Policy
● Defines acceptable and secure ways employees can use company
resources
○ Onboarding Process
■ Security Training
● Introduces new hires to the organization's security policies, tools,
and expected behaviors
● Access Authorization
● Grants access to company resources based on the principle of
least privilege
■ Policy Acknowledgement
● Requires new hires to sign agreements acknowledging
understanding and compliance with security policies
○ Offboarding Process
■ Termination Procedures
● Outlines steps to securely terminate access rights and retrieve
company assets
■ Exit Interviews
● Conducted to understand potential security concerns and
reinforce confidentiality agreements
● Access Revocation
17
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
18
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
19
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Methods
● Regular training sessions on security policies and emergency
procedures
● Drills and simulations to prepare personnel for real-life scenarios
● Awareness programs that focus on the importance of security in
everyday operations.
○ Travel Safety Procedures
■ Policies for Secure Travel
● Guidelines for securing sensitive information and devices while
traveling
● Policies on the use of secure connections for accessing corporate
networks
● Procedures for reporting and responding to security incidents
while away from the office
○ Handling Duress and Emergencies
■ Procedures for Reporting Duress
● Steps to take when experiencing or witnessing a duress situation.
● Use of coded signals or words to discreetly inform security
personnel.
■ Emergency Response Protocols
● Specific actions to take in various emergency scenarios.
● Roles and responsibilities defined for all personnel during an
emergency.
20
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Objectives:
21
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ GDPR (General Data Protection Regulation) for the EU and HIPAA (Health
Insurance Portability and Accountability Act) for the US are key
regulations
■ Knowledge of both international and national regulations, as well as
industry-specific laws, is essential for compliance
○ Licensing and Property Rights
■ Understanding different software licenses and their legal implications
■ Managing software rights to avoid legal challenges and security
vulnerabilities
○ Export and Import Controls (EXIM)
■ Regulate the transfer of technology and sensitive information across
borders
■ Important for organizations operating globally, especially regarding
encryption software
○ Cybercrime and Data Breaches
■ Includes activities like hacking, identity theft, and fraud
■ Understanding how to respond to data breaches and the legal
requirements for reporting them is crucial
○ Security Compliance Artifacts
■ Includes audit reports, risk assessments, and policy documents
■ Keeping these documents up to date is crucial for audits and
demonstrating regulatory compliance
22
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
23
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Discuss the implications of not adhering to due care and due diligence,
including potential legal liabilities and ethical breaches
■ Emphasize the role of these principles in corporate governance and
compliance frameworks
■ Example
● Illustrate with a scenario where a lack of due diligence led to a
data breach and legal consequences
○ Application in Security Governance
■ Requirement Identification
● Recognize security requirements based on organizational, legal,
and compliance needs
■ Implementation of Controls
● Apply appropriate security controls to meet the identified
requirements
■ Maintenance and Evaluation
● Regularly review and update security controls to ensure they
continue to meet the necessary standards
○ Real-world Application
■ Provide examples of how due care and due diligence are applied in
various industries, such as healthcare (HIPAA compliance) or financial
services (SOX compliance)
■ Discuss case studies where failure to apply these principles led to
significant financial and reputational damage
24
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
25
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Not a law but a standard enforced via fines or penalties by payment card
companies
○ General Data Protection Regulation (GDPR)
■ EU regulation that enhances and unifies data protection for individuals
within the European Union
■ Applies to all entities that process personal data of EU residents
○ Roles Defined by GDPR
■ Controller
● Determines the purposes and means of processing personal data
■ Processor
● Processes personal data on behalf of the controller
○ Rights Under GDPR
■ Access
● Subjects can access their personal data
■ Rectification
● Subjects can update or correct their data
■ Erasure
● Also known as the right to be forgotten
■ Restriction
● Subjects can limit how their data is used
■ Data Portability
● Subjects can reuse their data for their own purposes across
different services
■ Object
● Subjects can object to the processing of their personal data
26
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
27
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
28
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
29
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Telecommunications
● Part 2
○ Information Security, particularly cryptography and cyber
weapons
○ Examples
■ Encryption software exported to a country without proper compliance
might violate Category 5 Part 2
■ Mechanical components that could be used in both civilian and military
applications might fall under dual-use goods
○ Security Controls
■ Administrative, technical, or logical, and physical controls are necessary
to comply with export and import regulations
■ Security controls must cover the lifecycle of data and technology from
creation to deletion, ensuring compliance with international laws
○ Data Localization and Data Trading
■ Data Localization
● Requires data to be processed within the country of origin to
maintain control over its export and import
■ Data Trading
● The buying and selling of data for various purposes, including
marketing or malicious activities, necessitating strict compliance
with data protection laws
30
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
31
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Script Kiddies
○ Individuals using existing computer scripts or codes to hack
into computers, lacking sophisticated expertise
● Insider Threats
○ Employees who have access to the corporate networks and
might exploit their access to steal information
● State Actors
○ Government-sponsored groups engaging in espionage and
other cyber operations
■ Types of Cyber Attacks
● Active Attacks
○ Attempts to alter system resources or affect their
operation
● Passive Attacks
○ Attempts to learn or make use of information from the
system without affecting system resources
● Zero-Day Attack
○ Occurs when attackers exploit a previously unknown
vulnerability in a computer application, one that
developers have not had time to address and patch
■ Cybercrime Classifications
● Intentional Disruption Crime
○ Targets the availability of systems and networks
● Destruction Crime
○ Focuses on the deliberate destruction of data or systems
32
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Hacktivism
○ Attacks motivated by political or social objectives, often
involving website defacement or data leaks
● Doxing
○ Publicly releasing private or identifying information about
an individual or organization
33
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
34
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
35
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
36
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
37
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Risk Management
Objectives:
● 1.9 - Understand and apply risk management concepts
● 7.2 - Conduct logging and monitoring activities
● 1.11 - Apply supply chain risk management concepts
● Risk Management
○ Risk Management
■ Essential to information security
■ Key for answering questions on the CISSP exam
■ Addresses risks including cyber threats and natural disasters
■ Drives security control implementations
■ Links to domains like asset security, network security, and security
operations
○ Risk Management Concepts
■ Threats and vulnerabilities together create risk
■ Processes include identifying, assessing, and mitigating risks
○ Risk Response Strategies
■ Strategies include avoiding, transferring, and mitigating risk
■ Strategy selection based on organizational needs and risk nature
■ Importance of continuously assessing strategy effectiveness
○ Controls and Countermeasures
38
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
39
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
40
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
41
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
42
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Administrative Controls
● Procedures and processes, also known as soft or process controls
■ Technical and Logical Controls
● Measures to protect assets technically and logically
■ Physical Controls
● Measures to protect assets physically
○ Types of Controls
■ Deterrent Controls
● Discourage unauthorized actions
■ Preventative Controls
● Stop or prevent unauthorized actions
■ Detective Controls
● Discover unauthorized actions
■ Corrective Controls
● Correct or modify unauthorized actions
■ Compensating Controls
● Support other controls
■ Directive Controls
● Direct compliance with security policies
■ Recovery Controls
● Recover from events
○ Security Policy Role
■ Administrative, preventive, deterrent, and directive in nature
■ Example
43
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Continuous Monitoring
○ Definition and Purpose of Continuous Monitoring
■ Also known as Continuous Improvement
■ Objective
● Maintain ongoing awareness of organizational risks and the
security posture
■ Focuses on security control implementations, not just system monitoring
○ Difference from System Monitoring
■ Continuous Monitoring is not restricted to log file review or system status
monitoring
■ Involves evaluating all types of controls
● Administrative, logical, technical, and physical
44
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
45
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Method
● Describes how evaluations are performed, e.g., manual
inspections, automated scans
■ Frequency
● Determines how often different controls are reviewed
○ Metrics and Reporting
■ Metrics track success, failure, compliance, and non-compliance
■ Continuous monitoring findings are reported to senior management for
decision-making
○ Continuous Monitoring Plan
■ Document that outlines the monitoring strategy, scope, methods,
frequency, and metrics
■ Adjusted periodically to align with organizational needs and governance
requirements
○ Tier Levels in Continuous Monitoring
■ Tier 1
● Overall risk management strategies
■ Tier 2
● Business processes or critical business functions
■ Tier 3
● Security and privacy controls meeting business objectives
46
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
47
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
48
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Risk Frameworks
49
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Risk Frameworks
○ Risk Frameworks
○ Part of overall risk management involving assessment, control,
monitoring, and auditing of organizational risks
○ NIST Special Publications 837 - RMF (Risk Management Framework)
○ Focus
● Information systems and organizations
○ Provides a flexible 7-step process for managing security and privacy risks
○ Steps
● Preparation, Categorization, Selection, Implementation,
Assessment, Authorization, Monitoring
○ Importance of Preparations in RMF
○ Initial step involving identification of roles, business strategies, and
control providers
50
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
51
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Due Care
● Early stages of risk management including planning and selecting
controls
○ Due Diligence
● Continuous assessment, monitoring, and adaptation to changes in
risk environment
52
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Identify
● Develop an organizational understanding to manage cybersecurity
risk to systems, assets, data, and capabilities
■ Protect
● Implement appropriate safeguards to ensure delivery of critical
infrastructure services
■ Detect
● Implement appropriate activities to identify the occurrence of a
cybersecurity event
■ Respond
● Take action regarding a detected cybersecurity event
■ Recover
● Maintain plans for resilience and to restore any capabilities or
services impaired due to a cybersecurity event
○ Implementation of the CSF
■ Organizations apply the Core in a manner consistent with their risk
management strategy and business needs
■ Profiles allow organizations to establish a roadmap for reducing
cybersecurity risk that is well aligned with organizational and sector goals,
considers legal/regulatory requirements, and reflects risk appetite
○ Significance of Tiers
■ Provide context on how an organization views cybersecurity risk and the
processes in place to manage that risk
■ Are not maturity indicators but help in assessing the rigor and
sophistication of cybersecurity practices
53
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Usage of Profiles
■ Enable organizations to prioritize opportunities for improving
cybersecurity posture by comparing a "Current" profile (the "as is" state)
with a "Target" profile (the "to be" state)
■ Facilitate communication among internal and external stakeholders about
cybersecurity risk and management
● ISO/IEC 27001
○ Overview of ISO IEC 27001
■ Internationally recognized standard for information security management
systems (ISMS)
■ Provides guidance for establishing, implementing, maintaining, and
improving an ISMS
■ Applicable to all types of organizations regardless of size or sector
○ Purpose of ISO IEC 27001
■ Helps organizations protect their information assets
■ Manages information security risks effectively
■ Ensures organizational compliance with laws and regulations related to
information security
○ Key Principles of ISO IEC 27001
■ Based on the CIA triad
● Confidentiality, Integrity, and Availability
■ Aims to safeguard sensitive information and ensure regulatory
compliance
54
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
55
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Implementation Guidance
■ Organizations should tailor the implementation of the standard to their
specific needs, considering the context of their operations and the risks
they face
■ The standard emphasizes the importance of leadership involvement and a
clear commitment to information security
56
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Not a legal requirement but treated with the rigor of law or regulation in
the payment industry
■ Mandatory for all entities processing payment card transactions to
comply with PCI DSS
○ Purpose of PCI DSS
■ To ensure that all organizations that process, store, or transmit credit card
information maintain a secure environment
○ PCI DSS Requirements
■ Aim to protect cardholder data
■ Ensure the maintenance of a secure network
■ Implement strong access control measures
■ Regularly monitor and test networks
■ Maintain an information security policy
○ Key Components of PCI DSS
■ Cardholder Data (CHD)
● Includes the account number, cardholder name, expiration date,
and service code
■ Sensitive Authentication Data (SAD)
● Includes full track data, card verification codes, and PINs
■ Cardholder Data Environment (CDE)
● All system components involved in cardholder data processing,
storage, or transmission
○ PCI DSS Compliance Levels
■ Defined based on the volume of transactions over a 12-month period
■ Range from Level 1 (highest volume) to Level 4 (lowest volume)
57
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Compliance Requirements
■ Install and maintain a firewall configuration to protect data
■ Do not use vendor-supplied defaults for system passwords and other
security parameters
■ Protect stored data
■ Encrypt transmission of cardholder data across open, public networks
■ Use and regularly update anti-virus software
■ Develop and maintain secure systems and applications
■ Restrict access to cardholder data by business need-to-know
■ Assign a unique ID to each person with computer access
■ Restrict physical access to cardholder data
■ Track and monitor all access to network resources and cardholder data
■ Regularly test security systems and processes
■ Maintain a policy that addresses information security
● Understanding SABSA
○ Overview of SABSA
■ SABSA stands for Sherwood Applied Business Security Architecture
■ It is a framework for developing business-driven, risk-focused security
architectures at both enterprise and solutions levels
○ Purpose and Focus of SABSA
■ Aligns security architecture with business objectives, ensuring that
security supports the business rather than constraining it
58
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
59
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
60
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Risk Assessment
Objectives:
● 1.9 - Understand and apply risk management concepts
● 1.10 - Understand and apply threat modeling concepts and methodologies
● Risk Assessments
○ Risk Assessments
■ Essential in risk management and threat modeling
■ Fundamental to cybersecurity roles
■ Involves identifying, evaluating, and addressing risks to reduce exposure
and mitigate impact
○ Understanding Risk Assessments
■ Introduction to the foundational concepts of risk assessments
■ Involves identifying vulnerabilities, understanding threat impacts, and
evaluating threat likelihood
○ Conducting Risk Assessments
■ Steps to perform a risk assessment
■ Discussion on tools and techniques for data gathering, risk evaluation,
and mitigation strategy development
○ Control Assessments
■ Evaluation of security controls to mitigate identified risks
■ Continuous evaluation of control effectiveness against evolving threats
61
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
62
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
63
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
64
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
65
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Control Assessments
○ Key Information and Terms
■ Control Assessments
● Formal evaluations aimed at determining the effectiveness of
security and privacy controls
● Essential for verifying compliance and functionality before
deployment and during operation
■ Security Control Assessment
● Evaluates the security measures implemented to protect systems
and ensure they meet objectives throughout the system
development lifecycle
● Involves continuous monitoring and regular assessments in
operational environments
■ Privacy Impact Assessment
● Focuses on evaluating privacy controls related to data protection
laws
66
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
67
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
68
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
69
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
70
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
71
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
72
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
73
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
74
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
75
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Asset Security
Objectives:
● 2.1 - Identify and classify information and assets
● 2.2 - Establish information and asset handling requirements
● 2.3 - Provision information and assets securely
● 2.4 - Manage data lifecycle
● 2.5 - Ensure appropriate asset retention
○ E.g., End of Life (EOL), End of Support
● 3.10 - Manage the information system lifecycle
● Asset Security
○ Asset Security
■ Asset Security is a critical concept within information security
■ CISSP exam dedicates an entire domain to managing and protecting
assets, with a focus on data protection
■ Proper classification, handling, and lifecycle management of assets are
key to maintaining an organization’s security posture
○ Classifying Data and Assets (CISSP Exam Objective 2.1)
■ Identifying and classifying information and assets based on criticality,
sensitivity, and value to the organization
■ Different data classification levels determine how data should be handled
and secured
76
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
77
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
78
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Important Reference
■ NIST Special Publications 800-60
● Essential for understanding data types and classification standards
○ Data Classification
■ Identification of Data Types
● Includes private, sensitive, regulated, and public data
● Focus on both physical and digital formats
■ Importance of Inventory
● Comprehensive listing of all data and assets within an organization
● Helps in assessing criticality and impact on business operations
■ Governance, Regulation, and Compliance
● Policies governing data creation, collection, management, and
disposal
● Ensures data quality, authenticity, and reliability
■ Sensitivity Assessment
● Evaluating the data's need for protection based on its
confidentiality, integrity, and availability
○ Asset Classification
■ Understanding Asset Impacts
● Determining how critical each asset is to the organization
● Includes hardware, software, and other resources
■ Flow of Data
● Tracking how data moves within and outside the organization
79
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
80
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
81
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
82
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
83
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
84
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
85
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Software
● Operating systems, firmware, applications
■ Specific Details
● Manufacturer, model, serial number, version, supply chain info,
risk assessments, warranty details
■ Operational Details
● Purchase and installation dates, licensing, dependencies, updates,
location, IP addresses, barcode info, network settings, compute
metrics (CPU, memory), and baseline configurations
○ Tools and Techniques for Asset Tracking
■ Manual Tracking
● Spreadsheets, databases
■ Automated Discovery
● Tools like Nessus, Nmap, OpenVAS for host discovery and
operating system identification
○ Organizational Policy and Management
■ Depth of Tracking
● Determined by organizational policies which dictate the extent of
asset tracking
■ Management Software
● Utilize specialized software for tracking and managing inventory
■ Security and Integrity
● Ensure inventory list security and integrity to restrict access and
modifications to authorized personnel only
■ Updates and Change Control
86
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
87
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
88
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
89
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
90
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Example
○ Automatically assigning default file permissions using
UMASK on a Linux system
■ Data Classification
● After creation, data must be classified or categorized according to
its sensitivity
● Different data types (e.g., public web data vs. personal identifiable
information) require different levels of protection
● Ensures compliance with privacy laws and organizational
standards
■ Data Storage
● Data is stored in hard drives, cloud environments, or other storage
mediums while awaiting use or archiving
● Storage can occur on-premises or off-premises
○ E.g., cloud
● Security controls must be maintained regardless of where the data
is stored
○ E.g., on-site vs. third-party cloud providers
■ Data Use
● Data is used or processed during this phase
● Systems must track data usage, log activities, and ensure
compliance with business objectives
● Data sharing and transit must be secure
○ E.g., encryption in transit
■ Data Archiving
91
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
92
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
93
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
94
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
95
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Focus
● Detailed exploration of the final stages of the information system
lifecycle, emphasizing security integration
○ Key Concepts
■ Lifecycle Continuation
● Understanding the transition from development to operation and
eventual disposal, with a focus on maintaining security at every
step
■ Security Throughout Lifecycle
● Emphasizes the need to integrate security measures from the
initial phases through disposal to protect data and comply with
regulations
○ Phases of Information System Lifecycle (Continued)
■ Verification and Validation
● Ensure all components meet specified requirements
● Conduct rigorous testing and assessments to confirm system
security and functionality
■ Transition and Deployment
● Implement the new or updated system into an operational
environment
● Manage the transition carefully to ensure security settings are
transferred and operational
■ Operations and Maintenance/Sustainment
● Regularly update and maintain the system to address new security
threats and ensure compliance
96
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
97
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
98
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Objectives
99
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
100
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
101
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
102
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
103
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
104
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Health Industry
● HIPAA compliance
■ Government Industry
● FISMA compliance
■ Financial Industry
● SOX compliance
■ International Standards
● ISO/IEC 27002
○ Common Security Control Standards
■ NIST SP 800-53
● Security and Privacy Controls for Information Systems and
Organizations
● Required by FISMA
● Focuses on selecting controls based on risk levels, data sensitivity,
and organizational needs
■ ISO/IEC 27002
● International Code of Practice for Information Security Controls
● An international standard for information security controls
■ COSO Framework
● Committee of Sponsoring Organizations of the Treadway
Commission
● Commonly used with Sarbanes-Oxley (SOX) compliance
■ COBIT
● Control Objectives for Information and Related Technologies
● IT governance framework used for security and compliance
105
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
106
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
107
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
108
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Control catalog within the RMF that provides a set of security and
privacy controls
■ ISO 27001 Series
● International standard for managing information security,
providing a framework for risk management
■ HITRUST (Health Information Trust Alliance)
● Common security framework for health information
○ Control Selection Process
■ Selection within the RMF
● Selection is Step 3 in the RMF after preparing and categorizing the
data
● Controls must align with organizational and regulatory policies.
● Controls are selected based on the level of risk and the protection
needs of the information
● Over-securing public systems is avoided; sensitive systems receive
appropriate controls
■ Control Baselines
● Frameworks
○ E.g., NIST, ISO, HITRUST often provide a baseline of
minimum controls
● Baselines are determined based on the system's sensitivity, such
as co-mingled data (sensitive and public data on the same system)
● Controls are designed to protect at the highest level of sensitivity
○ Key Considerations for Selecting Controls
■ Risk Analysis
109
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
110
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ NIST SP 800-37
● Provides the Risk Management Framework (RMF) for information
systems
■ NIST SP 800-53
● The control catalog within the RMF, offering a range of security
and privacy controls
■ Control Baseline
● The minimum set of controls needed to safeguard the system,
selected from a framework like NIST or ISO
■ Scoping
● Process of determining which controls apply to a specific system
■ Tailoring
● Adding or removing controls based on system-specific
requirements
■ Deming Cycle (PDCA)
● Continuous improvement cycle for planning, implementing,
assessing, and acting on security controls
111
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ DRM ensures that digital content can only be accessed when the device
has the appropriate decryption key
○ DRM Methods
■ HDCP (High-Bandwidth Digital Content Protection)
● Protects digital displays like HDMI or DVI but has been
compromised and is not widely used anymore
■ AACS (Advanced Access Content System)
● Protects Blu-ray discs, HD DVDs, and other media discs
■ ADEPT (Adobe Digital Experience Protection Technology)
● Used by Adobe to protect e-books, PDFs, and other digital content
■ Blockchain-Based DRM
● Uses cryptography to create immutable (unchangeable) records,
providing a new method for DRM, although not widely adopted
yet
○ Data Loss Prevention (DLP)
■ Blocks unauthorized data exfiltration (egress monitoring)
■ Uses pattern matching to identify and take action against data (based on
classifications like PII, PHI, etc.)
○ Types of DLP
■ Network DLP
● Scans outgoing data on the network to detect and block
unauthorized data leaving the system
■ Endpoint DLP
● Scans local file systems and monitors data leaving individual
endpoints to detect and block unauthorized exfiltration
112
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ DLP Process
● Data must be labeled or classified to be detected by DLP software
● DLP can be configured with policies to address different data
protection needs
● Regular updates are needed for optimal DLP performance
○ Cloud Access Security Broker (CASB)
■ A security policy enforcement point between users and cloud services
■ Functions as a proxy between the user and the cloud, ensuring security
controls are applied to cloud-based assets
■ CASB Functions
● Provides data security, DLP, threat protection, real-time risk
analysis, and URL filtering
● Ensures compliance with security policies and provides threat
intelligence in real-time
● Can be used on-premises or off-premises (local or cloud-based)
■ CASB Capabilities
● Enforces security policies
● Protects data in the cloud
● Detects and prevents threats with real-time monitoring and alerts.
● Integrates services to evaluate web traffic, enforce DLP, and
provide granular threat protection
○ Important Terms
■ DRM
● Technology used to protect digital content from unauthorized
access and copying
113
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ HDCP
● Protection for digital display interfaces (e.g., HDMI) (now
obsolete)
■ AACS
● Protects Blu-rays, HD DVDs, and similar media
■ ADEPT
● Adobe's DRM system for protecting digital content like e-books
and PDFs
■ DLP
● Software and techniques designed to prevent the unauthorized
transfer of sensitive data
■ CASB
● A security proxy that ensures proper security controls between
users and cloud-based services
● Data Retention Requirements
○ Data Retention Overview
■ Data retention involves maintaining and protecting data throughout its
entire lifecycle (creation, classification, storage, use, archiving, and
destruction)
■ Organizational policy and regulatory requirements govern how long data
should be retained and how it must be protected
■ Data must be retained securely and only for as long as it is necessary
according to organizational policy and legal or regulatory requirements
○ Regulations Governing Data Retention
■ HIPAA
114
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
115
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
116
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Asset Retention
■ Assets
● E.g., servers, hardware, software) have finite lifespans
● Regularly monitor for end-of-life and end-of-support statuses
● Replace hardware based on mean time to failure to avoid
availability issues
● When assets are no longer supported, ensure they are replaced or
removed to avoid security vulnerabilities
○ Retention and Legal Proceedings
■ If data is involved in legal or security investigations, it must be retained
until the case is concluded
■ Chain of custody must be maintained to ensure data integrity in legal
contexts.
○ Important Terms
■ Data Retention
● Maintaining data securely for a specified period, as required by
policies or regulations
■ End-of-Life (EOL)
● The point at which an asset (hardware, software) is no longer
usable or supported
■ End-of-Support (EOS)
● When a vendor no longer provides updates or support for an asset
■ Chain of Custody
● A documented process that tracks who has access to data,
ensuring integrity in legal proceedings
117
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
118
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
119
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
120
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
121
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Objectives
● 3.5 - Assess and mitigate vulnerabilities in security architectures, designs, and solutions
● 3.1 - Implement and manage secure design principles
● 5.4 - Implement and manage authorization mechanisms
● 3.4 - Understand security capabilities of information systems
● 3.2 - Understand fundamental concepts of security models
122
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
123
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
124
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
125
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
126
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
127
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Zero Trust
● No implicit trust, continuous authentication, authorization, and
least privilege enforced per request
○ NIST SP 800-207 Zero Trust Principles
■ All data sources and computing services are resources
● Treats all assets as resources, requiring verification for access
■ Secure communication regardless of network location
● Encrypts all network traffic, even within internal, traditionally
trusted networks
■ Access on a per-session basis
● Authenticates and authorizes for each individual access attempt
■ Dynamic policies based on behavior and environment
● Considers factors like location, device state, and activity to adapt
access controls dynamically
■ Continuous monitoring of security posture
● Regularly evaluates security measures and entity compliance
within the system
■ Strictly enforced, real-time authentication and authorization
● Applies updated policies immediately for consistent access control
■ Comprehensive data collection and analysis
● Aggregates system logs, network data, and user behavior to
enhance security and detect patterns
○ Zero Trust in Network Design
■ No implicit trust of private networks
128
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
129
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
130
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
131
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Ensure users have access to their data, can modify it, and can
consent to its use, while protecting it as personal and sensitive
information
● System Security Capabilities
○ System Security Capabilities Overview
■ Capabilities are system features that enforce technical or logical security
controls
■ Built into various devices, these capabilities help maintain secure
processes and limit unauthorized access
○ Memory Protection
■ Memory stores data for active processes on computing devices
■ Goal
● Prevent processes in memory from interacting with each other to
avoid data leaks and breaches
● Allows multiple processes at different security levels to run
independently in main memory
○ Virtualization
■ Emulation of physical devices through software, commonly applied to
networks, servers, and workstations
■ Enables multiple computing environments on a single hardware
component
■ Benefits
● Centralized control, scalability, easy recovery, and useful in
malware analysis within sandboxed environments
■ Common tools
132
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
133
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
134
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
135
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
136
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Ensures actions of one user cannot interfere with another user’s actions,
maintaining isolation
■ Focused on separation between different security levels, such as private
and public domains
■ Changes made by one entity do not affect another, especially across
different security classifications
○ Access Control Matrix
■ Utilizes a table-like structure where subjects are mapped to objects with
specific access rights
■ Columns
● Objects
○ E.g., files, directories
■ Rows
● Subjects
○ E.g., users, processes
■ Permissions granted per cell
● E.g., Read, Write, Execute
■ Provides a flexible yet straightforward method to manage access control
across multiple levels
○ Information Flow Model
■ Controls how information flows between different security levels,
focusing on preventing unauthorized transfer
■ Two Key Models
● Bell-LaPadula Model
○ Focused on confidentiality
137
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Biba Model
○ Focused on integrity
○ Bell-LaPadula Model
■ Designed for confidentiality, especially in military or government
environments
■ State Machine Model
● Monitors data flow between security classifications
■ Properties
● Simple Security Rule
○ No read up (subjects cannot read data above their
classification level)
● Star Property Rule
○ No write down (subjects cannot write data to a lower
classification level)
○ Ensures sensitive information does not flow to
unauthorized levels
○ Biba Model
■ Prioritizes integrity, ensuring the accuracy and consistency of data
■ Based on the Lattice Model
■ Properties
● Simple Integrity Axiom
○ No read down (high-integrity users cannot read
lower-integrity data)
● Star Integrity Axiom
138
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
139
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
140
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Create Object
○ Subjects can create new objects
● Delete Object
○ Subjects can delete existing objects
● Read Object
○ Subjects can read objects
● Grant Access
○ Subjects can grant others access to objects
● Delete Access
○ Subjects can revoke access to objects
● Transfer Access
○ Subjects can transfer access rights to others
● Create Subject
○ Subjects can create other subjects
● Delete Subject
○ Subjects can delete other subjects
○ Sutherland Model
■ Also called the Non-Deducibility Model
■ Aims to prevent information leaks through covert channels by controlling
information flow
■ Combines the Information Flow Model and State Machine Model
■ Defines system states and transitions to prevent unauthorized inferences
about data
141
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
142
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
143
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
144
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
145
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
146
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
147
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Polyinstantiation
● Purpose
○ Enables multiple instances of the same primary key with
different data sensitivity levels
● Use
○ Provides different views of data based on access level
■ E.g., public vs. private data
○ Data Collection and Analysis in Databases
■ Data Warehouse
● Central storage for large volumes of data collected from multiple
databases
■ Use
● Allows for data mining and analytics
■ Data Mining
● Analyzing data to find patterns and connections
■ Purpose
● Often used for marketing, sales, and security analysis
■ Data Analytics
■ Analyzing raw data to extract actionable insights
■ Big Data
● Extremely large datasets requiring advanced processing and
analytics
● Solution
○ Often managed through parallel data processing systems
○ ACID Framework for Database Transactions
148
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Atomicity
● Transactions are all-or-nothing. Either fully complete or fail
entirely
■ Consistency
● Data must comply with defined rules and constraints
■ Isolation
● Ensures transactions are separate, preventing interference
■ Durability
● Completed transactions are permanently recorded, even after a
system failure
○ Database Security Best Practices
■ Enable Only Essential Components
● Disable all unnecessary applications, services, and protocols
■ Account Management
● Remove unneeded accounts
● Change default passwords on database management systems
■ Set Permissions
● Apply strict permissions to database directories, data stores, log
files, and certificates
● Common Criteria
○ Common Criteria
■ An internationally recognized standard for IT security evaluation,
providing a structured approach for evaluating the security features of
products and systems
149
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Purpose
■ Evaluate and certify security features for international recognition
■ Standard
● Established under ISO/IEC 15408
○ Components of Common Criteria
■ Part 1
● Introduction and General Model
○ Outlines basic concepts of security evaluations
■ Part 2
● Security Functional Requirements (SFR)
○ Details the specific security functions a product or system
must have
■ Part 3
● Security Assurance Requirements (SAR)
○ Defines the evaluation assurance levels (EALs), providing
confidence levels in security functionality
○ Key Terms
■ Target of Evaluation (TOE)
● The specific product, system, or component being evaluated
○ E.g., software, firmware, or hardware
■ Protection Profile (PP)
● General security requirements and objectives a product should
meet
■ Strict Conformance
● All security requirements are mandatory
150
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Demonstrable Conformance
● Demonstrates select security capabilities; not all requirements are
mandatory
■ Security Target (ST)
● High-level security requirements and objectives for the TOE,
specifying the desired protection outcomes
○ Evaluation Assurance Levels (EALs)
■ Levels measure assurance of security functionality, from basic (EAL1) to
highly secure (EAL7)
■ EAL1 - Functionally Tested
■ Assurance
○ Basic functionality confirmed; no extensive security focus.
■ EAL2 - Structurally Tested
● Assurance
○ Full security target testing; documentation and commercial
standard adherence
■ EAL3 - Methodically Tested and Checked
● Assurance
○ Comprehensive security assurance with independent
review
■ EAL4 - Methodically Designed, Tested, and Reviewed
● Assurance
○ Commonly used for OSes and applications, moderate to
high assurance with independent evaluation
● Note
151
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
152
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Parts 1-3 of Common Criteria, including TOE, PP, ST, and their
purposes
■ EALs Focus
● Concentrate on EAL levels 3-5, as these are most applicable to
commonly used systems
■ Limitations
● Recognize the flexibility manufacturers have in shaping
evaluations and the Common Criteria’s exclusion of data and
business continuity protections
153
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
154
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Purpose
○ Connects to sensors or controllers for data collection,
often using radio frequency
● Also Known As
○ Remote telemetry unit
■ Human-Machine Interface (HMI)
● Purpose
○ Interface that allows human operators to interact with and
control SCADA systems
■ Distributed Network Protocol (DNP3)
● Type
○ Open-standard protocol
● Purpose
○ Used to connect RTUs with SCADA Master Control Stations
(MCS) across sectors like energy and transportation
■ Intelligent Electronic Device (IED)
● Purpose
○ Collects data to send to RTUs, which then send the data to
MCS
○ Vulnerabilities in ICS
■ ICS are particularly vulnerable due to outdated technology and minimal
built-in security
● Legacy Systems
○ Older software often lacks built-in security, making
updates and patches challenging
155
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
156
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Familiarize with SCADA components (RTU, HMI, DNP3, IED) and how data
is transmitted
■ Recognize vulnerabilities specific to ICS and their potential impacts on
critical infrastructure
157
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
158
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Internet of Things
○ Internet of Things (IoT)
■ IoT encompasses any device or technology capable of communication
over the Internet
■ Examples include home appliances like refrigerators, dishwashers,
washing machines, and dryers, as well as office and industrial devices like
cameras, sensors, and medical devices
○ Purpose of IoT
■ Combines operational technology (OT) with information technology (IT)
■ Integrates diverse devices such as lights, cameras, sensors, and
appliances, making them internet-capable
○ IoT Capabilities and Risks
159
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
160
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
161
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
162
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
163
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
164
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Example
● A programmable logic controller in industrial control automates
tasks like activating buttons or adjusting controls
○ Risks and Vulnerabilities of Embedded Systems
■ Simplistic Firmware
● Minimal complexity, easily manipulated
● Designed primarily for functionality and automation, not security
● Vulnerable to unauthorized control over components like
processors, actuators, and valves
● Safety and security become critical due to potential
life-threatening implications
● Example
○ In medical devices, a manipulated embedded system could
lead to serious harm to patients
○ Common Attacks on Embedded Systems
■ User Interface Attack
● Brute force or input manipulation to gain administrative or
privileged access
■ Physical Attack
● Manipulate inputs or remove the system from the device entirely
■ Sensor Attack
● Tricks the system into sensing an action or input that wasn’t
actually performed
● Example
165
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
166
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● High-Performance Computing
○ High Performance Computing Systems (HPC)
■ Supercomputers that operate in parallel to solve complex mathematical
and scientific problems
■ Typically designed for dedicated functions and high-volume data
processing tasks
■ Utilized in advanced fields such as big data, data analytics, data mining,
cryptocurrency, and medical imaging
167
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
168
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Geographical Dispersion
● Users are often distributed globally, complicating identity and
access management
■ Confidentiality Risks
● Open research and development activities create challenges with
data confidentiality and unauthorized code use
■ Compliance Issues
● Import/export laws and regulatory factors may affect data
handling and access control
■ Unreviewed Code in R&D
● Experimental code from research may cause system issues, such
as denial-of-service attacks
○ Security Measures for HPC
■ Threat Modeling
● Essential to identify potential threats and vulnerabilities specific
to HPC environments
■ Data Management
● Data isolation and segmentation necessary due to vast amounts of
sensitive data
■ Hardware Security Features
● Implement security features on HPC servers to enforce trusted
code execution
■ Multi-Factor Authentication (MFA)
● Enhances identity verification, especially for geographically
dispersed users
169
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
170
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
171
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
172
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
173
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
174
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
175
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ VM Escaping
● Risk in Type 2 environments where a user can bypass the guest
OS, potentially accessing and controlling the host OS
○ Protection Mechanisms
■ Host critical functions on physical machines where feasible
■ Maintain updated virtual software and conduct regular monitoring of the
virtual environment for threats
● Containerization
○ Purpose of Containerization
■ Provides a software-based representation of packaged files, libraries, and
dependencies for hosted applications
■ Enables OS-level virtualization, isolating applications within containers
that use the resources of the host OS through a container engine
■ Commonly used in microservices architectures for efficient resource
sharing and deployment
○ Benefits of Containers
■ Consistent configuration for speed, efficiency, flexibility, and scalability
■ Isolation from other infrastructure, making them lightweight, fast,
portable, and minimally impactful on OS resources
■ Supports reusable images for portability across various environments
○ Containers vs. Virtual Machines
■ Containers
● Use a container engine for OS-level virtualization
● Share the host OS resources and rely on the host's configuration,
increasing efficiency
176
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Example
○ Docker, AWS Elastic Container Service (ECS), Google
Kubernetes Engine
○ Virtual Machines
■ Use a hypervisor to provide isolated resources to each VM instance,
requiring an OS per VM
■ Higher resource demands due to separate OS installations for each VM
○ Key Containerization Components
■ Container Engine
● Facilitates container operation, allowing apps to share OS
resources while managing isolation
■ Common Container Software
● Docker (popular containerization platform)
● Kubernetes (container orchestration)
● ECS (AWS’s container service)
○ Containerization Risks
■ Vulnerabilities in hosted applications, including malware or unprotected
embedded data
■ Risks from inter-container communications and
identification/authentication weaknesses
■ Inherited vulnerabilities from the host OS or engine, increasing
susceptibility to attacks
■ Unpatched software and outdated configurations leading to security
issues
○ Security Considerations for Containers
177
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
178
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
179
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
180
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
181
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
182
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
183
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Customer Responsibilities
○ Applications, identity and access management, data
encryption as needed
● CSP Responsibilities
○ OS, networking, platform security
■ Software as a Service (SaaS)
● Customer Responsibilities
○ Data security, access control
● CSP Responsibilities
○ Entire stack, from application down to physical
infrastructure
○ Types of Service Level Agreements (SLAs)
■ Customer-Level SLA
● Agreement covering services used by a single customer
● Common for customized or proprietary cloud services
■ Service-Level SLA
● Agreement detailing services shared by multiple clients
● Example
○ SLA covering general use of a SaaS product accessible to
multiple customers
○ Exam Focus for Shared Responsibility Model
■ Understanding responsibilities for each service model
● IaaS, PaaS, SaaS
■ Knowing the differences between customer-level SLA and service-level
SLA
184
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
185
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
186
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
187
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
188
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
189
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
190
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Cryptographic Solutions
Objective 3.6: Select and determine cryptographic solutions
● Cryptographic Solutions
○ Cryptographic Solutions
■ Essential for ensuring confidentiality, integrity, and authenticity of data
■ Plays a crucial role in securing communication and data storage
○ Foundational Cryptography Concepts
■ Encryption, decryption, and goals of cryptography
● Confidentiality, integrity, authentication, non-repudiation
○ Cryptographic Methods
■ Symmetric and asymmetric encryption, hashing, digital signatures
■ Application in real-world scenarios to mitigate risks like data breaches
and unauthorized access
○ Symmetric Ciphers
■ Use the same key for both encryption and decryption
■ Discussion on strengths, weaknesses, and appropriate use cases
○ Asymmetric Ciphers (Public-Key Cryptography)
■ Uses two keys
● A public key for encryption and a private key for decryption
■ Used for secure key exchange, digital signatures, and authentication
○ Quantum Cryptography
■ Adaptation of cryptography in the context of quantum computing
■ Basics of how quantum cryptography works and its implications
191
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Hash Functions
■ Use of hashing to verify data integrity
■ Common hash functions like Message Digest and Secure Hash Algorithm
○ Cryptographic Key Management
■ Importance of managing cryptographic keys securely
■ Key lifecycle management, differences between manual and automated
key management
○ Digital Signatures and Certificates
■ Use of digital signatures to verify authenticity and integrity of data
■ Role of certificates and certificate authorities in establishing trust
○ Public Key Infrastructure (PKI)
■ Framework for managing digital certificates and public keys
■ Components include certificates, certificate authorities, certificate
revocation lists (CRLs)
● Understanding Cryptography
○ Purpose of Cryptography
■ Protect sensitive information in three data states
● Data in use, data in transit, and data at rest
■ Guarantees confidentiality and integrity
■ Does not provide availability
■ Provides additional services such as authentication and non-repudiation
○ Non-repudiation
■ Ensures that actions or data origination cannot be denied by a subject
■ Provides undeniable proof that data actions were performed by a specific
entity
192
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
193
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
194
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Cryptographic Methods
○ Symmetric Cryptography
■ Uses a single shared key for both encryption and decryption
■ Known as secret key cryptography and is commonly used today
■ Example
● Accessing a wireless network with a pre-shared key like a
passphrase or password
■ Encrypts and decrypts messages using the same key for both plaintext
and ciphertext
○ Types of Symmetric Ciphers
■ Block Cipher
● Encrypts specified blocks or chunks of data, typically in 64 or
128-bit blocks
● Uses rounds of encryption for each block
■ Stream Cipher
195
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
196
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
197
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
198
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Modes
● Triple E
○ Encrypts data three times
● Triple EDE
○ Encrypts, decrypts, and re-encrypts data
● Triple E2 and EDE2
○ Uses two keys (first and third round with the same key,
second with a different key)
● Triple E3 and EDE3
○ Uses three different encryption keys
○ International Data Encryption Algorithm (IDEA)
■ Operates on 64-bit blocks and uses a 128-bit key
■ Divides the key into 52 subkeys for encryption operations
■ Supports all five operating modes
■ Commonly used in Pretty Good Privacy (PGP)
○ Blowfish
■ 64-bit block cipher designed as a DES replacement
■ Key sizes range from 32 to 448 bits with 16 encryption rounds
■ Open-source, freely accessible algorithm widely used globally
○ Advanced Encryption Standard (AES)
■ Based on the Rijndael cipher and developed by NIST in 2001
■ Supports key and block sizes of 128, 192, and 256 bits
● 128-bit
○ 10 rounds of encryption
● 192-bit
199
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ 12 rounds of encryption
● 256-bit
○ 14 rounds of encryption
■ Mandated by FIPS 197 for U.S. government use for data protection above
unclassified levels
■ Approved for encryption of sensitive data up to top secret levels in the
U.S. government
○ Rivest Ciphers (RC or ARC)
■ RC2
● 64-bit block cipher with 8 to 1024-bit keys and 16 encryption
rounds
■ RC4
● Stream cipher with variable key lengths (48 to 2048 bits) and one
encryption round
● Originally a trade secret algorithm, leaked in the mid-1990s
■ RC5
● Supports 32, 64, or 128-bit blocks with keys from 0 to 2040 bits;
recommended key strength is 64 bits
■ RC6
● Uses a 128-bit block size and key lengths of 128, 192, and 256 bits;
128-bit key recommended
○ Key Takeaways
■ Familiarize with DES, 3DES, IDEA, Blowfish, AES, and Rivest ciphers
■ Know key sizes, block sizes, and number of encryption rounds where
specified
200
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Recognize which algorithms and modes are outdated and discouraged for
use
● Asymmetric Ciphers
○ Asymmetric Key Cryptography Overview
■ Utilizes a public and private key pair for encryption and decryption
■ Also known as public key cryptography
■ The private key is always protected and not shared
○ Diffie-Hellman Key Exchange
■ An asymmetric cipher that enables secure key exchange
■ Complements symmetric ciphers by securely sharing symmetric keys
■ Does not provide encryption, only facilitates key exchange
■ Uses forward secrecy
● Generates unique session keys for each session, discarding keys
after use
○ Mathematics
■ Uses two prime numbers to generate private keys for both ends
■ Private keys are used to create public keys, which are then exchanged
■ Public keys are used to create a shared secret key for secure sessions
○ Rivest-Shamir-Adleman (RSA)
■ Public key algorithm that enables key encryption, decryption,
authentication, and digital signatures
■ Created in 1977, renowned for its secure nature
■ Strength relies on the use of two large prime numbers (non-discrete
logarithms)
■ RSA remains unbroken and secure due to its use of prime numbers
201
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Quantum Cryptography
○ Overview of Quantum Cryptography
■ Based on the theory of quantum computing, applying quantum
mechanics to perform complex computations
202
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
203
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
204
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
205
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● MD5
○ 128-bit digest, 512-bit blocks, performs three rounds of
processing for enhanced security
○ HAVAL (Hash of Variable Length)
■ Based on MD5 but uses 1024-bit blocks instead of 512-bit
■ Digest can vary between 128, 160, 192, 224, or 256 bits
○ RIPEMD (Race Integrity Primitives Evaluation Message Digest)
■ Created as an alternative to SHA and MD for additional security
■ RIPEMD-128
● 128-bit digest
■ RIPEMD-160
● 160-bit digest, improved version for stronger hashing
○ Key Terms
■ Message Digest
● The output of a hash function, providing a unique representation
of input data
■ Integrity Verification
● Detects changes by comparing hash values before and after any
data manipulation
■ Forward Secrecy
● Used in cryptographic algorithms like Diffie-Hellman to ensure
keys are unique to each session and cannot be reused
206
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
207
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
208
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
209
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
210
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
211
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
212
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Step 3
● CA verifies identity (or passes to RA for verification)
■ Step 4
● CA creates a digital signature using the subject’s public key and
CA’s private key
■ Step 5
● PKI certificate created in PKCS #10 format and issued to subject
○ Certificate Validation and Verification
■ Certificate must be validated by the CA each time it is used to ensure it
remains current and not revoked
■ Methods of Verification
● Certificate Revocation List (CRL)
● Lists all certificates revoked by the CA
● Downloaded and kept offline; must be updated regularly
■ Online Certificate Status Protocol (OCSP)
● Real-time verification through OCSP client and OCSP responder on
the CA
213
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Cryptanalytic Attacks
Objectives:
● 3.5 - Assess and mitigate the vulnerabilities of security architectures, designs, and
solution elements
● 3.7 - Understand methods of cryptanalytic attacks
● Cryptanalytic Attacks
○ Cryptanalytic Attacks
■ Exploits vulnerabilities within cryptographic systems
■ Essential knowledge for information security professionals and the CISSP
exam
○ Vulnerabilities in Cryptographic Systems
■ Weaknesses that can compromise the security of cryptographic systems
■ Examples include improper key generation and weak random number
generators
○ Types of Cryptanalytic Attacks
■ Brute-force Attacks
● Systematically trying every possible key until the correct one is
found
■ Known Plaintext Attacks
● Attacker has access to both plaintext and ciphertext, which can
help deduce the encryption key
214
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Ciphertext-only Attacks
● Attacker attempts to decrypt information with only access to
encrypted data
■ Implementation Attacks
● Exploit weaknesses in how encryption is implemented, not in the
algorithm itself
○ Side-channel and Timing Attacks
■ Target the environment around the encryption process, bypassing
traditional cryptographic defenses
● Vulnerabilities in Cryptographic Systems
○ General Cryptography Risks
■ Inherent Threats
● Present throughout the encryption-decryption process
■ Plaintext, Cipher, and Ciphertext Risks
● Weak ciphers and algorithms make plaintext easier to compromise
● Short, non-random keys increase vulnerability
● Attacks on ciphertext can lead to plaintext compromise
■ Algorithm Choice
● Use industry-standard, open algorithms rigorously tested by
experts
○ Key Risks
■ Algorithm Aging
● Advances in processing power make old algorithms breakable
■ Moore’s Law
215
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
216
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
217
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
218
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
219
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
220
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
221
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
222
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Replay Attack
● Intercepts an encrypted message and reuses it to gain
unauthorized access
● Countermeasure
○ Use of timestamps, expiration periods, or timeouts
■ Side Channel Attack
● Targets the operational characteristics of the cryptographic
process, like power consumption or timing
● Timing Attack
○ Analyzes the time required to complete cryptographic
operations, revealing clues about the algorithm used
○ Attacking the User
■ Goal
● Exploit weaknesses in the human element of the cryptographic
process
○ Key Techniques
■ Man-in-the-Middle Attack
● Places the attacker between two parties, intercepting and possibly
altering communications
● Tools
○ Protocol analyzers or network sniffers to capture sensitive
data, like keys or plaintext
■ Ransomware Attack
● Encrypts the victim's data and demands payment to release the
key
223
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
224
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Physical Security
Objectives:
● Physical Security
○ Physical Security
■ First line of defense in protecting sensitive data, systems, and personnel
■ Essential for both CISSP exam and real-world security operations
○ Site Design Principles
■ Focus on the geographic location, layout, and proximity to hazards
■ Impact of surrounding environment on physical security
○ Facility Design
■ Architectural decisions enhancing security, including placement of walls,
doors, and windows
○ Facility Security Controls
■ Physical barriers (fences, gates, locks) and advanced controls (biometric
readers, security badges)
○ Facility Infrastructure Security
■ Protection of key facility systems
● Power, heating, cooling, telecommunications
○ Fire Prevention, Detection, and Suppression
225
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
226
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
227
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
228
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Components
● Incorporate administrative, technical, and logical controls to
ensure physical security aligned with the organization’s needs
○ Types of Physical Security Controls
■ Deterrence
● Discourages potential security violations
■ Fencing
● 3-4 feet
○ Deters casual passersby
● 6-7 feet
○ Deters most intruders
● 8+ feet with barbed wire
○ Maximum deterrence for determined intruders
● Lighting
○ Use two-foot candle power in critical areas for clear
visibility
● Landscaping
○ Use natural barriers like thorn bushes or water features
(similar to a moat) to create obstacles
● Denial
○ Prevents access to restricted areas
● Turnstiles
○ Limits entry to one person at a time, authenticates identity
● Mantraps
229
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
230
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Delay
● Slows down potential intruders
● Fence Enhancements
○ Barbed wire and other modifications to slow intruder
access
● Locks
○ Can be bypassed by methods like lock picking, skeleton
keys, or shimming
● Bollards
○ Prevent vehicles from ramming into sensitive areas
■ Decision-Making
● Utilizes physical access control systems to monitor and respond to
security incidents
● Physical Access Control System (PACS)
○ Integrates controls to allow real-time situational
awareness
● FIPS Publication 201
○ Governs PACS requirements
● ID Badges
○ Personal Identity Verification (PIV) cards or Common
Access Cards (CAC) authenticate users
○ Crime Prevention Through Environmental Design (CPTED)
■ Uses environmental design to influence human behavior and deter crime.
■ Applications
● Natural Access Control
231
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
232
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
233
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
234
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
235
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Deterrence
● Prevents potential security breaches through visible security
measures
● Examples
○ Fencing, lighting, signage, CCTV cameras
■ Denial
● Restricts access to unauthorized individuals.
● Examples
○ Locked doors, turnstiles, mantraps, limited entry points
■ Detection
● Identifies unauthorized access or potential breaches
● Examples
○ Cameras, intrusion sensors, access control logs,
environmental monitors (for temperature and humidity)
■ Delay
● Slows down potential intruders, giving security personnel time to
respond
● Examples
○ Barbed wire on fences, locked doors, bollards
■ Response
● Actions taken to address detected security threats
● Examples
○ Security guards, automated alerts, emergency plans
○ Environmental Controls
■ Temperature
236
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● 60-75°F (15-23°C)
● Humidity
○ 40-60% to prevent static electricity and corrosion
● Ventilation
○ Ensure separate HVAC for server rooms/data centers from
the rest of the facility
○ Key Exam Points
■ Understand
● The purpose and protection needs of wiring closets, server rooms,
data centers, and storage areas
■ Recognize
● Types of physical security controls (deterrence, denial, detection,
delay, response)
■ Apply
● Environmental controls effectively in facility design to maintain
equipment integrity and availability
○ Facility Security Controls ensure secure design and operation of wiring closets,
server rooms, and data centers, prioritizing access control, environmental
controls, and structured response measures
237
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
238
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
239
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
240
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Transient
● Temporary noise on the line
■ EMI (Electromagnetic Interference)
● Often causes noise and transient issues
■ RFI (Radio Frequency Interference)
● Comes from lights and electrical cables
○ Power Backup and Redundancy
■ Uninterruptible Power Supplies (UPS)
● Provides uninterrupted power for a short duration
■ Double Conversion UPS
● Stores power in a battery, providing consistent, clean power to
devices
■ Line Interactive UPS
● Contains surge protection and voltage regulation between power
source and battery
■ Generators
● Motor-operated machines creating large amounts of electricity for
backup
● Require fuel, maintenance, and regular operation for reliability
241
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
242
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
243
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
244
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
245
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Delay Controls
● Slow down potential security violations
■ Determine Controls
● Find the cause of security violations
■ Decision Controls
● Address the security violations
■ Recovery Controls
● Enable recovery from security violations
○ Facility Security Controls
■ Perimeter Controls
● Track and control access to the exterior facility areas
● Examples
○ Fences, guard patrols, security cameras
■ Internal Security Controls
● Track and control access to restricted facility areas
● Examples
○ Turnstiles, mantraps, access control systems
○ Restricted Areas
■ Designated to allow only authorized access
■ Protect sensitive data, operations, or personnel
■ Examples
● Security operation centers (SOC), network operation centers
(NOC), R&D departments
○ Perimeter Security Examples
■ Fencing
246
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
247
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
248
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
249
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Network Components
Objectives:
● Network Components
○ Network Components
■ Essential building blocks of network environments, including physical
hardware, infrastructure, and media
■ Crucial for CISSP exam and security operations
○ Hardware Operations
■ Covers physical devices like routers, switches, firewalls, and servers
■ Focus on device functions, integration into network architectures, and
security implications
○ Network Infrastructure Operations
■ Involves redundancy, high availability, vendor support, and end-of-life
issues
■ Critical for minimizing downtime and maintaining continuous network
security
○ Transmission Media
■ Selection based on network topology, data transfer speeds, and physical
device locations
■ Includes types like coaxial cable, twisted pair cable, and fiber optic cables
250
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Hardware Operations
○ Repeater
■ Used to re-energize electrical signals to increase transmission distance
■ Also referred to as an amplifier or concentrator
■ Found integrated in modern network devices like switches, routers,
firewalls
○ Modem
■ Modulates and demodulates analog carrier signals for data processing
■ Facilitates communication between digital and analog systems, such as in
DSL systems
○ Hub
■ Connects multiple computers to the same network segment without
routing or addressing
■ Operates by flooding; transmits all incoming traffic out all other ports
○ Bridge
251
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
252
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
253
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
254
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
255
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Bus Topology
● Central backbone cable connects all devices
■ Star Topology
● Devices connected through a central network device (common in
small networks)
■ Mesh Topology
● High availability setup, each device is connected to multiple
others
○ Network Types
■ Wide Area Network (WAN)
● Spans large geographical areas
○ E.g., the internet
■ Metropolitan Area Network (MAN)
● Covers a city or metropolitan area
○ E.g., city-wide Wi-Fi
■ Local Area Network (LAN)
● Small geographical area
○ E.g., office or home network
■ Personal Area Network (PAN)
● Limited to an individual’s immediate area, e.g., mobile device
hotspot or Bluetooth
○ Data Rates
■ Bit
● Binary unit of information
■ Byte
256
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● 8 bits
■ Megabit (Mb)
● 1,000 bits
■ Gigabit (Gb)
● 1,000 megabits
○ Types of Communications
■ Baseband
● Digital signals on a single frequency (used in Ethernet)
■ Broadband
● Analog signals on multiple frequencies
○ E.g., DSL
○ Ethernet Technology
■ Based on IEEE 802.3 standard
■ OSI Layer 2 protocol using frames for communication
■ Supports full duplex communication
■ Uses twisted pair cabling
○ Ethernet Components
■ Data Terminal Equipment (DTE)
● Endpoints in Ethernet technology
○ E.g., computers
■ Data Communication Equipment (DCE)
● Transfers Ethernet frames
○ E.g., Layer 2 switches
○ Ethernet Data Rates
■ Fast Ethernet
257
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● 100 Mbps
■ Gigabit Ethernet
● 1,000 Mbps (1 Gbps)
■ 10 Gig Ethernet (10 Gig E)
● 10 Gbps
258
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
259
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Network Monitoring
○ Network Monitoring
■ Practice and techniques to identify, track, and analyze network
performance and operations
■ Utilized to manage, troubleshoot, and ensure health and status of
network infrastructure
○ Purposes of Network Monitoring
■ Focuses on network performance to enhance security
■ Detects anomalies, threats such as DDoS attacks, malware propagation,
and unauthorized access
○ Monitoring Protocols
■ Simple Network Management Protocol (SNMP)
■ Monitors system status and configuration of devices like switches,
printers, and computers
○ Internet Control Message Protocol (ICMP)
260
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
261
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Action
● Responding to issues detected to mitigate potential impacts or
rectify anomalies
○ Key Benefits of Network Monitoring
■ Enhances the ability to respond to network issues and maintain
operational continuity
■ Supports security by identifying potential threats and enabling proactive
responses
262
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Networking Concepts
Objectives:
● Networking Concepts
○ Networking Concepts
■ Fundamental for secure and reliable communication across networks
■ Critical component of the CISSP exam
○ TCP/IP and OSI Models
■ Frameworks that explain how communications occur across networks
■ TCP/IP and OSI layers help in segmenting network processes and applying
security measures
○ IP Networking
■ Involves IP addressing and subnetting
■ Essential for organizing how devices communicate within networks
○ Local Area Network (LAN) Communications
■ Focuses on networking within a limited area such as a building or campus
■ Critical for defending organizational information systems
○ Communication Protocols
■ Enable devices to exchange data and communicate effectively
■ Knowledge of protocols is essential for securing day-to-day operations
○ Multilayer Protocols
263
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
264
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Service
● Function provided by protocol using a port
○ E.g., FTP for file transfer
○ OSI Model Layers
■ Layer 1 - Physical Layer
● Handles bits, converts frames into bits for physical transmission
● Examples
○ Cabling, wireless signals
■ Layer 2 - Data Link Layer
● Contains hardware source and destination information, like MAC
addresses
○ Sub-layers
■ Logical Link Control (error handling) and MAC
sub-layer (addressing)
■ Layer 3 - Network Layer
● Manages routing and addressing for packet transfer
● Protocols
○ IP, ICMP, OSPF
■ Layer 4 - Transport Layer
● Controls logical connections between computers (TCP -
connection-oriented, UDP - connectionless)
■ Layer 5 - Session Layer
● Establishes, maintains, and terminates communication sessions
■ Layer 6 - Presentation Layer
● Transforms data into standard format
265
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
266
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● IP Networking
○ IP Networking
■ Method of network communication using TCP/IP protocols
■ Facilitates communications over the Internet and intranets
○ Key IP Networking Terms
■ MAC Address
● Physical, permanent address of a device (Layer 2)
267
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ IP Address
● Logical, dynamic address that corresponds to MAC address (Layer
3)
■ Domain Name
● Human-readable address of a device or server
■ Fully Qualified Domain Name (FQDN)
● Complete domain name for specific device within the network
hierarchy
○ Communication Methods
■ Simplex
● One-directional communication
■ Half Duplex
● Bi-directional but not simultaneous
■ Full Duplex
● Bi-directional simultaneous communication (standard today)
○ IP Addressing Overview
■ IPv4
● 32-bit decimal address
○ E.g., 192.168.1.15
● Limited to ~4.3 billion addresses
■ IPv6
● 128-bit hexadecimal address
○ E.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334
● Allows 340 trillion addresses
268
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
269
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● LAN Communications
○ IP Networking Communication Types
■ IP networking allows TCP/IP-based communication
270
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Types of Networks
● Wide Area Network (WAN)
○ Spans large geographical areas
■ E.g., across countries or continents
● Local Area Network (LAN)
○ Limited to a small geographical area; not intended for
long-distance communication
● Metropolitan Area Network (MAN)
○ Covers city-sized areas, often used by city governments
● Personal Area Network (PAN)
○ Limited to an individual’s immediate area
■ E.g., Bluetooth, ZigBee
● Campus Area Network (CAN)
○ Covers large campuses, like universities; LANs within CANs
can connect locally
○ Network Domains
■ Broadcast Domain
● A logical grouping of network devices that receive network
broadcasts
● Broadcasts can be for various purposes, like updates or general
information sharing
■ Collision Domain
● A grouping of devices to reduce data collisions
● Collisions occur when multiple devices send data simultaneously
on the same network segment
271
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
272
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
273
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Communication Protocols
○ Protocol Basics
■ Protocol
● Set of agreed rules for computer communication
■ Unsecure Protocols
● No encryption; all data in plain text
■ Secure Protocols
274
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
275
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
276
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ UDP
● Connectionless, fast transmission without handshake
■ SSL
● Original protocol for secure network communication (replaced by
TLS)
■ TLS
● Secure communications with better security than SSL
○ Layer 3 - Network Layer Protocols
■ IP
● Connectionless routing for network communication
■ ICMP
● Communication status and error messages
○ E.g., PING, Traceroute
■ OSPF
● Dynamic routing protocol for path selection
■ IPSec
● Secure VPN communications using encryption
■ NAT
● Converts private IPs to public IPs for internet communication
○ Layer 2 - Data Link Layer Protocols
■ ARP
● Maps MAC addresses to IP addresses
■ RARP
● Maps IP addresses to MAC addresses
■ L2TP
277
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Multilayer Protocols
○ Multi-Layer Protocols
■ Protocols that span multiple layers of the TCP/IP stack
■ Example
● A protocol that operates at Layer 2 and Layer 3, or Layer 3 and
Layer 4
○ Key Points for Multi-Layer Protocols
■ Protocol Layer Limits
● Not all protocols span multiple layers; some stop at specific layers
■ Example
● IP packets stop at Layer 3 and do not continue beyond that layer
278
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Benefits
● Multi-layer protocols support higher-level OSI model functions
● Efficient processing by network and security components
● Encryption can be applied at different layers for added security
○ Risks
■ Encapsulation Challenges
● If a packet is encrypted, additional information cannot be added
● May bypass switches, routers, and endpoint security if not
designed to detect multi-layer protocols
■ Network Segmentation
● Difficult to identify multi-layer protocol traffic for segmentation at
Layer 3 or Layer 2
● Secure protocols like SSH or HTTPS aid in segmentation, whereas
non-segmentable protocols pose a risk
■ Covert Channels
● Covert channels (storage and timing) can leverage encapsulation
to disguise malicious traffic as legitimate
● These covert channels may bypass detection in security
mechanisms
○ Important Protocol to Know for the Exam
■ DNP3 (Distributed Network Protocol version 3)
● An open standard protocol commonly used in industrial control
systems
● Applications include electric, water, wastewater, transportation,
oil, and gas industries
279
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Primary function
○ Connects remote terminal units to SCADA master control
stations
○ Bottom Line
■ Understand both benefits and risks of multi-layer protocols
■ Familiarize with DNP3 and its role in industrial control systems
● Converged Protocols
○ Converged Protocols
■ Protocols that combine a specialized protocol with a standard protocol
■ Example
● Combining Fibre Channel with Ethernet to create Fibre Channel
over Ethernet (FCoE)
■ Purpose
● Provides specific functions not supported by traditional protocols,
reducing costs by leveraging existing infrastructure rather than
developing new protocols and equipment
○ Key Converged Protocols
■ Fibre Channel over Ethernet (FCoE)
● Allows Fibre Channel communications (used in Storage Area
Networks) over Ethernet
● Reduces infrastructure costs by using Ethernet instead of
specialized Fibre Channel hardware
■ Internet Small Computer System Interface (iSCSI)
280
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
281
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Data Communications
○ Purpose of Secure Data Communications
■ Ensures data protection as it transmits from source to destination
■ Focus on maintaining data integrity and security throughout the
transmission process
○ Key Communication Security Concepts
■ Transparency
● Security mechanisms operate in the background without
impacting user experience
282
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Aim
○ To avoid user frustration while keeping data safe
■ Integrity
● Data remains unaltered or uncorrupted during transmission
● Uses hash functions and checksums to verify data authenticity
upon arrival
■ Transmission Logging and Error Correction
● Enables accountability and error detection in data transmission
● Supports high availability and redundancy
■ Communication Control Implementation
● Understand architecture and data flows
■ Permit by Exception (Whitelisting)
● Allow known, trusted communications and block all others (fail
secure)
■ Deny by Exception (Blacklisting)
● Deny specific communications; requires high maintenance
○ Emanation Security (EMSEC)
■ Protects against signal leaks that could be intercepted by attackers
■ Common with copper, radio, and wireless transmissions
■ Countermeasures
● Faraday Cage
○ Blocks electromagnetic signals using a fully enclosed area
with a metal mesh
● White Noise
○ Generates alternate signals to mask sensitive emanations
283
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Control Zones
○ Specific areas protected by Faraday cages or white noise
for targeted security
○ Port Security
■ Restricts device connections based on configuration policies to prevent
unauthorized access
■ MAC Filtering
● Configures switches to permit only authorized MAC addresses on
the network
● Used in both wired and wireless networks
■ Secure Protocols
● Preferred over insecure ones to ensure safe communication
○ E.g., SSH instead of Telnet, HTTPS instead of HTTP
■ Circuit Encryption
● Link Encryption
○ Protects the entire communication channel (all content in
tunnel is encrypted)
● End-to-End Encryption
○ Encrypts data only, leaving header information (e.g., IP
addresses) unencrypted for routing
○ Virtual Private Network (VPN) Encryption Modes
■ Link Encryption (Tunnel Mode)
● Encrypts all data between two points in the communication path,
such as between VPN concentrators
● Risk
284
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Virualized Networks
○ Purpose of Virtualized Networks
■ Virtualized networks create a software-based representation of physical
network components or services
■ Enable virtualization of routers, switches, firewalls, proxies, gateways,
load balancers, etc.
○ Virtual Local Area Networks (VLANs)
■ Software-created LAN segments for segmentation and isolation
■ Implemented using 802.1Q Tagging (Q Tagging/Q Trunking)
■ Open standard for tagging Ethernet frames, enabling VLAN management
by routers
285
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
286
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Infrastructure Layer
○ Provides network infrastructure and data forwarding
● Control Layer
○ Manages data flow between application and infrastructure
layers
● Application Layer
○ Hosts services and applications
■ Communication Directions
● Northbound and Southbound
○ Ingress (northbound) and egress (southbound)
● East-West
○ Lateral movement across networks
○ Software-Defined Everything (SDX)
■ Virtualizes various components, enabling hardware-independent systems
■ Examples of SDX include containerization, serverless computing,
infrastructure as code, and security as code
○ Virtual Desktop Infrastructure (VDI)
■ Centralized hosting of virtual machines accessible by users remotely
■ Examples
● VMware Horizon, Amazon WorkSpaces
○ Virtual Mobile Infrastructure (VMI)
■ Centralized hosting of mobile operating systems, accessed remotely
(common in BYOD environments)
■ Example
● Parallels RAS (Remote Application Server)
287
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Bottom Line
■ Understand the role of virtualized networks, VLANs, PVLANs, and VLAN
hopping
■ Know the fundamentals of SDN, SDX, VDI, and VMI
288
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Network Architectures
289
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
290
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
291
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
292
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Be aware of the security risks associated with SDN and the best practices
to mitigate them
293
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
294
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Resources
■ RapidAPI Hub
● Repository for numerous APIs available for integration
○ Exam Focus Areas
■ Understand the different API types (SOAP, REST, RPC, WebSocket,
GraphQL)
■ Be able to identify deployment methods and their implications
■ Recognize security measures associated with API usage
■ Know the role of API gateways and their importance in architecture
295
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
296
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
297
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Transport Architecture
○ Transport Architecture
■ The design and structure of networks that enable data transmission
between endpoints, facilitating communication across various network
setups including WAN, enterprise networks, and cloud services
■ Critical for ensuring effective network performance, scalability, security,
and resilience
○ Network Topologies
■ Point-to-Point
● Direct connection between two devices
● Ideal for simple, secure, and direct data transfer but lacks
scalability
■ Multi-Point
● Multiple devices connected, allowing simultaneous data
transmissions
● Used in most business and cloud networks for its flexibility
■ Bus Topology
● All devices connected to a single central cable
● Cost-effective and easy to set up but limited by bandwidth sharing
and high failure susceptibility
298
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Star Topology
● Devices connected to a central hub, typically a switch
● Enhances performance management but central hub failure can
disrupt the entire network
■ Ring Topology
● Each device connects to two others, forming a ring
● Facilitates data token passing with improved fault tolerance but
can be disrupted by a single link failure
■ Mesh Topology
● Every device connects to every other device
● Offers high reliability and multiple paths for data transmission,
though it can be complex and expensive to implement
○ Architecture Planes
■ Data Plane
● Manages the actual data transmission between devices
■ Control Plane
● Controls routing and switching, making decisions about data paths
based on configured routes and logic
■ Management Plane
● Handles network management, configuration, and monitoring
○ Security and Network Resilience
■ Encryption and Access Controls
● Essential for protecting data in transit and ensuring only
authorized access to network resources
■ Fault Tolerance
299
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
300
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
301
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
302
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Latency Implications
● Discussion on how latency affects user experience, particularly in
real-time applications
303
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
304
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
305
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
306
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
307
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ VRFs
● Useful in environments where multiple users or tenants need to
be isolated within a shared infrastructure
■ VDOMs
● Offers robust security and isolation in environments requiring
rigorous compartmentalization of network resources
● Micro-Segmentation
○ Micro-Segmentation
■ The process of dividing a network into smaller, distinct security segments
down to the individual workload level within data centers and cloud
environments
■ Purpose
● Enhances security by isolating workloads, applications, and
services into secure zones, reducing the attack surface, and
limiting lateral movement of attackers within the network
○ Benefits of Micro-Segmentation
■ Enhanced Security
● Each segment or zone is secured separately, reducing the
potential impact of breaches and attacks
■ Reduced Attack Surface
● Limits the points of entry for attackers, making targeted attacks
more difficult
■ Containment of Threats
● Prevents the spread of breaches across segments, containing
potential damage
308
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
309
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Technology Integration
● Effective micro-segmentation often involves integrating multiple
technologies like VXLAN, SDN, and SD-WAN to achieve
comprehensive coverage and security
○ Security Policies and Controls
■ Ensures that each segment can enforce its security policies independently
■ Facilitates rapid response and containment in case of security incidents
within a segment
■ Use Case Scenarios
● Data Centers
○ Protecting critical data and systems by isolating them into
different segments based on sensitivity and function
■ Cloud Environments
● Securing multi-tenant environments where customers' data and
workloads must be isolated from each other
● Edge Networks
○ Edge Networks
■ Edge networks involve computing infrastructure placed at the boundary
of a network, close to end-users for optimal performance and reduced
latency
■ Purpose
● Facilitates faster processing and response by bringing resources
closer to the data source or user, enhancing application
performance and user experience
310
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
311
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Enhanced Security
● By segmenting network traffic at the edge, there's better control
over data flow, which can enhance security measures and reduce
the attack surface
○ Implementation Considerations
■ Infrastructure Design
● Requires thoughtful design to ensure that edge nodes and related
infrastructure are optimally placed to serve user needs without
compromising security
■ Security Measures
● While edge networks can improve performance, they also require
robust security protocols to protect against potential
vulnerabilities introduced by broader network access points
312
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Objectives:
● 4.1 - Apply secure design principles in network architectures
● 4.2 - Secure network components
● 7.7 - Operate and maintain detection and preventative measures
● Firewalls Concepts
○ Firewall
■ Primarily software solutions designed to prevent unauthorized
communications between networks by inspecting and filtering traffic
based on predetermined security rules
■ Functionality
● They control inbound and outbound traffic based on source and
destination IP addresses, port numbers, protocols, and sometimes
packet content
○ Types of Firewalls
■ Host-Based Firewalls
● Installed directly on a server or computer
● Protects the individual system by monitoring incoming and
outgoing connections
● Example tools include IPTables for Linux, Windows Firewall for
Windows
313
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Network-Based Firewalls
● Positioned at strategic points within the network to inspect all
traffic passing through
● Can be deployed as hardware appliances or virtualized solutions
● Commonly used in corporate environments to enforce broad
network security policies
■ Web Application Firewalls (WAF)
● Specialized type of firewall that focuses on web applications
● Protects web apps by filtering and monitoring HTTP traffic
between web applications and the Internet
● Helps to prevent attacks such as SQL injection, cross-site scripting
(XSS), and other web-based threats
○ Deployment Strategies
■ Hardware (Appliance-Based) Firewalls
● Deployed on dedicated hardware, offering robust performance
due to dedicated resources
■ Virtual Firewalls
● Deployed in virtual environments; flexibility allows for scaling and
integration in cloud infrastructures
■ Software Firewalls
● Can be integrated into other software systems or provided as
standalone applications on operating systems
○ Configuration and Policy
■ Firewalls operate using sets of rules defined in access control lists (ACLs),
which permit or deny traffic based on specified conditions
314
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Types of Firewalls
○ Static Packet Filtering Firewall
■ Function
● Filters traffic based solely on source and destination IP addresses,
protocols, and port numbers
■ Layer
● Operates at the Network layer (Layer 3 of the OSI model)
315
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Characteristics
● Known for being fast due to minimal processing overhead It does
not track the state of network connections, hence referred to as
"stateless"
■ Common Deployment
● Often implemented on routers and basic network gateways
○ Proxy Firewall
■ Function
● Acts as an intermediary between users and the internet, making
network requests on behalf of devices
■ Types
● Circuit-level Gateway
● Establishes network sessions on behalf of clients, useful for hiding
internal IP addresses
■ Application-level Gateway (Proxy)
● Filters traffic based on application data besides IP addresses,
offering detailed content filtering capabilities
● Layer
○ Functions at the Application layer (Layer 7 of the OSI
model)
● Characteristics
○ Can inspect and manage application data, enhancing
security but potentially reducing performance due to
increased processing
316
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
317
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Deployment Considerations
■ Static Packet Filtering and Proxy Firewalls
● Are simpler in function and are often used in less complex
environments or specific use cases where high throughput and
basic filtering are sufficient
■ Stateful and Next Generation Firewalls
● Are suited for environments where security needs are greater,
including protecting sensitive data or supporting complex,
dynamic applications
○ Practical Insights
■ Firewalls, whether they operate at a basic network level or perform deep
packet inspections, form the first line of defense in network security
■ The evolution from simple packet filters to advanced NGFWs reflects the
growing complexity of cyber threats and the need for more sophisticated
security measures
■ Understanding the operational specifics of each firewall type helps in
designing appropriate security architectures and ensuring adequate
protection against various cyber threats
● Firewall Architecture
○ Multi-Homed Firewalls
■ A multi-homed firewall has multiple network interfaces, often categorized
as external (untrusted) and internal (trusted)
318
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Purpose
● It serves as a gatekeeper by managing traffic between trusted
internal networks and untrusted external sources
○ Bastion Host
■ A special-purpose computer on a network specifically designed and
configured to withstand attacks
■ Purpose
● Acts as a fortified barrier, preventing unauthorized access from
external threats while allowing legitimate external
communications
■ Deployment
● Typically placed in a network's DMZ to provide a secure and
monitored node for external users accessing internal non-public
services
○ Screened Host
■ Incorporates a screening router (firewall) that handles network traffic
filtering combined with a host behind the firewall that performs
additional inspections
■ Purpose
● Enhances security by providing a secondary layer of filtering and
inspection beyond the primary firewall protection
■ Deployment
● Used within the internal security boundary, offering an additional
screening layer for incoming traffic before it reaches critical
internal resources
319
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
320
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
321
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
322
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ ISAKMP
● Handles the creation, negotiation, modification, and deletion of
Security Associations
● It is important for managing the keys and security protocols that
IPsec will use
○ Components of IPsec
■ Authentication Header (AH)
● Provides integrity, authentication, and non-repudiation
● It is crucial for protecting against replay attacks but does not
encrypt data
■ Encapsulating Security Payload (ESP)
● Provides confidentiality, integrity, and authentication of the data
● It is used to encrypt the data and ensure that it has not been
tampered with in transit
○ Practical Deployment
■ VPN Implementation
● IPsec can be configured directly on devices through client
software or managed via concentrators/gateways that handle the
encryption and decryption processes in a network
■ Efficiency vs. Security
● Choosing between transport and tunnel mode involves balancing
the need for efficiency against the requirement for security
● Transport mode is more efficient but less secure as it exposes IP
packet headers, while tunnel mode is more secure as it encrypts
the entire packet
323
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Endpoint Security
○ Endpoint Security
■ Focuses on securing endpoints or nodes in a network where
communications originate or terminate, such as computers, servers, and
mobile devices
■ The goal is to eliminate single points of failure found in traditional
network-based defenses like network intrusion detection systems (NIDS)
and intrusion prevention systems (NIPS)
○ Challenges with Network-Based Defenses
■ Network-based systems like NIDS and NIPS may not catch traffic directly
exchanged between endpoints, bypassing the network layer where these
systems operate
○ Strategies for Enhancing Endpoint Security
■ Host-Based Firewalls
● Install on all endpoints capable of supporting them
● Control both inbound and outbound communications to prevent
unauthorized data exchanges
■ Antivirus and Anti-Malware Software
● Essential for detecting and removing malicious software
● Helps prevent the spread of malware across the network
■ Host-Based IDS (HIDS) and IPS (HIPS)
● HIDS monitors for policy violations but does not take action,
providing alerts for detected issues
● HIPS actively responds to policy violations by taking pre-defined
actions to mitigate threats
324
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
325
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
326
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
327
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Captive Portals
● Used primarily in guest networks to control access through a
web-based login page that can enforce terms of service and basic
credential checks
■ In-Line vs. Out-of-Band
● In-Line NAC
○ Positioned directly in the network traffic flow, actively
monitoring and controlling all data passing through
● Out-of-Band NAC
○ Operates alongside the network, monitoring access and
applying policies without disrupting traffic flow
○ Practical Application Scenario
■ Wired and Wireless Access
● Demonstrates how NAC can manage both wired and wireless
connections to ensure all devices adhere to the network's security
policies
■ Use of Remediation Networks
● Illustrates how non-compliant devices are handled, emphasizing
the importance of keeping security risks isolated from the main
network resources
○ Conclusion
■ Importance of NAC
● Ensures that all devices on a network, regardless of connection
type, adhere to strict security standards to protect network
integrity and data security
328
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Reconnaissance Attacks
○ Passive Reconnaissance (OSINT)
■ Involves gathering information without direct interaction with the target
■ Utilizes publicly available data sources and aims to avoid detection
■ Common methods include web searching and social media analysis
○ Active Reconnaissance
■ Involves direct interaction with the target to gather more detailed
information
■ Tools such as Nmap, Angry IP Scanner, and Nessus are typically used for
ping sweeps and port scans
■ More likely to be detected by network security systems
○ Types of Active Reconnaissance Attacks
■ Ping Sweep
● Identifies live hosts on a network by sending ICMP requests.
■ Port Scan
● Determines open ports on network hosts, potentially identifying
vulnerable services
■ Banner Grabbing
● Gathers information about specific network services running on
open ports
329
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ SYN Scan
● A type of port scan that checks for responsive ports using the SYN
flag of the TCP protocol
○ Defensive Measures
■ Restricting ICMP traffic and other protocols used in scanning to minimize
the effectiveness of these reconnaissance methods
■ Implementing network segmentation and strict firewall rules to limit the
scope of what an attacker can discover
■ Continuous monitoring and updating of network security measures to
address vulnerabilities that may be exploited during reconnaissance
330
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
331
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
332
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
333
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
334
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Secure Communications
Objective 4.3: Implement secure communication channels according to design
335
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
336
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Network Segmentation
● Use dedicated network segments for remote access, reducing the
risk of lateral movement within the network if a remote system is
compromised
■ Contractual Agreements
● Establish clear terms regarding remote access policies and security
expectations with all third parties
● This includes SLAs and MOUs to formalize the security
requirements and responsibilities
○ Best Practices
■ Regularly update and patch all systems involved in remote access to
mitigate vulnerabilities
■ Provide training and support for remote users to ensure compliance with
security policies and practices
■ Continuously evaluate and adjust remote access policies and controls
based on emerging threats and changes in the organizational
environment
● Multimedia Collaboration
○ Multimedia Collaboration
■ Facilitates real-time interaction among team members using various
digital platforms and tools such as emails, instant messaging, video
conferencing, and collaborative editing platforms
○ Common Tools
■ Tools include email, instant messaging apps, video conferencing software
like Zoom, and cloud-based project management applications
337
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
338
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Access Controls
● Setting stringent access controls and permissions within
collaborative tools to limit user access based on roles, ensuring
that sensitive information is only accessible to those who need it
○ Data Protection and Retention
■ After collaboration sessions, it’s vital to securely store and manage
session records, including chat logs, shared files, and video recordings
■ Implement policies for the retention and deletion of such data to comply
with data protection regulations
○ Physical and Environmental Security
■ Be mindful of the physical environments from which participants join
multimedia sessions
■ Sensitive information displayed on screens or audible in the background
should be controlled to avoid accidental data exposure
○ Social Engineering Defenses
■ Educate and train users on the risks of social engineering attacks through
these platforms
■ Users should be aware of the tactics that might be used by attackers to
gain unauthorized access to information or systems
○ Legal and Regulatory Compliance
■ Ensure all multimedia collaboration practices comply with relevant laws
and industry regulations, particularly those concerning data protection
and privacy
■ This includes the General Data Protection Regulation (GDPR) for
organizations operating in or dealing with data from the European Union
339
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Voice Communications
○ Overview of Voice Communications
■ Private Branch Exchange (PBX)
● A local telephone system used within organizations
● It connects to the Public Switched Telephone Network (PSTN) to
facilitate external calls
■ Public Switched Telephone Network (PSTN)
● Also known as Plain Old Telephone Service (POTS), this network
interconnects different telecommunication networks, enabling
phone communications globally
○ Security Vulnerabilities
■ Eavesdropping
● Both PBX and PSTN are susceptible to wiretapping, where
unauthorized individuals can intercept and listen to voice
communications
■ Phreaking
● Techniques like blue box and red box attacks manipulate
telephone systems to access services without payment
● Modern systems have mostly mitigated these risks
○ Voice over Internet Protocol (VoIP)
■ VoIP technology allows voice communications over internet protocol
networks, integrating with the existing data network infrastructure
■ Protocols
● Real-time Transport Protocol (RTP)
340
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
341
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Security Recommendations
■ Encryption
● Encrypt all VoIP communications to protect against eavesdropping
and interception
■ Network Segmentation
● Use VLANs to separate voice traffic from regular data traffic,
enhancing security and performance
■ Strong Authentication
● Implement robust authentication mechanisms to ensure only
authorized devices and users can access the VoIP system
■ Regular Audits
● Conduct regular security audits and updates to VoIP infrastructure
to address vulnerabilities and ensure compliance with security
policies
● Email Security
○ Key Concepts and Protocols
■ Email Protocols
● SMTP (Simple Mail Transfer Protocol)
○ Used for sending emails
○ Operates on port 25 and is unsecure by default
● POP3 (Post Office Protocol version 3)
○ Used for retrieving emails from a server
○ Typically unsecure but can implement Kerberos for
enhanced security
● IMAP (Internet Message Access Protocol)
342
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
343
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
344
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
345
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Access Controls
● Enforce strict access controls to restrict unauthorized access to
backhaul network components and critical infrastructure
■ Authentication
● Implement multi-factor authentication wherever possible
● Ensure strong single-factor authentication where necessary
■ Network Segmentation
● Isolate traffic and applications to limit data breaches, prevent
lateral movement, and reduce congestion
● Techniques include using VLANs and secure zones
■ Monitoring and Intrusion Detection
● Deploy real-time monitoring to detect unusual network behavior,
unauthorized access attempts, and security incidents
● Implement Intrusion Detection and Prevention Systems (IDPS) to
provide a deeper analysis of potential threats
○ Additional Considerations
■ Regular assessments and demonstrating due care and diligence in
network security practices are crucial
346
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Objectives:
● 3.5 - Assess and mitigate the vulnerabilities of security architectures, designs, and
solution elements
● 4.1 - Apply secure design principles in network architectures
● Wireless Networks
○ Wireless Networks
■ Enable communications without the need for physical cable medium
■ Uses radio frequency (RF) to transmit data
■ Frequencies range from 3 Hz to 300 GHz
■ Common frequencies
● 900 MHz, 2.4 GHz, 5 GHz
○ Modulation
■ Technique of changing information on the radio frequency
■ Varies properties of the signal such as amplitude, frequency, phase
○ Spread Spectrum
■ Transmits communications over multiple frequencies to increase
performance
■ Types
● Frequency Hopping Spread Spectrum (FHSS)
○ Randomly changes frequencies to minimize interference
and improve security against eavesdropping
347
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
348
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
349
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
350
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
351
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
352
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
353
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
354
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Users may log into platforms using their Google, Facebook, or LinkedIn
credentials
■ This process illustrates how delegated identity management simplifies
access by utilizing third-party credentials
○ Considerations for Implementation
■ High Availability
● Ensuring that the third-party service is reliable and available
without significant downtime
■ Credential Protection
● Must meet or exceed organizational policies and regulatory
standards
■ Account Management
● Planning out roles and privileges to minimize changes and
disruptions
○ Security and Compliance
■ Essential to ensure that the third-party provider complies with relevant
industry standards and regulations
■ Organizations remain responsible for the security and privacy of the
delegated identities
355
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Objectives:
● 5.2 - Design identification and authentication strategy
○ E.g., people, devices, and services
● 5.3 - Federated identity with a third-party service
● 5.5 - Manage the identity and access provisioning lifecycle
● 5.6 - Implement authentication systems
● Establishing Identity
○ Introduction to Identity Management
■ Identity pertains to both individuals and entities such as computers,
servers, and applications
■ Key components include hostnames, IP addresses, and MAC addresses,
which serve as forms of identity
○ Registration and Identity Creation
■ Identity creation requires a registration process
■ Involves adding the applicant's identity into a registration system often
part of an identification and authentication management system
○ Credential Service Provider (CSP)
■ CSP performs the identity proofing process
■ Confirms the applicant's identity by processing and affirming evidence
based on set assurance levels
356
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Methods of Identification
■ Identification can be achieved using IDs such as driver's licenses,
passports, and birth certificates
■ Identification processes can be conducted in person or remotely,
dependent on the desired assurance level
○ Assurance Levels
■ Level 1
● Self-asserted attributes without validation, suitable for
low-security access
■ Level 2
● Requires evidence supporting the existence of the claimed
identity, preferred to be done in person
■ Level 3
● Physical presence required, suitable for high-security roles such as
system administrators
○ Identity Proofing Process
■ Initiated by the applicant providing necessary information and evidence
to the CSP
■ Consists of the steps of resolution, validation, and verification
● Resolution
○ Collection and initial assessment of applicant's attributes
and evidence
● Validation
○ Authentication of the evidence's authenticity and accuracy
● Verification
357
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
358
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Identity Management
○ Identity
■ Is the assertion by a subject of who or what they are
■ It encompasses both individuals (users) and entities (computers,
applications, servers), characterized by attributes like hostnames, IP
addresses, and MAC addresses
○ Provisioning and Deprovisioning
■ Provisioning
● Process of creating identity and authentication credentials for a
subject
■ Deprovisioning
● Removal or expiration of identity and its associated credentials
○ Authentication
■ The process of verifying or confirming a claimed identity
■ Example
● Verifying if a person claiming to be a drummer in a band truly
holds that identity by checking if they appear with the band in
shows or photos
○ Authorization
■ Determines if a subject has permission to access a specific object, such as
determining if a person is allowed to play drums for a band on stage
○ Access Controls
■ Manage how subjects can interact with objects, determining the level of
interaction permissible
359
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
360
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
361
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
362
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
363
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Operational Considerations
■ High Availability
● Ensuring the third-party service is reliable and adheres to agreed
service levels to prevent downtime
■ Credential Protection
● Ensuring that the third-party service meets or exceeds
organizational security policies and relevant regulations
■ Planning and Role Management
● Planning account requirements and roles thoroughly to minimize
the need for frequent changes
○ Responsibilities
■ Despite delegation, the organization remains accountable for ensuring
the protection of user data as per compliance and regulatory standards
■ Transparency with users about the use of third-party identity
management services and the security measures in place
364
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
365
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
366
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Authentication Mechanisms
Objectives:
● 5.2 - Design identification and authentication strategy
○ E.g., people, devices, and services
● 5.4 - Implement and manage authorization mechanisms
● 5.6 - Implement authentication systems
● Authentication Systems
○ Key Concepts
■ Authentication System
● A system designed to store information about a subject's identity
and authentication credentials
● It can be centralized (a single repository like LDAP or Active
Directory) or decentralized (local authentication at multiple
points)
○ Directory Services
■ Directory Service
● A database that contains and manages user identification,
authentication, authorization, and access control functions
■ X.500 Standard
● The most common form of directory services used for storing
subject information
○ Protocols
■ LDAP (Lightweight Directory Access Protocol)
367
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
368
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
369
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
370
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ TACACS+
● An enhanced AAA protocol that encrypts the entire
communication session, used in more complex authentication
scenarios
■ Diameter
● A flexible protocol improving upon RADIUS, commonly used in
modern communication networks
○ Best Practices and Considerations
■ Use LDAP Secure (LDAPS) (Port 636) instead of LDAP (Port 389) to prevent
plaintext credentials from being intercepted
■ RADIUS is ideal for simple password-based authentication but should be
paired with additional security measures for session data
■ TACACS+ offers stronger encryption for both authentication and
authorization communication and is recommended for complex
environments requiring fine-grained control
■ Diameter is highly flexible and suited for modern infrastructures, but
additional encryption measures (e.g., IPSec, SSL/TLS) may be needed
● Authentication Factors
○ Key Concepts
■ Authentication
● The validation of a claimed identity. The process of confirming
that a subject (user, device, etc.) is who they claim to be
■ Common login screen
371
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
372
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Often used interchangeably with 2FA, but MFA may involve more
than two factors
■ Important for the exam
● When given a choice between two-factor authentication and
multi-factor authentication, select the more specific answer (2FA
when applicable)
○ Authentication Factor Types (Know for the Exam)
■ Type 1
● Something You Know (Knowledge-based)
○ This is information the user knows, such as a password,
PIN, or passphrase
○ Example
■ Username and password
■ Type 2
● Something You Have (Ownership-based)
○ This is something the user physically possesses, such as a
token, smart card, or mobile device
○ Example
■ Token-generated one-time password (OTP) or a
smart card.
■ Type 3
● Something You Are (Biometric-based)
○ Biometric-based authentication uses physical
characteristics to verify identity
○ Example
373
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
374
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
375
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Biometric Authentication
○ Biometric Authentication
■ Validates a claimed identity using genetic or behavioral data
■ Rarely used as a single authentication factor, typically paired with Type 1
or Type 2 authentication
■ Common forms include fingerprints and facial recognition
○ Types of Biometric Attributes
■ Physiological Attributes (Physical Attributes)
■ Fingerprints
● Unique visible ridges on fingertips
■ Palm Scans
● Analyzes blood vessels and patterns on the palm
■ Retina Scans
● Evaluates unique blood vessel patterns in the back of the eye
● Extremely accurate
● Can differentiate identical twins
■ Iris Scans
● Analyzes colored part of the eye with unique patterns and rings
● Rarely changes over a lifetime
■ Hand Geometry
● Measures physical shape and dimensions of the hand
■ Facial Recognition
● Analyzes facial features such as shape and position of eyes, nose,
chin, and forehead
376
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Behavioral Attributes
■ Signature Dynamics
● Analyzes writing speed, pressure, and stroke length
■ Keystroke Dynamics
● Measures typing patterns, keypress duration, and time between
keypresses
■ Voice Pattern Recognition
● Analyzes speech patterns, pauses, and emphasis
■ Heart Rate Patterns
● Analyzes pulse and heart behavior
○ Biometric System Errors
■ Type 1 Error (False Rejection Rate - FRR)
● Occurs when an authorized subject is mistakenly rejected by the
system
● Failure in system recognition
■ Type 2 Error (False Acceptance Rate - FAR)
● Occurs when an unauthorized subject is mistakenly accepted by
the system
● Represents a security violation
○ Crossover Error Rate (CER)
■ The point where false rejection rate (FRR) and false acceptance rate (FAR)
are equal
■ Also known as the Equal Error Rate (EER)
■ Used to tune biometric systems for balanced accuracy and security
377
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Single Sign On
○ Single Sign-On (SSO)
■ Single set of credentials used to identify and authenticate a subject
throughout a system
■ Allows subjects to authenticate once and access multiple systems using
the same credentials
■ Reduces the security risk of multiple passwords as users only need to
remember one password
■ Simplifies user experience by eliminating the need for repeated logins
across authorized applications
○ How SSO Works
■ Subjects authenticate to an SSO service
■ SSO service creates a token representing identification and authentication
■ Token is passed to authorized applications to validate user access
○ SSO Drawbacks
■ Compromised Credentials
378
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
379
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ OpenID
■ Allows the use of existing accounts to sign into multiple websites using
pre-existing passwords
■ OpenID Connect (OIDC)
● Extension of OpenID providing additional information about
authenticated sessions and users
380
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Resource Server
● Uses presented tokens to grant access to resources
○ OAuth Workflow
■ Resource Owner whitelists access permissions
■ Authorization token presented to Authorization Server, which provides an
access token
■ Client uses access token on Resource Server to access protected
resources
○ OpenID
■ An open standard authentication protocol allowing single sign-on for
multiple websites
■ Authentication credentials managed by a third-party OpenID provider
■ Enables users to access multiple websites with a single set of credentials
○ OpenID Connect
■ Identity layer built on top of OAuth 2.0
■ Uses REST and JSON messages for cross-site authentication
■ REST (Representational State Transfer)
● Message format for web service communications
■ JSON (JavaScript Object Notation)
● Lightweight data format for structured data exchange
■ JSON Web Tokens (JWT)
● Used to provide authentication and profile information across
sites
381
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Common Use
○ Allows single sign-on using providers like Google, LinkedIn,
and Facebook on various websites
● Kerberos
○ Kerberos
■ A single sign-on (SSO) system and ticket-based authentication protocol
■ Primarily used in Windows environments, developed by MIT under
Project Athena (1983-1991)
■ Named after the "Hound of Hades," the three-headed guard dog in Greek
mythology
■ Current Version
● Kerberos Version 5
■ Uses a Key Distribution Center (KDC) for identity and authentication
verification
■ Employs Advanced Encryption Standard (AES) for message encryption to
ensure privacy
○ Key Components of Kerberos
■ Key Distribution Center (KDC)
● Trusted third-party server issuing and storing secret session keys
for authentication
■ Authentication Server (AS)
● Authenticates a subject’s account using the Ticket Granting Ticket
(TGT), also known as the "Golden Ticket"
■ Ticket Granting Service (TGS)
382
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Verifies the TGT, provides Service Tickets (also called the "Silver
Ticket") and session keys for authorization
○ Tickets
■ Ticket Granting Ticket (TGT) / Golden Ticket
● Verifies initial authentication to the KDC and is essential for
initiating single sign-on
■ Service Ticket / Silver Ticket
● Provides encrypted evidence of the subject’s authorization to
access specific resources or services
○ Kerberos Operation Flow
■ Client Authenticates
● The client authenticates to the Authentication Server (AS) with
their credentials
■ TGT Issued
● Upon verification, the AS provides a Ticket Granting Ticket (TGT) to
the client
■ TGT Presented to TGS
● The client presents the TGT to the Ticket Granting Service (TGS)
■ Service Ticket Issued
● The TGS provides a Service Ticket and session keys for accessing
services
■ Access Granted
● The client uses the Service Ticket to authenticate to the
Kerberos-enabled service, enabling access
383
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
384
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Browser Plugins
● Examples include LastPass, RoboForm
■ Endpoint Security Software
● Examples include Norton, Symantec, Kaspersky, Bitdefender
■ Risk Management Software
● Credential management can be embedded within tools like
Nessus, OpenVAS for credential-based scans
■ Operating Systems
● Credential management is often integrated into OS features, such
as Windows and Google account managers
○ Examples of Popular CMS Solutions
■ Enable
■ LastPass
■ RoboForm
■ Windows Credential Manager
■ Google Password Manager
■ KeePass
■ Keeper
○ Attributes Stored in Credential Management Systems
■ Identification credentials
● Username, account number, ID number
■ Authentication credentials
● Passwords, tokens, certificates
■ Biometric information
385
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Credential Vault
■ Encrypted storage area in a CMS, commonly called a “vault”
■ Vault encryption is typically managed by advanced cryptography
● E.g., AES, RSA) to secure sensitive data
○ CMS Security Considerations
■ Encryption Standards
● Ensure vaults use modern, compliant cryptographic algorithms,
such as AES and RSA
■ Acceptable Applications
● Identify acceptable CMS applications, research vulnerabilities, and
list approved applications in policy
■ Master Password Requirements
● Define strong and complex password policies for the master
password accessing the vault
■ Password Storage Policies
● Specify which types of passwords can be stored in the CMS,
especially concerning administrator or privileged accounts
■ Protection of Recovery Keys and Backups
● Define protection requirements for CMS recovery keys, vault
backups, and other related data
● Just-In-Time Access
○ Just in Time (JIT) Access
■ Purpose is to reduce the attack surface of a system
386
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
387
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
388
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Process
● Object owner assigns access permissions
● Subject requests access
● Operating system checks the ACL for permissions and grants or
denies access
○ Non-Discretionary Access Control
■ Access rights are predetermined by a central authority or policy, not by
the object owner
■ Central management enforces permissions through security policies
■ Used in environments requiring strict access control, e.g., highly sensitive
data protection
○ Mandatory Access Control (MAC)
■ A type of non-discretionary access control
■ Uses security labels on subjects and objects to define access
■ Classification levels (e.g., Confidential, Secret, Top Secret) control access
based on subject’s clearance level
■ Common in environments with sensitive data, such as PII, PHI, and
national security
■ Process
● Subject requests access to labeled object
● Access control checks if subject’s clearance matches or exceeds
the object’s label
● Access is granted or denied based on clearance and classification
compatibility
○ Rule-Based Access Control
389
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
390
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
391
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Environmental attributes
○ Date, time, IP address, MAC address
○ Risk-Based Access Control
■ Dynamically grants or denies access based on a calculated risk level
■ Uses contextual data, such as device type, network attributes,
geolocation, and object sensitivity
■ Also known as Risk-Adaptable Access Control (RAdAC)
■ Access decisions are adapted to the calculated risk level of the access
request
■ Example
● Low-risk scenario
○ User logs in from a known IP address and trusted device,
access may be granted with single-factor authentication
● Moderate-risk scenario
○ Privileged user attempting access with single-factor
authentication may be denied or require additional factors
● High-risk scenario
○ Unknown IP address or untrusted subnet triggers
multi-factor authentication requirement or denial
○ Exam Focus
■ Understand RBAC, ABAC, and risk-based access control models and their
key attributes
■ Familiarize with the distinctions in how each model handles subject and
object attributes
392
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Objectives:
● 5.1 - Control physical and logical access to assets
● 5.2 - Design identification and authentication strategy (e.g., people, devices, and
services)
● 5.4 - Implement and manage authorization mechanisms
● Accountability
○ Accountability
■ Ensures subjects are held accountable for their actions within the system
■ Goal
● To track and verify actions performed by subjects interacting with
objects and resources
■ Key Outcome
● Supports non-repudiation, ensuring subjects cannot deny actions
they performed
○ Examples of Accountability in Action
■ Accessing and reading sensitive files
● racks who accessed a file and verifies if access was authorized
■ Modification of directory or folder permissions
● Ensures that changes to permissions are intentional and prevent
unauthorized access
■ Destruction of sensitive data
393
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
394
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Access Authorization
○ Authorization
■ Access granted to an object for an authorized subject
■ Key Function
● Deciding if a subject can create, modify, execute, or delete
resources (files, VMs, network interfaces)
○ Key Terms in Authorization
■ Permissions
● Subject's ability to access an object
○ Typically for objects only, e.g., read or write
■ Rights
● Subject’s authority to conduct specific actions
○ E.g., modify accounts, configure systems
■ Privileges
● Combination of a subject's permissions and rights
○ Core Concepts in Authorization
■ Implicit Deny
● Access is denied by default unless explicitly granted
■ Concept
● "Permit by exception, deny by default"
■ Access Control Matrix
● Tracks subjects, objects, and privileges (object-focused)
■ Capability Table
● Lists subject capabilities in relation to objects (subject-focused)
■ Constrained Interface
395
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
396
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
397
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
398
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Session Management
○ Session
■ A session is a temporary, active connection between two entities, often
using protocols like UDP or TCP
■ It enables an exchange of data, functions, or services.
○ Types of Sessions
■ User-to-computer
● E.g., logging into a workstation
■ Computer-to-application
● E.g., accessing a web app
○ Session Management Basics
■ Session IDs
● Bind user credentials to active sessions and are critical for session
initiation, management, and termination
■ Session Timeout
● Automatically ends a session after a set period of inactivity
○ E.g., 5–15 minutes
● Requires re-authentication to start a new session after timeout
■ Screen Savers
● Help protect sensitive on-screen data by locking the session after
a period of inactivity, requiring re-authentication to regain access
○ Session Attacks
■ Session Hijacking (Sidejacking)
399
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
400
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Exam Focus
■ Understand Key Session Terms
● Session timeout, session ID, screen saver, session hijacking, and
session fixation
■ Know the Types of Session Attacks
● Differentiate between session hijacking and session fixation, and
understand man-in-the-middle concepts
■ Key Session Security Measures
● Remember the importance of session timeouts, logout features,
account lockouts, concurrent session limits, and encryption for
session integrity
● Password Attacks
○ Key Concepts of Passwords
■ A password is a confidential character or code combination used to
authenticate an identity, tied to the user’s username
○ Types of Passwords
■ Standard Passwords
● Secret character codes, PINs, or phrases
■ Cognitive Passwords (Security Questions)
● Questions like “What’s your pet’s name?” used for password
recovery
○ Types of Password Attacks
■ Brute Force Attack
401
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
402
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
403
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
404
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Objectives:
● 6.1 - Design and validate assessment, test, and audit strategies
● 6.3 - Collect security process data (e.g., technical and administrative)
● 6.5 - Conduct or facilitate security audits
405
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Security Audit
■ An independent assessment using an impartial body to verify security
controls and effectiveness
■ Often focused on compliance with governance, regulations, and security
posture
■ Includes compliance status and perceived risk impact in the report
○ Types of Security Audits
■ Internal Audit
● Performed by internal personnel and reported directly to senior
management
● Example
○ Self-audit by the company before an external audit for an
objective view
■ External Audit
● Conducted by an outside organization specializing in security
audits
● Provides an unbiased perspective and reports to executive officers
■ Third-Party Audit
● An outside team performs the audit on behalf of another
organization
● Results are reported directly to the outside organization, often for
compliance or acquisition purposes
○ Security Test and Assessment Strategy
■ Define the Scope
● Determine whether a security test or assessment is needed
406
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
407
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
408
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
409
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Example
○ Collect relevant information from departments like finance
and human resources
■ Technical Data
● Collect system logs, software code, configuration files, change
management records
● Review system diagrams and data flow diagrams to understand
system operations and expected outcomes
○ Management Approval and Support
■ Obtain approval and support from senior managers to allocate resources
for tests and assessments
■ Example
● Administrators, engineers, architects may be required
● Communicate the purpose and scope of the tests to ensure
proper resources are available
■ Formal documentation is necessary for approval, including
● Expected outcomes, schedule, scope, start/end dates and times,
and any risk exceptions
■ Methodical planning and documented management approval are
essential for successful testing
410
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
411
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Deleting Accounts
● Recommend accounts for access revocation, deprovisioning, or
deletion based on audit findings
● Adhere to industry regulations regarding retention timelines,
typically requiring maintenance for three, five, or seven years,
after which deletion is recommended
● Aim to maintain account data only as long as necessary per
governance and compliance requirements
412
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
413
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
414
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
415
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Objectives:
● 6.2 - Conduct security control testing
● 6.4 - Analyze test output and generate report
● Vulnerability Assessments
○ Purpose of Vulnerability Assessments
■ Identify and categorize security flaws and weaknesses
■ Understand security risks associated with identified vulnerabilities
■ Prioritize responses to discovered flaws, vulnerabilities, and weaknesses
○ Process of Identifying Vulnerabilities
■ Accurate System Inventory
● Maintain details on hardware, software, firmware, and versions
● Reference inventory to assess whether a specific vulnerability
applies
○ Vulnerability Management Process Steps
■ Detection
● Identify potential vulnerabilities
■ Validation
● Confirm impact on assets
■ Remediation
● Fix or reduce the identified vulnerability
■ Objective
416
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
417
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Vulnerability Scanning
○ Definition and Purpose
■ Uses automated tools to identify and categorize security flaws and
weaknesses
418
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● I.e., vulnerabilities
■ Helps maintain system security and reduce risk exposure
■ Popular Vulnerability Scanning Tools
● Nessus
○ Widely used for network vulnerabilities
● InsightVM
○ From Rapid7, focuses on risk prioritization
● OpenVAS
○ Open-source scanner
● Nmap
○ Primarily a network discovery tool but can perform basic
vulnerability scans
● Qualys
○ Cloud-based security and vulnerability management
● Nikto
○ Web server vulnerability scanner
● Tripwire
○ File integrity monitoring and vulnerability assessment
○ Types of Scans
■ Non-Credentialed Scan
● Only checks general settings, configurations, and communications
● Provides read-only access and faster results but with limited depth
■ Credentialed (Authenticated) Scan
● Requires privileged access to log in as a root/admin user, providing
deeper scanning
419
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
420
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ XMAS Scan
● Sends PUSH, URGENT, and FINISH flags to test responses for
vulnerable configurations
■ UDP Scan
● Used to check active UDP services; lacks handshakes due to
connectionless nature
○ Vulnerability Scanning Process
■ Signature-Based Scan
● Uses a signature database to detect vulnerabilities in patch levels,
configuration, and open communication ports
■ Tools like Nessus
● Provides categorized findings with severity ratings (critical, high,
medium, informational)
■ Reporting
● Findings must be analyzed, prioritized, and approved for
remediation
○ Best Practices for Vulnerability Scanning
■ Plan and Schedule Scans
● Communicate scan times, scan in off-hours or during low activity
to minimize impact on operations
■ Use Updated Scanners
● Ensure the scanner has the latest vulnerability signatures
■ Incremental Scanning
● Scan small host groups or subnets (e.g., /24 networks) instead of
large networks at once
421
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Pre-Testing
● Run test scans in development or sandbox environments to verify
configurations
■ Avoid Automatic Remediation
● Manual approval is needed to avoid unapproved changes in
production environments
● Penetration Testing
○ Penetration Testing Purpose
■ Simulates a system attack to exploit and identify vulnerabilities
■ Can target both logical (e.g., network and software systems) and physical
(e.g., locks, cameras) controls
■ Provides insights into system vulnerabilities and helps determine the
actual risks.
○ Rules of Engagement
■ An agreement that defines scope, methods, and objectives of the
penetration test
■ Establishes legal cover and authorizations to ensure testers can ethically
and legally perform the test
○ Types of Penetration Tests
■ White Box (Full Knowledge)
● Testers have all relevant system details; typically more
cost-effective
■ Black Box (No Knowledge)
422
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
423
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
424
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Reporting Phase
● Documents all findings, vulnerabilities, and remediation
recommendations
● Includes an executive summary and a technical report for different
audiences
● Maps findings to rules of engagement and details each attack
attempt and its results
○ Post-Test Cleanup
■ Recover affected hosts, remove scripts/tools, and return the system to its
original state
○ For the exam, remember
■ Purpose and actions for each penetration testing phase
■ The need to document findings and results in detail during the reporting
phase
● Log Reviews
○ Overview of Log Reviews
■ Logs are chronological records of system-related events, capturing actions
like creations, modifications, and deletions
■ Often called audit logs or audit trails, they are essential for tracking and
auditing system activities
○ Key Concepts
■ Syslog
● A standardized format for collecting and transferring log data
425
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Contains facility codes for log types (e.g., Auth = 4, AuthPriv = 10)
and severity levels (0 = most detailed, 7 = least detailed)
● Commonly configured at levels 5 (notice) or 6 (information) to
meet regulatory standards
● No authentication mechanism, so security measures should be
considered when configuring Syslog
■ Clock Synchronization (Network Time Protocol, NTP)
● Essential for accurate timestamps and reliable chronological event
sequences
● NTP runs on port 123 (UDP) and synchronizes time using Stratum
clocks
● Stratum 0 and 1 clocks are most accurate and preferred for
logging, while Stratum 2 clocks are less reliable
○ Log Protection and Security Best Practices
■ Store log data on remote servers to avoid tampering and ensure integrity.
■ Use file and directory permissions to allow read-only access, preventing
unauthorized modifications
■ Hash logs periodically to verify data integrity
■ Conduct periodic log assessments to meet policy and compliance
requirements
○ For the CISSP exam, remember
■ Purpose of logs for tracking system events and audit trails
■ The function of Syslog for standardized logging and NTP for time
synchronization
426
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Best practices for log protection, including secure storage and periodic
reviews
427
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
428
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Static Testing
■ Static Application Security Testing (SAST)
● Analyzes code without running it
○ E.g., reviewing code in a text editor
■ Dynamic Testing
● Dynamic Application Security Testing (DAST)
○ Analyzes code while it’s running in a production
environment, often when code cannot be taken out of
production
○ Fagan Inspection Process (Phased Code Review Process)
■ Planning
● Organize and prepare for the review
■ Overview
● Define the scope of the review and establish roles and expected
outcomes.
■ Inspection
● Examine the code for potential flaws and vulnerabilities
■ Rework
● Collaborate with developers to remediate identified flaws
■ Follow-up
● Verify that remediation was successfully implemented
○ Key Points for the CISSP Exam
■ Understand the differences between static and dynamic testing methods
■ Know the steps of the Fagan inspection process and their purpose within
a code review
429
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Misuse Testing
○ Overview of Misuse Testing
■ Misuse testing simulates improper or malicious use of software or
systems from an attacker’s or user’s perspective
■ Also known as abuse case testing, it aims to uncover how a system might
respond to misuse and identify potential vulnerabilities
○ Key Steps in Misuse Testing
■ Identify Critical Assets
● Determine critical business functions, applications, or services.
● Prioritize assets based on their importance to the organization.
■ Define Security Goals
● Set expected outcomes for the test and identify which aspects
require protection.
■ Identify Threats
● Identify and analyze risks to each critical asset, often through
threat modeling or risk analysis.
■ Define Security Requirements
● Outline specific security needs, recognizing the need to prioritize
due to resource constraints.
○ Misuse Test Visualization - UML Diagram
■ Unified Modeling Language (UML) diagrams help map user and attacker
interactions with the system
■ Shows legitimate user activities and potential misuse by attackers,
highlighting vulnerabilities and potential security requirements
430
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Interface Testing
○ Overview of Interface Testing
■ Interface testing evaluates the connections between different
components or systems, focusing on how data is exchanged
○ Common interfaces include
■ Application Programming Interface (API)
● Used for software-to-software communication
■ User Interface (UI)
● How users interact with applications and systems.
■ Physical Interfaces
● Physical connections between hardware components (cables,
wireless, etc.)
○ Purpose and Focus of Interface Testing
■ Validates data exchange to ensure security and functionality across
interfaces
431
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
432
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Compliance Testing
○ Overview of Compliance Testing
■ Purpose
● Ensures adherence to standards, helping identify vulnerabilities
and demonstrate data protection (due care) and ongoing
compliance (due diligence)
■ Approach
● Involves security assessments and audits, both internally and
externally, to verify proper control implementation
○ Key Standards for Compliance
■ SSAE 18 & SOC Reports
● SSAE 18
○ A standard for audit reporting in financial services
■ SOC 1, 2, 3
● Different SOC reports assess financial and security control
standards. SOC 1 focuses on financial controls; SOC 2 covers
security and privacy controls; SOC 3 is a high-level summary for
public use
■ PCI DSS Compliance
● Merchant Levels
○ PCI DSS requirements vary by transaction volume. Level 1
(over 6 million transactions) requires a Report on
Compliance (ROC) by a Qualified Security Assessor (QSA),
while Levels 2-4 may only need a Self-Assessment
Questionnaire (SAQ)
433
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ CSA STAR (Cloud Security Alliance Security Trust Assurance and Risk)
● Level 1
○ Self-assessment for low-risk data environments
● Level 2
○ Requires third-party auditing for regulated or higher-risk
data environments
○ CISSP Exam Focus
■ Understand SOC reports
● Types and purposes, especially SOC 1 (financial), SOC 2 (security),
and SOC 3 (public)
■ Know PCI DSS levels
● Requirements by merchant level, especially ROC for Level 1
■ CSA STAR Levels
● Self-assessment for low-risk vs. third-party audits for high-risk
environments
434
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
435
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
436
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
437
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
438
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Objectives:
● 7.2 - Conduct logging and monitoring activities
● 7.4 - Apply foundational security operations concepts
● 7.7 - Operate and maintain detection and preventative measures
439
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
440
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
441
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
442
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
443
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
444
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
445
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
446
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● IDS/IPS Systems
○ Purpose of IDS and IPS
■ Intrusion Detection (IDS)
● Listens and reports on unauthorized access attempts,
circumventing security or privacy controls
■ Passive
● Monitors activity without taking action
● Methods include packet inspection, log analysis
■ Intrusion Prevention (IPS)
● Actively detects and responds to security incidents
● Also known as active IDS
● Takes action to block attacks by altering device configurations
○ NIST and ISO Standards for IDS and IPS
■ NIST Special Publication 800-94
● Guide to Intrusion Detection and Prevention Systems
■ ISO/IEC 27039
● Selection, deployment, and operations of IDS and IPS
447
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Detection Types
■ Knowledge-Based Detection (Signature-Based)
■ Compares monitored events with known attack signatures (signature files
or database required)
■ Requires constant updates to detect emerging threats
■ Also called pattern matching detection
○ Behavior-Based Detection (Anomaly-Based)
■ Compares current activity against profiles of normal activity
■ Requires a learning period to establish baseline behaviors
■ Prone to false positives due to unexpected but legitimate activity
■ Also known as heuristic-based or statistical intrusion detection
○ Stateful Protocol Analysis
■ Analyzes events against current communication protocol states
■ Uses vendor-provided signature profiles to detect protocol anomalies
○ IDS and IPS Deployment Types
■ Network-Based IDS (NIDS) and Network-Based IPS (NIPS)
■ Monitors and analyzes network-wide activity
■ Network IPS must be in line with network traffic to prevent attacks
effectively
○ Host-Based IDS (HIDS) and Host-Based IPS (HIPS)
■ Monitors specific host activity for violations
■ Cannot analyze network-level threats or misconfigurations
○ Wireless IDS and Wireless IPS
■ Monitors wireless network traffic for protocol-related anomalies
○ Network Behavior Analysis
448
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
449
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
450
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Malicious Software
○ Malware
■ Malicious software designed to harm or exploit computer systems
■ Includes software and malicious code (malcode) or scripts targeting
specific harmful functions
■ Purpose includes causing damage, stealing data, exfiltrating data, or
extorting money
451
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Types of Malware
■ Worms
● Self-contained, replicate independently without human
intervention
■ Logic Bombs
● Activate under specific conditions
○ E.g., timer, file opening
■ Trojan Horses
● Disguised as legitimate applications; install malware upon
execution
■ Remote Access Trojans (RATs)
● Create backdoor access for attackers
■ Ransomware
● Encrypts data and demands ransom for decryption key
■ Keyloggers
● Record keystrokes to capture sensitive information
■ Zero-Day Malware
● Exploits vulnerabilities with no available defense or patch
○ Additional Malware Types
■ Spyware
● Monitors and collects data (e.g., credentials) from remote
computers
● Techniques include keylogging, screen scraping, screen capture
■ Adware
● Collects user interest data, can expose personal information
452
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Bots
● Malware-infected computers controlled by attackers
○ E.g., for DDoS attacks
■ Botnet
● Network of bots controlled by a Botmaster using a
command-and-control server
■ Viruses
● Attach to legitimate applications, designed to infect and spread
widely
● Over 300 million types globally
○ Virus Types by Infection Method
■ Master Boot Record Virus
● Infects first boot sector, loaded upon device startup
■ File Infector Virus
● Infects files and activates upon file execution
■ Macro Virus
● Infects Microsoft Office products using Visual Basic for
Applications (VBA)
■ Service Injection Virus
● Infects trusted system services to evade detection
○ Types of Viruses by Behavior
■ Polymorphic Virus
● Alters itself as it spreads to evade detection
■ Encrypted Virus
453
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Anti-Malware
○ Purpose of Anti-Malware
■ Software designed to scan, detect, isolate, and remove types of malware
■ Protects systems by analyzing files for malware during download or
execution
○ Types of Malware Detection
■ Signature-Based Detection
● Compares files against known malware signatures from a
vendor-provided database
● Requires regular updates to be effective against recent threats
● Also known as knowledge-based detection or pattern matching
detection
■ Heuristic-Based Detection
454
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
455
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Regular Updates
● Ensures that anti-malware software and signature files are current
■ Access Controls
● Implement whitelist (permit by exception) and blacklist (deny by
exception) policies
○ Security Awareness Training
■ Educate users on safe browsing and email practices
■ Teach recognition of phishing and social engineering attempts
■ Promote cautious behavior around file downloads and external links
○ Key Takeaways for Exam
■ Understand the function and importance of anti-malware software
■ Know the difference between signature-based and heuristic detection
■ Recognize the importance of security awareness training in malware
prevention
456
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
457
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
458
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
459
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
460
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
461
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
462
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
463
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
464
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
465
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
466
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
467
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Threat Intelligence
○ Overview of Threat Intelligence
■ Analyzed information used to make threat-based decisions
■ Purpose
● Supports security operations by providing insights on potential
threats, enabling informed and proactive defense measures
468
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
469
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Threat Hunting
● Proactive search for threats that are not detected by existing
alerts
● Goes beyond known indicators to identify new or hidden threats
● Uses insights from threat intelligence to guide investigations
across the system
○ Threat Intelligence Tools and Platforms
■ Threat Feeds Tools
● Examples
○ Yeti, AlienVault
● Function
○ Ingests threat feed data and translates it into actionable
information
○ Provides insight on malware, malicious domains, and
current crimeware trends
■ Threat Hunting Tools
● Uses threat intelligence to aid analysts in identifying and
mitigating potential threats within the network
● Can be part of SIEM or stand-alone tools for detailed analysis
○ Benefits of Threat Intelligence
■ Enhanced Defense
● Improves security posture by using verified threat data
■ Proactive Threat Hunting
● Moves security operations from reactive to proactive
■ Informed Decision-Making
470
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
471
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Procedures
● How techniques are implemented in attacks
■ Categories
● Reconnaissance
○ Gathering information through passive means, open
source intelligence (OSINT), phishing, etc.
● Resource Development
○ Identifying attack vectors and assets for potential
exploitation
● Initial Access
○ The point where an attacker first gains entry to the system
● Execution
○ Running malicious code or scripts
● Persistence
○ Maintaining access to the system by manipulating
accounts or processes
● Privilege Escalation
○ Gaining higher access privileges to critical system functions
● Defense Evasion
○ Avoiding detection by intrusion detection systems (IDS) or
endpoint security tools
● Credential Access
○ Acquiring credentials for further access
● Discovery
○ Locating more resources or systems to exploit
472
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Lateral Movement
○ Moving across the network (east-west traffic) between
resources
● Collection
○ Gathering target data
● Command and Control
○ Taking control of compromised systems
● Exfiltration
○ Transferring stolen data out of the organization
● Impact
○ Affecting system operations or compromising
confidentiality, integrity, or availability (CIA)
○ Applications in Threat Modeling
■ Reconnaissance
● Identify publicly available information on systems, users, or
network structure
● Conduct OSINT to understand potential weaknesses in
external-facing systems
■ Resource Development
● Identify possible attack vectors
○ E.g., SQL injection on a database or web application
■ Initial Access & Execution
● Identify potential entry points for malware
○ E.g., email, web applications
473
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
474
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Familiarize with each of the major categories and their role in the
attack lifecycle for informed threat modeling
475
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
476
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
477
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
478
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Incident Response
● Incorporate the kill chain model into the incident response to
address potential points of compromise
○ Key Takeaways for the Exam
■ APTs
● Know that the cyber kill chain targets APTs, sophisticated,
persistent threats using various attack vectors
■ Stages of the Kill Chain
● Familiarize with each stage, its objective, and how it fits into the
overall attack strategy
■ Defensive Strategy
● Understand the value of proactively identifying and breaking the
kill chain to prevent attackers from reaching their goals
479
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
480
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Execution
○ Executes playbook steps to respond to incidents and
prevent escalation
● Analysis
○ Analyzes scope and identifies root cause of security threats
through automated investigation
○ Key Terms in SOAR
■ Playbook
● A set of predefined actions to investigate and respond to incidents
automatically
■ Purpose
● Standardizes the response process, creating a repeatable
approach to specific threats
○ E.g., phishing, malware detection
○ Runbook
■ A script that calls one or more playbooks and manages their execution
■ Role
● Functions as a master sequence or “cookbook,” executing
necessary playbooks in response to a detected event
■ Example
● A phishing alert might trigger a runbook that calls a playbook for
email analysis, IP reputation checks, and user notification
○ Example Workflow Using SOAR
■ Trigger Detection
● An email phishing attempt is detected through SIEM data
481
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Runbook Execution
● The runbook initiates the phishing playbook
■ Playbook Actions
● Analyzes the email sender’s reputation
● Inspects email content for malicious links
● Flags the user account if suspicious
■ Response Outcome
● Incident handled without manual intervention
○ Key Takeaways for the Exam
■ SOAR Purpose
● Understand that SOAR is a tool for automated, efficient incident
response
■ Playbook & Runbook Functions
● Playbook
○ Contains the response steps
● Runbook
○ Executes one or more playbooks as part of an automated
response
● Vendor Variability
○ Terminology (playbook, runbook, workbook) may vary
depending on the vendor, so focus on understanding the
core functions rather than specific terms
482
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Behavior Analytics
○ Overview of Behavior Analytics
■ Behavior Analytics involves monitoring and analyzing user and device
activities to detect potential security threats
■ Purpose
● Used to detect anomalous behavior that could indicate security
incidents, such as unauthorized access or data exfiltration
■ Common Terms
● User Behavior Analytics (UBA)
○ Focuses on individual user behavior
● User and Entity Behavior Analytics (UEBA)
○ Includes both user and device behavior in analysis
■ Network Behavior Analytics
● Analyzes network traffic for anomalies
○ Behavior Analytics Process
■ Baseline Behavior
● Establish a profile of typical user and system behavior, such as
login patterns, application usage, and data access frequency
● Example
○ Monitoring workstations for regular activity
■ E.g., logging in, accessing applications, making API
calls
■ Anomaly Detection
● Identifies deviations from established norms to flag potentially
suspicious activities
483
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Example
○ A workstation running a vulnerability scan (normally
conducted by a specific vulnerability server)
■ Threat Detection
● Detects privileged account abuse, privilege escalation, data
exfiltration, and stealthy or unseen attacks
● Enables detection of abnormal behavior potentially missed by
other systems like IDS, IPS, or DLP
○ Key Tools for Behavior Analytics
■ SIEM Systems
● Security Information and Event Managers (SIEM) aggregate logs
from various sources and assist in detecting anomalous behavior
■ Examples
● Elastic Stack, AlienVault, RSA
■ Behavior Analytics Platforms
● Splunk
○ Provides advanced threat detection through machine
learning, supporting multiple log types (identity, DNS,
network, application)
■ Key Capabilities
● Machine learning for identifying unknown threats
● Anomaly detection for early threat identification
● Aggregation of anomalies into unified threat profiles, aiding in
threat investigation
484
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
485
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Configuration Management
Objectives:
● 7.3 - Perform configuration management (CM)
○ E.g., provisioning, baselining, automation
● 7.5 - Apply resource protection
● 7.8 - Implement and support patch and vulnerability management
● 7.9 - Understand and participate in change management processes
● 8.1 - Understand and integrate security in the Software Development Life Cycle (SDLC)
● 8.2 - Identify and apply security controls in software development ecosystems
486
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
487
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Configuration Management
○ Purpose of Configuration Management
■ Ensures system components maintain a known configuration state
■ Prevents unauthorized changes to system components
○ Configuration Management Terms
■ Configuration
● Specifications or settings of an asset
○ E.g., server, workstation, firewall
■ Configuration Item (CI)
● Asset requiring configuration control
■ Configuration Management Plan (CM Plan)
● Document outlining the processes and procedures to manage
configurations
○ Configuration Management Plan Components
■ Defines purpose, scope, roles, responsibilities, processes, and procedures
■ Outlines how CIs are managed and controlled
■ Identifies configuration items that need control (not all assets are CIs)
○ NIST Special Publication 800-128 (Four Main Phases of Configuration
Management)
■ Planning Phase
● Identify configuration items (CIs) to determine the configuration
management plan's scope
488
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
489
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
490
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
491
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Agentless Patching
● Scans network traffic to detect patch needs
● Limited to protocol vulnerabilities; may miss application-specific
issues
■ Passive Network Monitoring
● Monitors network traffic to identify patching needs
● Identifies protocol vulnerabilities but not specific application
patches
■ Decentralized Patching
● Each host manages its patches independently
● Lacks central control and baseline consistency
○ Comparison of Patch Management Methods (NIST SP 800-43)
■ Agent-Based
● Requires administrative privileges
● Supports remote hosts
● Most effective for patch management control
■ Agentless
● Requires administrative privileges
● Minimal bandwidth but limited visibility into deep configurations
■ Passive Network Monitoring
● No administrative privileges required
● Good for unmanaged hosts and appliances but limited to protocol
vulnerabilities
○ General Patch Management Steps
■ Evaluation
492
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Change Control
○ Overview of Change Control
■ Also known as change management; terms are interchangeable
■ Process for requesting, approving, and implementing changes to secure
baseline configurations
○ Purpose of Change Control
■ Ensures system components maintain an authorized configuration state
493
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
494
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
495
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
496
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
497
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
498
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Media Management
○ Media
■ Refers to any medium capable of storing data
■ Examples include hard drives, solid-state drives, backup tapes, CDs, DVDs,
mobile devices, thumb drives, and more
○ Primary Focus in Media Management
■ Protection of the confidentiality, integrity, and availability (CIA) of data
stored on media
■ Ensures that media is tracked and managed effectively to prevent
unauthorized access and maintain data availability
○ Media Lifecycle and Mean Time to Failure
■ All media has a finite life cycle and a mean time to failure (MTTF),
impacting data availability
499
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
500
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
501
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Incident Management
Objectives:
● 1.5 - Understand requirements for investigation types (i.e., administrative, criminal, civil,
regulatory, industry standards)
● 7.1 - Understand and comply with investigations
● 7.6 - Conduct incident management
502
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
503
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Incident Management
○ Purpose of Incident Management
■ Manages events violating security policy, whether intentional or
inadvertent
■ Detects, responds to, and recovers from incidents based on their impact
on systems
○ Key Guides for Incident Management
■ NIST SP 800-61 Rev 2
● Computer Security Incident Handling Guide
■ ISO/IEC 27035
● Information Security Incident Management standard
○ Incident Management Steps (CBK)
■ Detection
■ Response
■ Mitigation
■ Reporting
■ Recovery
■ Remediation
■ Lessons Learned
○ Incident Management Steps (NIST Mapping)
■ Preparation
504
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
505
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Reporting
● Generates detailed reports on the incident, including findings,
actions, and recovery status
● Internal reports
○ Provide senior management with situational awareness
● External reports
○ Meet regulatory requirements without disclosing
confidential details
● GDPR requires reporting personal data breaches within 72 hours
■ Recovery
● Restores systems temporarily to operational state to prevent
business impacts
● Activates BCP/DRP if recovery cannot meet the maximum
tolerable downtime
● May involve temporarily enabling critical system components,
accounts, or connections
■ Remediation
● Restores systems to full operational status post-incident
● Repairs system damage, addresses legal impacts, and assesses
financial costs
○ Lessons Learned
■ Analyzes incident handling, identifies gaps, and enhances response plans
■ Evaluates threat causes, preventive actions, and stakeholder
improvements
■ Implements and monitors changes for effectiveness in incident response
506
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Bottom Line
■ Know each incident management step, its purpose, and what happens in
each
● Security Investigations
○ Purpose of Investigations
■ Collects and analyzes facts related to an event to determine its
occurrence or non-occurrence
■ Supports legal and organizational compliance by verifying event
outcomes and identifying violations
○ Roles in Investigations
■ Primarily a support role for security professionals unless trained in
forensics
■ Responsibilities may include evidence collection, protection, chain of
custody maintenance, and possible court testimony
○ Burden of Proof
■ Criminal Proceedings
● Prove beyond a reasonable doubt to a jury (12 reasonable peers)
that the crime occurred
■ Civil Proceedings
● Prove by the preponderance of evidence (more likely than not)
that a civil offense took place
■ Plaintiff (criminal) or Claimant (civil)
● Accuses or blames the Defendant (criminal) or Respondent (civil)
507
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
508
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
509
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
510
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
511
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
512
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
513
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Digital Forensics
○ Digital Forensics Overview
■ Collection and analysis of digital evidence from computers and electronic
devices
514
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Identification
● Locate potential sources of evidence
■ Preserve
● Protect information from alteration, deletion, or changes
● Ensures data integrity
■ Collect
● Gather necessary information for the forensic process
■ Process
● Screen and process collected information for relevance
● Analyze data to ensure it meets evidence guidelines
■ Review
● Evaluate the information for relevance to the investigation
■ Analyze
● Determine the significance and implications of the data
■ Produce
515
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
516
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
517
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Analysis
● Formulates an investigative conclusion based on examined
evidence
● Establishes an audit trail of events, devices, and persons involved
● Ensures conclusions are supported by evidence beyond a
reasonable doubt or preponderance of evidence
○ Reporting
■ Documents forensic data to explain conclusions
■ Focuses on accuracy and authenticity in reporting to prove conclusions in
court
■ Presents findings with admissible evidence and clear explanations
○ Considerations for Forensic Investigations
■ Investigators should be competent and aware of potential data sources
■ Uses a consistent policy, process, and procedure for investigations
■ Individuals handling digital evidence are responsible for compliance with
policies
■ Chain of custody is critical for evidence handling, logging, and transferring
○ Key Points for Exam
■ Know each phase of the digital forensic process
■ Recognize the importance of chain of custody and admissible evidence
■ Understand the role of investigators and tools in forensic analysis
518
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Objectives:
● 1.7 - Identify, analyze, assess, prioritize, and implement Business Continuity (BC)
requirements
● 7.10 - Implement recovery strategies
● 7.11 - Implement disaster recovery (DR) processes
● 7.12 - Test disaster recovery plans (DRP)
● 7.13 - Participate in Business Continuity (BC) planning and exercises
519
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
520
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Types of tests
● Tabletop exercises, simulation tests, and more
521
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
522
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
523
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● MTD
○ 60 minutes (1 hour of downtime before business is
impacted)
● RTO
○ 30 minutes (time to fully restore authentication server)
● RPO
○ Time of last backup used to restore, representing
maximum data loss allowed
○ Useful Reference
■ NIST SP 800-34
● Contingency Planning Guide for Federal Information Systems
○ Key BIA Steps
■ Identify critical business processes and stakeholders
■ Evaluate potential impacts (risks) and determine tolerance levels
■ Document MTD, RTO, and RPO for each critical process and asset
○ Key Takeaways
■ Understand BIA’s purpose
■ Identify critical business functions
■ Know the measures of impact
524
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
525
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Flood Zones
● FEMA Flood Zone Designation defines flood risk
○ 100-Year Floodplain
■ 1% chance of flood occurring in a year
○ 500-Year Floodplain
■ 0.2% chance of flood occurring in a year
○ Flood Map Example
■ High flood risk in red areas; Central Texas typically
low-risk
○ Man-Made Disaster Considerations
■ Crime rates and local police reports help assess facility safety
■ Includes risks such as sabotage, terrorism, and utility attacks
● E.g., power or water supply
○ Business Continuity vs. Disaster Recovery
■ Business Continuity (BC)
● Focus on operational processes and critical business functions
■ Disaster Recovery (DR)
● Focus on maintaining IT assets that support business operations
● Ensures application servers, web servers, database servers, and
networks remain functional
○ Key Takeaway
■ Know the impacts of natural and man-made disasters on your
organization
■ Distinguish between business continuity (operations focus) and disaster
recovery (technology focus)
526
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
527
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● RAID 1 (Mirroring)
○ Identical data on two disks, high resilience and security
● RAID 5 (Striping with Parity)
○ Requires three or more disks, data can be restored using
parity information
● RAID 10 (Stripe of Mirrors)
○ Combines striping and mirroring, uses four or more disks
○ Server Protection
■ Failover Cluster
● Two or more servers/nodes connected to maintain availability
during a failure
■ Load Balancing
● Distributes network traffic among multiple servers to increase
response times and system resilience
○ Power Protection
■ UPS (Uninterruptible Power Supply)
● Short-term battery backup, provides power briefly during an
outage
■ Generators
● Motor-driven machines for long-term power backup, require fuel
supply and maintenance
■ Additional Options
● Voltage Regulators
○ Maintain consistent voltage levels
● Line Conditioners
528
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
529
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Key Takeaways
■ Know RAID levels for storage resilience
■ Understand system resilience options (fault tolerance, high availability)
■ Be familiar with power and network protection methods (UPS,
generators, QoS)
■ Recognize the importance of fail-secure configuration
530
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
531
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Example
○ An organization in Silicon Valley may choose a recovery site
in Seattle or Denver for regional separation
○ Key Points
■ Understand the characteristics of each site type (cold, warm, hot) and
other options (mobile, cloud, shared)
■ Recognize the importance of geographical separation for recovery sites
532
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ E.g., Sunday
■ Differential Backup
● Backs up changes since the last full backup
● Does not reset the archive bit
■ Incremental Backup
● Backs up changes since the last full or incremental backup
● Only changes with the archive bit set to 1 are backed up
○ Backup Strategy Example
■ Full Backup on Sunday
■ Incremental Backups on Monday, Tuesday, Thursday, Saturday
■ Differential Backup on Wednesday and Friday
■ New full backup cycle starts on the following Sunday
○ 3-2-1 Backup Rule
■ 3 copies of data
■ 2 copies stored on different storage media (on-premise)
■ 1 copy stored off-premise
○ Electronic Vaulting
■ Remote Journaling
● Sends logs and metadata off-premise for audit and recovery
■ Remote Mirroring
● Streams real-time data changes to off-premise location
○ Backup Storage Media Options
■ Can include tapes, disks, external drives, etc.
○ Snapshot Backups
533
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
534
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
535
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
536
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Key Points
■ Know the difference between Business Continuity Planning (BCP) and
Disaster Recovery Planning (DRP)
■ Human life is the top priority in all DRP processes
■ Understand each recovery process's purpose, including documentation,
communication, and personnel processes
537
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
538
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
539
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Objectives:
● 8.1 - Understand and integrate security in the Software Development Life Cycle (SDLC)
● 8.2 - Identify and apply security controls in software development ecosystems
540
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
541
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Security measures for code repos include access control, audit logging,
and threat monitoring
● Software Development Lifecycle
○ Software Development Lifecycle (SDLC)
■ Series of phases that move software from inception to reproduction
■ Aims to mature the software product throughout the lifecycle
○ Key Phases of SDLC
■ Initiation
● Define and document the need for a new system or software
product
● Conduct a Privacy Impact Assessment (PIA)
● Identify privacy, security, and data protection requirements
● Determine whether to build or acquire the product
■ Development and Acquisition
● Understand risks associated with developing or acquiring software
● Determine security and privacy controls needed
● Update security documentation as needed
● Output includes a Risk Assessment Report and updated security
architecture design
■ Implementation and Assessment
● Obtain stakeholder approval for deployment
● Securely deploy the new software to production
● Conduct a security assessment or audit for compliance
● Update documentation as necessary
542
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
543
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
544
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Operations
■ Sequential model requiring completion of one step before moving to the
next
■ Allows feedback loops between steps, such as Testing back to
Implementation
■ Lacks a completion step like disposal or retirement, continuing as an
iterative process
■ Drawbacks
● Requires requirements definition upfront before moving to design
● Limits flexibility and agility if new requirements arise during
development
● Suitable for high-risk or sensitive applications needing methodical
planning
○ Increment Build Model
■ Model focused on building software in smaller, manageable parts or
increments
■ Emphasizes specific functions and tasks developed in increments that are
compiled to complete the project
■ Resembles Agile but predates it
■ Steps include Analysis, Design, Coding, Testing, and Delivery for each
increment
■ Enables system engineering during analysis and design phases
■ Allows for learning from previous increments to improve future
increments
■ Helps in adapting to environmental impacts and dependencies
545
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Spiral Model
■ Model allows revisiting of development phases multiple times for each
prototype
■ Steps include Planning, Risk Analysis, Engineering, and Evaluation
■ Risk analysis focuses on software development, not security
■ Prototypes are repeatedly cycled through phases for ongoing evaluation
and improvement
■ Drawbacks
● Challenging to integrate security with multiple prototypes in
various stages
● Can be cumbersome for ensuring security at each phase
546
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
547
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
548
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Agile Development
○ Agile Development Overview
■ A flexible, adaptive approach to software development
■ Emphasizes collaboration, problem-solving, and adaptability over strict
processes
■ Agile mindset focuses on fluid and collaborative development
○ Agile Core Values
■ Individuals and Interactions over processes and tools
● Focus on developers, customers, stakeholders, and their
interactions rather than tools or specific models
■ Working Software over comprehensive documentation
549
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
550
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
551
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
552
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
553
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ DevSecOps Overview
■ Integrates security into DevOps to ensure compliance before deployment
■ Known as Security as Code
● Embeds security checks (e.g., scans, configurations) within the
pipeline
○ DevSecOps Manifesto Principles
■ Lean In
● Security listens and collaborates rather than just rejecting ideas
● Data and Science over Fear, Uncertainty, and Doubt
● Open Contribution and Collaboration over strict security
requirements
● Consumable Security Services with APIs over mandated controls
and paperwork
● Business-Driven Security Scores over token approvals
● Red and Blue Team Testing over sole reliance on scans
● 24/7 Proactive Security Monitoring over reactive incident
response
● Shared Threat Intelligence over isolated knowledge
● Compliance Operations over mere checklists
554
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
555
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
556
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
557
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Safety
○ Safety approach for organizations
● People Management
○ People Capability Maturity Model (PCMM)
■ Five maturity levels
● Level 1 - Initial
○ Unpredictable, reactive processes
● Level 2 - Managed
○ Project-level management (planned, performed,
measured, controlled)
● Level 3 - Defined
○ Organization-wide standards guiding projects
● Level 4 - Measured and Controlled
○ Data-driven, quantitatively controlled processes
● Level 5 - Optimizing
○ Stable, flexible processes with continuous improvement
○ Software Assurance Maturity Model (SAM)
■ Developed by OWASP to analyze and improve software security posture
■ Integrates security strategy within the Software Development Lifecycle
(SDLC)
■ Focuses on lifecycle stages
● Governance
○ Administrative controls
● Design, Implementation, Verification, Operations
558
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
559
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
560
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
561
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
562
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Code Repositories
○ Purpose of Code Repositories (Repos)
■ Centralized storage for software code
■ Supports collaborative software development by providing features such
as
● Web hosting, notifications, wiki pages, secure storage, code
review, version control, and bug tracking
○ Git and Code Repositories
■ Git is the most commonly used version control language for code
repositories
■ Developed by Linus Torvalds, released in 2005
■ Allows developers to interact with code files, supporting version control
563
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
564
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Application Security
Objectives:
● 8.2 - Identify and apply security controls in software development ecosystems
● 8.3 - Assess the effectiveness of software security
● 8.4 - Assess security impact of acquired software
● 8.5 - Define and apply secure coding guidelines and standards
● Application Security
○ Programming Languages and Application Security
■ Every programming language introduces unique security considerations
■ Security issues may arise from memory management or injection
vulnerabilities
■ Understanding different programming languages helps in selecting
appropriate security controls
○ Application Security Testing
■ Static analysis
● Examines code without executing it, identifying vulnerabilities
early in the SDLC
■ Dynamic analysis
● Tests the application in real-time to uncover vulnerabilities during
execution
■ Both testing methodologies are crucial for early identification of security
issues
565
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Software Assurance
■ Ensures software functions as intended while protecting against threats
■ Verifies that software meets security requirements through development
practices and evaluations
○ Acquired Software Security
■ Involves assessing third-party, open-source, and cloud software for
security risks
■ Requires due diligence, such as conducting security reviews and
vulnerability assessments, to ensure the software aligns with
organizational standards
○ Application Attacks
■ Common application attacks include injection attacks and cross-site
scripting (XSS)
■ Secure coding guidelines and standards help defend against these attacks
■ Key focus on secure coding practices to mitigate risks from these types of
attacks
○ OWASP Top 10 Vulnerabilities
■ 2017 Top 10 includes vulnerabilities such as injection, broken
authentication, and sensitive data exposure
■ Updated 2021 list includes new vulnerabilities like insecure design and
server-side request forgery (SSRF)
■ Understanding OWASP vulnerabilities is critical for preventing application
breaches
○ Software API Security
566
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
567
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
568
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Code Libraries
■ Contains reusable code, procedures, or programs for software
development
■ Enhances efficiency, consistency, and security when properly managed
■ Examples include
● DLL files, Java Runtime Environment (JRE), and libraries hosted in
code repositories like GitHub or Bitbucket
○ Runtime Environment
■ Combination of hardware and software resources necessary to execute
an application
■ Includes servers, operating systems, compilers, interpreters, storage, and
network connections
■ Requires proper security measures such as hardening, configuration
management, and monitoring
○ Software Development Kit (SDK)
■ A toolkit containing the tools to create, compile, test, and debug software
applications
■ Platform-dependent, specific to environments like Windows, Unix/Linux,
or mobile OS
■ May include third-party resources
■ Integrated Development Environment (IDE)
● Provides a graphical user interface for SDKs, simplifying
development
● Examples
○ Visual Studio, NetBeans, Eclipse
569
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
570
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Testing Approaches
■ White Box Testing
● Performed by internal testers with full knowledge of the source
code; uses SAST
■ Black Box Testing
● Performed by third-party testers with no knowledge of source
code; uses DAST
○ Additional Types of Software Tests
■ System Test
● Verifies that software meets functional and security requirements
■ Unit Test
● Tests specific application components or scripts
■ Integration Test
● Ensures interoperability between different software components
■ Regression Test
● Confirms that code updates do not introduce new security risks
■ Sanity Test
● Informally checks feature feasibility and functionality
■ Smoke Test
● Quickly assesses basic functionality of newly built software
■ Fuzz Testing
● Dynamic testing that sends invalid inputs to detect bugs and flaws
○ Types of Fuzz Testing
■ Mutational Fuzzing
● Uses valid data as seed data, then mutates to create invalid inputs
571
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Software Assurance
○ Purpose of Software Assurance
■ Provides confidence that software is secure and performs as designed
■ Assesses software security effectiveness
○ OWASP Application Security Verification Standard (ASVS)
■ Community-driven framework of security requirements and controls
572
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
573
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
574
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
575
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Use trusted vendors and implement supply chain risk management for
NDIs
576
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Application Attacks
○ Application Attacks
■ Targets flaws in inputs, session management, process operations, and
other areas at the source level code
■ Typically conducted through the application's user interface
○ Injection Attacks
■ SQL Injection
● Unauthorized SQL queries submitted to a database via a web
application
■ LDAP Injection
● Unauthorized queries to a directory server (e.g., LDAP or Active
Directory) to access account information
■ XML Injection
● Injection of unauthorized queries into XML-based applications
■ DLL Injection
● Malicious code placed in DLL files, typically targeting Microsoft
systems
577
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
578
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ Privilege Escalation
■ Horizontal Privilege Escalation
● Lateral movement across systems without increasing privilege
level
■ Vertical Privilege Escalation
● Gains higher privileges, often from a general user to an
administrator level
○ Time of Check and Time of Use (TOCTOU) Attack
■ Targets race conditions by modifying resources between the time of
check and time of use (TOC/TOU)
■ For example, intercepts a transaction after conditions are checked but
before it is executed to alter the result
○ Key Exam Points
■ Recognize various application attacks
● Injection, hijacking, rootkits, privilege escalation, and TOCTOU
● Understand how each attack exploits different aspects of
application flaws and vulnerabilities
579
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
580
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
581
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
582
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
○ DOM-based XSS
■ Malicious script modifies the Document Object
Model, impacting the browser's client-side code
● Mitigation
○ Use modern scripting languages with escape sequences,
and implement a Content Security Policy (CSP) for HTML
pages
■ Insecure Deserialization
● Process of reversing data serialization (format conversion) to reuse
an object; a risk in communication formats, especially JSON, XML,
and Python
● Mitigation
○ Use digital certificates or mutual authentication, sandbox
or isolate deserialization code, restrict connectivity to
applications that perform serialization
■ Components with Known Vulnerabilities
● Risk caused by using software components with known
vulnerabilities, which increase exploitation potential
● Mitigation
○ Identify known vulnerabilities, apply patches, monitor the
vulnerabilities, research them via sources like the National
Vulnerability Database (NVD) and Common Vulnerabilities
and Exposures (CVE), and consider moving to newer
applications if critical
583
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
584
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
585
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
586
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
■ Note
● SOAP and REST are common on the CISSP exam; others (e.g.,
JSON-RPC, gRPC) are less likely to appear but are relevant in
modern implementations
○ API Security Measures
■ Require and protect API keys
● Long, complex keys used for authentication and authorization,
protected against unauthorized access
■ Data Type Security
● Understanding the type of data shared through APIs (e.g., health
information) to ensure compliance with regulatory policies
■ Testing APIs
● APIs should be included in software application testing (e.g., unit
tests, assessment tests) to ensure security measures like correct
protocols, whitelisting, and port control
■ Access and Resource Control
● Limit API permissions to only those necessary, preventing
excessive resource requests and potential DoS or DDoS attacks
■ Input Validation
● Reject invalid or unauthorized commands to prevent common
attacks
○ E.g., injection attacks
● Logging and Monitoring
○ Track API activities for potential threats and misuse
587
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
588
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Software-Defined Security
○ Overview of Software Defined Security
■ Provides security functions as part of developed software
■ Originated from virtualizing security functions, replacing traditional
hardware/software solutions like firewalls and IDS/IPS appliances
■ Encompasses concepts like Software Defined Networks (SDN),
Infrastructure as Code, and Software Defined Data Centers
○ Key Concepts in Software Defined Security
■ Security as Code
589
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
590
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
Conclusion
● Conclusion
○ Congratulations on completing your CISSP certification course! Here's a summary
of what you've accomplished and what lies ahead as you prepare for the exam
○ Course Recap
■ Extensive Coverage
● Explored 32 sections encompassing a wide range of information
security concepts and practices across all eight CISSP domains
■ In-depth Learning
● Delved into key areas such as Security Management, Asset
Security, Security Architecture, and more, ensuring a thorough
preparation for the CISSP exam
○ Importance of Course Topics
■ Comprehensive Understanding
● Each topic covered is crucial for not only passing the CISSP exam
but also for practical applications in securing organizations
■ Strategic Teaching Order
● The course content was structured not by following the CISSP
exam outline strictly but to facilitate easier learning and retention
of information
591
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
592
https://www.DionTraining.com
ISC2 CISSP
(Study Guide)
● Manage your time effectively during the exam, which will consist
of 100-150 questions over three hours, ensuring to address each
question thoughtfully
○ Certification Benefits
■ Career Advancement
● Achieving CISSP certification will open new career opportunities
and enhance your credibility and marketability in the field of
information security
■ Continual Learning
● The journey of learning does not end with this course or the
exam; continue to build on this foundation and stay updated with
the latest security trends and best practices
○ Community and Support
■ Engagement
● Share your success and insights within the community, and
participate in discussions to further enrich your understanding
and network with peers
■ Ongoing Education
● Look forward to more advanced courses and specialized learning
paths that can further deepen your expertise in specific areas of
information security
○ You've shown remarkable dedication and effort throughout this course. As you
move forward, remember that this journey is not just about passing an exam but
about becoming a leader in cybersecurity. Good luck, and here’s to your success
on the CISSP exam and beyond!
593
https://www.DionTraining.com