Introduction The CASP Exam |
|
2 | (36) |
|
The Goals of the GASP Certification |
|
|
3 | (2) |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
The Value of the GASP Certification |
|
|
5 | (2) |
|
To the Security Professional |
|
|
5 | (1) |
|
Department of Defense Directive 8140 and 8570 (DoDD 8140 and 8570) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
7 | (28) |
|
|
7 | (1) |
|
1.1 Summarize business and industry influences and associated security risks. |
|
|
7 | (1) |
|
1.2 Compare and contrast security, privacy policies and procedures based on organizational requirements. |
|
|
8 | (1) |
|
1.3 Given a scenario, execute risk mitigation strategies and controls. |
|
|
9 | (2) |
|
1.4 Analyze risk metric scenarios to secure the enterprise. |
|
|
11 | (1) |
|
2.0 Enterprise Security Architecture |
|
|
12 | (1) |
|
2.1 Analyze a scenario and integrate network and security components, concepts and architectures to meet security requirements. |
|
|
12 | (2) |
|
2.2 Analyze a scenario to integrate security controls for host devices to meet security requirements. |
|
|
14 | (3) |
|
2.3 Analyze a scenario to integrate security controls for mobile and small form factor devices to meet security requirements. |
|
|
17 | (2) |
|
2.4 Given software vulnerability scenarios, select appropriate security controls. |
|
|
19 | (2) |
|
3.0 Enterprise Security Operations |
|
|
21 | (1) |
|
3.1 Given a scenario, conduct a security assessment using the appropriate methods. |
|
|
21 | (1) |
|
3.2 Analyze a scenario or output, and select the appropriate tool for a security assessment. |
|
|
22 | (1) |
|
3.3 Given a scenario, implement incident response and recovery procedures. |
|
|
23 | (2) |
|
4.0 Technical Integration of Enterprise Security |
|
|
25 | (1) |
|
4.1 Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture. |
|
|
25 | (2) |
|
4.2 Given a scenario, integrate cloud and virtualization technologies into a secure enterprise architecture. |
|
|
27 | (1) |
|
4.3 Given a scenario, integrate and troubleshoot advanced authentication and authorization technologies to support enterprise security objectives. |
|
|
28 | (1) |
|
4.4 Given a scenario, implement cryptographic techniques. |
|
|
29 | (2) |
|
4.5 Given a scenario, select the appropriate control to secure communications and collaboration solutions. |
|
|
31 | (1) |
|
5.0 Research, Development and Collaboration |
|
|
31 | (1) |
|
5.1 Given a scenario, apply research methods to determine industry trends and their impact to the enterprise. |
|
|
31 | (1) |
|
5.2 Given a scenario, implement security activities across the technology life cycle. |
|
|
32 | (2) |
|
5.3 Explain the importance of interaction across diverse business units to achieve security goals. |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
CompTIA Authorized Materials Use Policy |
|
|
35 | (3) |
Chapter 1 Business and Industry Influences and Associated Security Risks |
|
38 | (26) |
|
Risk Management of New Products, New Technologies, and User Behaviors |
|
|
39 | (1) |
|
New or Changing Business Models/Strategies |
|
|
40 | (4) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
41 | (1) |
|
Acquisition/Merger and Divestiture/Demerger |
|
|
42 | (2) |
|
|
43 | (1) |
|
|
44 | (1) |
|
Security Concerns of Integrating Diverse Industries |
|
|
44 | (8) |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
45 | (5) |
|
|
45 | (1) |
|
|
46 | (4) |
|
|
50 | (2) |
|
|
50 | (1) |
|
|
51 | (1) |
|
Internal and External Influences |
|
|
52 | (2) |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
Internal and External Client Requirements |
|
|
53 | (1) |
|
|
54 | (1) |
|
Impact of De-perimeterization (e.g., Constantly Changing Network Boundary) |
|
|
54 | (6) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (2) |
|
|
58 | (1) |
|
Ensuring Third-Party Providers Have Requisite Levels of Information Security |
|
|
58 | (2) |
|
|
60 | (1) |
|
|
60 | (1) |
|
|
60 | (1) |
|
|
61 | (3) |
Chapter 2 Security, Privacy Policies, and Procedures |
|
64 | (32) |
|
Policy and Process Life Cycle Management |
|
|
65 | (5) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
70 | (1) |
|
Support Legal Compliance and Advocacy |
|
|
70 | (1) |
|
Common Business Documents to Support Security |
|
|
71 | (4) |
|
|
71 | (1) |
|
Business Impact Analysis (BIA) |
|
|
72 | (1) |
|
Interoperability Agreement (IA) |
|
|
72 | (1) |
|
Interconnection Security Agreement (ISA) |
|
|
72 | (1) |
|
Memorandum of Understanding (MOU) |
|
|
73 | (1) |
|
Service-Level Agreement (SLA) |
|
|
73 | (1) |
|
Operating-Level Agreement (OLA) |
|
|
73 | (1) |
|
Non-Disclosure Agreement (NDA) |
|
|
74 | (1) |
|
Business Partnership Agreement (BPA) |
|
|
74 | (1) |
|
Master Service Agreement (MSA) |
|
|
75 | (1) |
|
Security Requirements for Contracts |
|
|
75 | (2) |
|
Request for Proposal (RFP) |
|
|
76 | (1) |
|
|
76 | (1) |
|
Request for Information (RFI) |
|
|
76 | (1) |
|
|
77 | (1) |
|
General Privacy Principles for Sensitive Information |
|
|
77 | (1) |
|
Support the Development of Policies Containing Standard Security Practices |
|
|
78 | (13) |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (3) |
|
|
83 | (1) |
|
Rules of Engagement, Authorization, and Scope |
|
|
83 | (1) |
|
|
84 | (1) |
|
Employment and Termination Procedures |
|
|
85 | (1) |
|
|
86 | (1) |
|
Training and Awareness for Users |
|
|
86 | (2) |
|
Auditing Requirements and Frequency |
|
|
88 | (1) |
|
Information Classification and Life Cycle |
|
|
89 | (13) |
|
Commercial Business Classifications |
|
|
89 | (1) |
|
Military and Government Classifications |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
92 | (4) |
Chapter 3 Risk Mitigation Strategies and Controls |
|
96 | (78) |
|
Categorize Data Types by Impact Levels Based on CIA |
|
|
98 | (2) |
|
Incorporate Stakeholder Input into CIA Impact-Level Decisions |
|
|
100 | (1) |
|
Determine the Aggregate CIA Score |
|
|
101 | (1) |
|
Determine Minimum Required Security Controls Based on Aggregate Score |
|
|
102 | (1) |
|
Select and Implement Controls Based on CIA Requirements and Organizational Policies |
|
|
102 | (21) |
|
Access Control Categories |
|
|
102 | (6) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
Administrative (Management) Controls |
|
|
104 | (2) |
|
Logical (Technical) Controls |
|
|
106 | (1) |
|
|
107 | (1) |
|
Security Requirements Traceability Matrix (SRTM) |
|
|
108 | (1) |
|
Security Control Frameworks |
|
|
109 | (9) |
|
|
110 | (2) |
|
|
112 | (1) |
|
The Open Group Architecture Framework (TOGAF) |
|
|
113 | (1) |
|
Department of Defense Architecture Framework (DoDAF) |
|
|
113 | (1) |
|
British Ministry of Defence Architecture Framework (MODAF) |
|
|
113 | (1) |
|
Sherwood Applied Business Security Architecture (SABSA) |
|
|
113 | (1) |
|
Control Objectives for Information and Related Technology (COBIT) |
|
|
114 | (1) |
|
National Institute of Standards and Technology (KIST) Special Publication (SP) 800 Series |
|
|
115 | (3) |
|
|
118 | (8) |
|
CIS Critical Security Controls |
|
|
118 | (1) |
|
Committee of Sponsoring Organizations (COSO) of the Treadway Commission Framework |
|
|
119 | (1) |
|
Operationally Critical Threat, Asset and Vulnerability Evaluation (OCTAVE) |
|
|
120 | (1) |
|
Information Technology Infrastructure Library (ITIL) |
|
|
120 | (1) |
|
|
121 | (2) |
|
Capability Maturity Model Integration (CMMI) |
|
|
123 | (1) |
|
CCTA Risk Analysis and Management Method (GRAMM) |
|
|
123 | (1) |
|
Extreme Scenario Planning/Worst-Case Scenario |
|
|
123 | (2) |
|
Conduct System-Specific Risk Analysis |
|
|
125 | (1) |
|
Make Risk Determination Based upon Known Metrics |
|
|
126 | (8) |
|
Qualitative Risk Analysis |
|
|
126 | (1) |
|
Quantitative Risk Analysis |
|
|
127 | (1) |
|
Magnitude of Impact Based on ALE and SLE |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
Return on Investment (ROI) |
|
|
131 | (2) |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
Translate Technical Risks in Business Terms |
|
|
134 | (1) |
|
Recommend Which Strategy Should Be Applied Based on Risk Appetite |
|
|
135 | (2) |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
137 | (1) |
|
Risk Management Processes |
|
|
137 | (4) |
|
Information and Asset (Tangible/Intangible) Value and Costs |
|
|
138 | (1) |
|
Vulnerabilities and Threats Identification |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
Continuous Improvement/Monitoring |
|
|
141 | (1) |
|
Business Continuity Planning |
|
|
141 | (7) |
|
Business Continuity Scope and Plan |
|
|
141 | (1) |
|
|
142 | (1) |
|
|
142 | (1) |
|
Business Continuity Steps |
|
|
142 | (6) |
|
Develop Contingency Planning Policy |
|
|
144 | (1) |
|
|
145 | (2) |
|
Identify Preventive Controls |
|
|
147 | (1) |
|
Create Contingency Strategies |
|
|
148 | (1) |
|
Plan Testing, Training, and Exercises (TT&E) |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
148 | (20) |
|
Adherence to Risk Management Frameworks |
|
|
149 | (1) |
|
|
149 | (15) |
|
Organizational Governance Components |
|
|
164 | (11) |
|
|
165 | (2) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
168 | (2) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
171 | (3) |
Chapter 4 Risk Metric Scenarios to Secure the Enterprise |
|
174 | (18) |
|
Review Effectiveness of Existing Security Controls |
|
|
175 | (2) |
|
|
176 | (1) |
|
Lessons Learned and After-Action Reports |
|
|
177 | (1) |
|
Reverse Engineer/Deconstruct Existing Solutions |
|
|
177 | (1) |
|
Creation, Collection, and Analysis of Metrics |
|
|
177 | (3) |
|
|
179 | (1) |
|
|
180 | (1) |
|
Prototype and Test Multiple Solutions |
|
|
180 | (1) |
|
Create Benchmarks and Compare to Baselines |
|
|
181 | (1) |
|
Analyze and Interpret Trend Data to Anticipate Cyber Defense Needs |
|
|
182 | (1) |
|
Analyze Security Solution Metrics and Attributes to Ensure They Meet Business Needs |
|
|
183 | (4) |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
Use Judgment to Solve Problems Where the Most Secure Solution Is Not Feasible |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
189 | (3) |
Chapter 5 Network and Security Components, Concepts, and Architectures |
|
192 | (94) |
|
Physical and Virtual Network and Security Devices |
|
|
194 | (18) |
|
|
194 | (1) |
|
|
195 | (2) |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
199 | (1) |
|
|
199 | (2) |
|
|
201 | (1) |
|
|
202 | (6) |
|
|
202 | (3) |
|
|
205 | (1) |
|
|
205 | (3) |
|
|
208 | (2) |
|
|
210 | (1) |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
211 | (1) |
|
|
212 | (1) |
|
Application and Protocol-Aware Technologies |
|
|
212 | (3) |
|
|
212 | (1) |
|
|
213 | (1) |
|
Passive Vulnerability Scanners |
|
|
213 | (1) |
|
Active Vulnerability Scanners |
|
|
214 | (1) |
|
|
214 | (1) |
|
Advanced Network Design (Wired/Wireless) |
|
|
215 | (26) |
|
|
215 | (1) |
|
|
215 | (5) |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
221 | (20) |
|
|
222 | (1) |
|
IPv4 and IPv6 Transitional Technologies |
|
|
222 | (2) |
|
Network Authentication Methods |
|
|
224 | (2) |
|
|
226 | (2) |
|
|
228 | (1) |
|
|
229 | (1) |
|
Placement of Hardware, Applications, and Fixed/Mobile Devices |
|
|
230 | (11) |
|
Complex Network Security Solutions for Data Flow |
|
|
241 | (5) |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
244 | (1) |
|
|
245 | (1) |
|
Secure Configuration and Baselining of Networking and Security Components |
|
|
246 | (8) |
|
|
246 | (1) |
|
|
246 | (1) |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
248 | (6) |
|
Software-Defined Networking |
|
|
254 | (1) |
|
Network Management and Monitoring Tools |
|
|
255 | (5) |
|
Alert Definitions and Rule Writing |
|
|
259 | (1) |
|
|
259 | (1) |
|
|
260 | (1) |
|
Advanced Configuration of Routers, Switches, and Other Network Devices |
|
|
260 | (8) |
|
|
260 | (1) |
|
|
260 | (2) |
|
|
262 | (4) |
|
|
263 | (1) |
|
|
263 | (1) |
|
|
264 | (2) |
|
|
266 | (1) |
|
|
266 | (1) |
|
Remotely Triggered Black Hole |
|
|
267 | (1) |
|
|
268 | (1) |
|
|
268 | (1) |
|
Separation of Critical Assets |
|
|
268 | (1) |
|
|
269 | (1) |
|
|
269 | (2) |
|
|
270 | (1) |
|
Persistent/Volatile or Non-persistent Agent |
|
|
270 | (1) |
|
|
271 | (1) |
|
|
271 | (8) |
|
|
271 | (3) |
|
|
271 | (1) |
|
|
272 | (1) |
|
Runtime Data Integrity Check |
|
|
273 | (1) |
|
Central Security Breach Response |
|
|
274 | (1) |
|
Building/Home Automation Systems |
|
|
274 | (1) |
|
|
275 | (1) |
|
|
276 | (1) |
|
|
277 | (1) |
|
Physical Access Control Systems |
|
|
277 | (1) |
|
|
278 | (1) |
|
Scientific/Industrial Equipment |
|
|
279 | (1) |
|
|
279 | (1) |
|
|
280 | (1) |
|
|
280 | (2) |
|
|
282 | (1) |
|
|
282 | (4) |
Chapter 6 Security Controls for Host Devices |
|
286 | (42) |
|
Trusted OS (e.g., How and When to Use It) |
|
|
287 | (3) |
|
|
289 | (1) |
|
|
289 | (1) |
|
|
290 | (1) |
|
|
290 | (1) |
|
Endpoint Security Software |
|
|
290 | (8) |
|
|
291 | (1) |
|
|
291 | (1) |
|
|
291 | (1) |
|
|
292 | (1) |
|
|
292 | (1) |
|
|
293 | (1) |
|
|
293 | (1) |
|
|
293 | (1) |
|
|
294 | (1) |
|
|
295 | (2) |
|
Endpoint Detection Response |
|
|
297 | (1) |
|
|
298 | (18) |
|
Standard Operating Environment/Configuration Baselining |
|
|
298 | (1) |
|
Application Whitelisting and Blacklisting |
|
|
299 | (1) |
|
Security/Group Policy Implementation |
|
|
299 | (2) |
|
Command Shell Restrictions |
|
|
301 | (1) |
|
|
302 | (1) |
|
|
302 | (1) |
|
|
302 | (1) |
|
Configuring Dedicated Interfaces |
|
|
303 | (1) |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
304 | (1) |
|
|
305 | (1) |
|
External I/O Restrictions |
|
|
305 | (1) |
|
|
306 | (9) |
|
|
306 | (7) |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
315 | (1) |
|
|
315 | (1) |
|
|
315 | (1) |
|
|
315 | (1) |
|
|
316 | (1) |
|
|
316 | (6) |
|
|
317 | (1) |
|
|
317 | (1) |
|
Integrity Measurement Architecture |
|
|
318 | (1) |
|
|
318 | (1) |
|
|
319 | (1) |
|
|
319 | (1) |
|
|
320 | (2) |
|
Vulnerabilities Associated with Hardware |
|
|
322 | (1) |
|
Terminal Services/Application Delivery Services |
|
|
322 | (1) |
|
|
323 | (1) |
|
|
323 | (1) |
|
|
324 | (1) |
|
|
324 | (4) |
Chapter 7 Security Controls for Mobile and Small Form Factor Devices |
|
328 | (26) |
|
Enterprise Mobility Management |
|
|
329 | (7) |
|
|
329 | (1) |
|
Configuration Profiles and Payloads |
|
|
329 | (1) |
|
Personally Owned, Corporate-Enabled |
|
|
330 | (1) |
|
|
330 | (1) |
|
|
330 | (1) |
|
|
330 | (1) |
|
|
330 | (1) |
|
Application, Content, and Data Management |
|
|
331 | (1) |
|
Over-the-Air Updates (Software/Firmware) |
|
|
331 | (1) |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
333 | (1) |
|
|
334 | (1) |
|
Unsigned Apps/System Apps |
|
|
334 | (1) |
|
|
334 | (2) |
|
|
335 | (1) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
336 | (1) |
|
|
336 | (1) |
|
Security Implications/Privacy Concerns |
|
|
336 | (9) |
|
|
336 | (2) |
|
|
337 | (1) |
|
|
337 | (1) |
|
|
337 | (1) |
|
Transfer/Backup Data to Uncontrolled Storage |
|
|
338 | (1) |
|
|
338 | (1) |
|
|
338 | (1) |
|
|
338 | (1) |
|
|
338 | (1) |
|
|
339 | (1) |
|
|
339 | (1) |
|
Push Notification Services |
|
|
339 | (1) |
|
|
339 | (1) |
|
Encrypted Instant Messaging Apps |
|
|
340 | (1) |
|
|
340 | (1) |
|
OEM/Carrier Android Fragmentation |
|
|
340 | (1) |
|
|
340 | (1) |
|
|
340 | (1) |
|
|
341 | (1) |
|
|
341 | (1) |
|
Peripheral-Enabled Payments (Credit Card Reader) |
|
|
341 | (1) |
|
|
341 | (1) |
|
|
342 | (1) |
|
|
342 | (1) |
|
|
342 | (1) |
|
|
342 | (2) |
|
|
343 | (1) |
|
|
343 | (1) |
|
|
343 | (1) |
|
|
343 | (1) |
|
|
344 | (1) |
|
Unauthorized Domain Bridging |
|
|
344 | (1) |
|
|
345 | (1) |
|
|
345 | (1) |
|
|
345 | (1) |
|
|
345 | (5) |
|
|
346 | (3) |
|
|
346 | (1) |
|
|
346 | (1) |
|
|
347 | (1) |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
348 | (1) |
|
|
349 | (6) |
|
Unauthorized Remote Activation/Deactivation of Devices or Features |
|
|
349 | (1) |
|
Encrypted and Unencrypted Communication Concerns |
|
|
349 | (1) |
|
|
349 | (1) |
|
|
350 | (1) |
|
|
350 | (1) |
|
Digital Forensics on Collected Data |
|
|
350 | (1) |
|
|
350 | (1) |
|
|
350 | (1) |
|
|
351 | (1) |
|
|
351 | (3) |
Chapter 8 Software Vulnerability Security Controls |
|
354 | (28) |
|
Application Security Design Considerations |
|
|
355 | (1) |
|
Secure: By Design, By Default, By Deployment |
|
|
355 | (1) |
|
Specific Application Issues |
|
|
356 | (14) |
|
Unsecure Direct Object References |
|
|
356 | (1) |
|
|
356 | (1) |
|
Cross-Site Request Forgery (CSRF) |
|
|
357 | (1) |
|
|
358 | (1) |
|
|
359 | (1) |
|
|
360 | (1) |
|
|
360 | (2) |
|
Improper Error and Exception Handling |
|
|
362 | (1) |
|
|
362 | (1) |
|
Improper Storage of Sensitive Data |
|
|
362 | (1) |
|
|
363 | (1) |
|
Secure Cookie Storage and Transmission |
|
|
364 | (1) |
|
|
364 | (3) |
|
|
367 | (1) |
|
|
367 | (1) |
|
|
367 | (1) |
|
Time of Check/Time of Use |
|
|
367 | (1) |
|
|
368 | (1) |
|
|
368 | (1) |
|
|
369 | (1) |
|
Use of Third-Party Libraries |
|
|
369 | (1) |
|
|
370 | (1) |
|
|
370 | (1) |
|
Secure Encrypted Enclaves |
|
|
371 | (1) |
|
Database Activity Monitor |
|
|
371 | (1) |
|
Web Application Firewalls |
|
|
371 | (1) |
|
Client-Side Processing vs. Server-Side Processing |
|
|
371 | (7) |
|
|
372 | (1) |
|
|
373 | (1) |
|
|
373 | (1) |
|
|
373 | (1) |
|
|
374 | (1) |
|
|
374 | (2) |
|
|
376 | (1) |
|
|
376 | (1) |
|
|
376 | (1) |
|
Operating System Vulnerabilities |
|
|
377 | (1) |
|
|
377 | (1) |
|
|
378 | (1) |
|
|
378 | (1) |
|
|
378 | (1) |
|
|
379 | (3) |
Chapter 9 Security Assessments |
|
382 | (28) |
|
|
383 | (15) |
|
|
383 | (1) |
|
Memory Dumping, Runtime Debugging |
|
|
384 | (1) |
|
|
385 | (1) |
|
|
385 | (2) |
|
|
387 | (1) |
|
|
388 | (1) |
|
|
388 | (1) |
|
|
389 | (1) |
|
|
389 | (1) |
|
|
389 | (1) |
|
|
389 | (1) |
|
|
390 | (8) |
|
|
390 | (1) |
|
|
391 | (1) |
|
|
392 | (2) |
|
|
394 | (3) |
|
|
397 | (1) |
|
|
398 | (7) |
|
|
398 | (3) |
|
|
400 | (1) |
|
|
400 | (1) |
|
|
400 | (1) |
|
|
401 | (1) |
|
|
402 | (1) |
|
|
403 | (1) |
|
Internal and External Audits |
|
|
403 | (1) |
|
|
404 | (1) |
|
|
405 | (1) |
|
|
405 | (1) |
|
|
406 | (1) |
|
|
407 | (3) |
Chapter 10 Select the Appropriate Security Assessment Tool |
|
410 | (38) |
|
|
411 | (16) |
|
|
411 | (2) |
|
Network Vulnerability Scanners |
|
|
413 | (1) |
|
|
414 | (2) |
|
|
414 | (1) |
|
|
415 | (1) |
|
|
416 | (4) |
|
|
418 | (1) |
|
|
419 | (1) |
|
|
420 | (2) |
|
|
421 | (1) |
|
|
422 | (1) |
|
Exploitation Tools/Frameworks |
|
|
422 | (2) |
|
|
424 | (1) |
|
Log Reduction and Analysis Tools |
|
|
425 | (2) |
|
|
427 | (14) |
|
|
427 | (1) |
|
Host Vulnerability Scanners |
|
|
428 | (1) |
|
|
429 | (7) |
|
|
429 | (2) |
|
|
431 | (2) |
|
|
433 | (1) |
|
|
434 | (1) |
|
|
435 | (1) |
|
|
435 | (1) |
|
|
436 | (1) |
|
Local Exploitation Tools/Frameworks |
|
|
436 | (1) |
|
|
437 | (1) |
|
File Integrity Monitoring |
|
|
437 | (1) |
|
|
438 | (1) |
|
|
439 | (1) |
|
Reverse Engineering Tools |
|
|
440 | (1) |
|
|
441 | (3) |
|
|
441 | (1) |
|
|
442 | (2) |
|
|
444 | (1) |
|
|
444 | (1) |
|
|
444 | (1) |
|
|
444 | (1) |
|
|
445 | (1) |
|
|
446 | (2) |
Chapter 11 Incident Response and Recovery |
|
448 | (38) |
|
|
449 | (5) |
|
Electronic Inventory and Asset Control |
|
|
450 | (1) |
|
|
451 | (1) |
|
Data Recovery and Storage |
|
|
451 | (1) |
|
|
452 | (1) |
|
|
453 | (1) |
|
|
454 | (1) |
|
|
454 | (3) |
|
|
455 | (1) |
|
|
455 | (1) |
|
|
456 | (1) |
|
|
456 | (1) |
|
|
456 | (1) |
|
|
456 | (1) |
|
|
457 | (1) |
|
|
457 | (1) |
|
Facilitate Incident Detection and Response |
|
|
457 | (4) |
|
Internal and External Violations |
|
|
458 | (2) |
|
Privacy Policy Violations |
|
|
458 | (1) |
|
|
459 | (1) |
|
|
459 | (1) |
|
Non-malicious Threats/Misconfigurations |
|
|
459 | (1) |
|
|
460 | (1) |
|
Heuristics/Behavioral Analytics |
|
|
460 | (1) |
|
Establish and Review System, Audit and Security Logs |
|
|
461 | (1) |
|
Incident and Emergency Response |
|
|
461 | (10) |
|
|
461 | (2) |
|
|
462 | (1) |
|
Surveillance, Search, and Seizure |
|
|
463 | (1) |
|
Forensic Analysis of Compromised System |
|
|
463 | (2) |
|
|
464 | (1) |
|
|
464 | (1) |
|
|
464 | (1) |
|
Hardware/Embedded Device Analysis |
|
|
465 | (1) |
|
|
465 | (1) |
|
|
465 | (4) |
|
Data Backup Types and Schemes |
|
|
465 | (4) |
|
|
469 | (1) |
|
|
469 | (1) |
|
|
470 | (1) |
|
Incident Response Support Tools |
|
|
471 | (7) |
|
|
471 | (1) |
|
|
472 | (1) |
|
|
473 | (1) |
|
|
474 | (1) |
|
|
475 | (1) |
|
|
476 | (1) |
|
|
476 | (1) |
|
|
477 | (1) |
|
Severity of Incident or Breach |
|
|
478 | (2) |
|
|
478 | (1) |
|
|
478 | (1) |
|
System Process Criticality |
|
|
479 | (1) |
|
|
479 | (1) |
|
|
479 | (1) |
|
|
480 | (1) |
|
|
480 | (1) |
|
|
480 | (1) |
|
|
480 | (1) |
|
|
481 | (8) |
|
|
481 | (1) |
|
Update Incident Response Plan |
|
|
481 | (1) |
|
|
481 | (1) |
|
|
481 | (1) |
|
|
482 | (1) |
|
|
483 | (3) |
Chapter 12 Host, Storage, Network, and Application Integration |
|
486 | (26) |
|
Adapt Data Flow Security to Meet Changing Business Needs |
|
|
487 | (2) |
|
|
489 | (2) |
|
|
489 | (1) |
|
|
489 | (1) |
|
|
490 | (1) |
|
|
490 | (1) |
|
|
490 | (1) |
|
|
491 | (3) |
|
Legacy Systems and Software/Current Systems |
|
|
491 | (1) |
|
|
492 | (1) |
|
|
492 | (1) |
|
|
493 | (1) |
|
|
493 | (1) |
|
|
493 | (1) |
|
|
493 | (1) |
|
|
493 | (1) |
|
|
494 | (1) |
|
|
494 | (2) |
|
Use of Heterogeneous Components |
|
|
494 | (1) |
|
Course of Action Automation/Orchestration |
|
|
495 | (1) |
|
Distribution of Critical Assets |
|
|
495 | (1) |
|
Persistence and Non-persistence of Data |
|
|
495 | (1) |
|
Redundancy/High Availability |
|
|
496 | (1) |
|
Assumed Likelihood of Attack |
|
|
496 | (1) |
|
Data Security Considerations |
|
|
496 | (4) |
|
|
497 | (1) |
|
|
498 | (1) |
|
|
498 | (1) |
|
|
499 | (1) |
|
|
499 | (1) |
|
|
500 | (1) |
|
Resources Provisioning and Deprovisioning |
|
|
500 | (1) |
|
|
500 | (1) |
|
|
501 | (1) |
|
|
501 | (1) |
|
|
501 | (1) |
|
|
501 | (1) |
|
Design Considerations During Mergers, Acquisitions and Demergers/Divestitures |
|
|
501 | (1) |
|
Network Secure Segmentation and Delegation |
|
|
502 | (1) |
|
Logical Deployment Diagram and Corresponding Physical Deployment Diagram of All Relevant Devices |
|
|
502 | (2) |
|
Security and Privacy Considerations of Storage Integration |
|
|
504 | (1) |
|
Security Implications of Integrating Enterprise Applications |
|
|
504 | (3) |
|
|
504 | (1) |
|
|
505 | (1) |
|
|
505 | (1) |
|
|
505 | (1) |
|
|
505 | (1) |
|
|
505 | (1) |
|
|
506 | (1) |
|
|
506 | (1) |
|
|
507 | (1) |
|
|
507 | (1) |
|
|
507 | (1) |
|
|
508 | (1) |
|
|
508 | (4) |
Chapter 13 Cloud and Virtualization Technology Integration |
|
512 | (24) |
|
Technical Deployment Models (Outsourcing/Insourcing/Managed Services/Partnership) |
|
|
513 | (5) |
|
Cloud and Virtualization Considerations and Hosting Options |
|
|
513 | (2) |
|
|
514 | (1) |
|
|
514 | (1) |
|
|
514 | (1) |
|
|
514 | (1) |
|
|
515 | (1) |
|
|
515 | (1) |
|
|
515 | (1) |
|
|
516 | (2) |
|
Security Advantages and Disadvantages of Virtualization |
|
|
518 | (3) |
|
Type 1 vs. Type 2 Hypervisors |
|
|
519 | (1) |
|
|
519 | (1) |
|
|
519 | (1) |
|
|
520 | (1) |
|
|
520 | (1) |
|
Hyperconverged Infrastructure |
|
|
521 | (1) |
|
Virtual Desktop Infrastructure |
|
|
521 | (1) |
|
Secure Enclaves and Volumes |
|
|
521 | (1) |
|
Cloud Augmented Security Services |
|
|
521 | (6) |
|
|
522 | (1) |
|
|
522 | (1) |
|
|
523 | (2) |
|
|
525 | (1) |
|
|
525 | (1) |
|
|
526 | (1) |
|
|
527 | (1) |
|
Managed Security Service Providers |
|
|
527 | (1) |
|
Vulnerabilities Associated with Comingling of Hosts with Different Security Requirements |
|
|
527 | (2) |
|
|
527 | (1) |
|
|
528 | (1) |
|
|
528 | (1) |
|
|
529 | (1) |
|
Data Security Considerations |
|
|
529 | (2) |
|
Vulnerabilities Associated with a Single Server Hosting Multiple Data Types |
|
|
530 | (1) |
|
Vulnerabilities Associated with a Single Platform Hosting Multiple Data Types/Owners on Multiple Virtual Machines |
|
|
530 | (1) |
|
Resources Provisioning and Deprovisioning |
|
|
531 | (1) |
|
|
531 | (1) |
|
|
531 | (1) |
|
|
532 | (1) |
|
|
532 | (1) |
|
|
532 | (1) |
|
|
533 | (3) |
Chapter 14 Authentication and Authorization Technology Integration |
|
536 | (34) |
|
|
537 | (13) |
|
|
538 | (10) |
|
|
538 | (1) |
|
|
538 | (1) |
|
|
539 | (1) |
|
Additional Authentication Concepts |
|
|
540 | (1) |
|
Identity and Account Management |
|
|
540 | (1) |
|
Password Types and Management |
|
|
541 | (3) |
|
Physiological Characteristics |
|
|
544 | (1) |
|
Behavioral Characteristics |
|
|
545 | (1) |
|
|
546 | (1) |
|
Dual-Factor and Multi-Factor Authentication |
|
|
547 | (1) |
|
Certificate-Based Authentication |
|
|
548 | (1) |
|
|
548 | (1) |
|
|
549 | (1) |
|
Context-Aware Authentication |
|
|
550 | (1) |
|
Push-Based Authentication |
|
|
550 | (1) |
|
|
550 | (7) |
|
|
550 | (3) |
|
Discretionary Access Control |
|
|
551 | (1) |
|
|
551 | (1) |
|
Role-Based Access Control |
|
|
551 | (1) |
|
Rule-Based Access Control |
|
|
552 | (1) |
|
Content-Dependent Access Control |
|
|
552 | (1) |
|
|
552 | (1) |
|
|
553 | (1) |
|
|
553 | (1) |
|
|
553 | (1) |
|
|
553 | (2) |
|
|
555 | (1) |
|
|
556 | (1) |
|
|
557 | (1) |
|
|
558 | (1) |
|
|
558 | (1) |
|
|
559 | (4) |
|
|
560 | (1) |
|
|
561 | (1) |
|
|
561 | (2) |
|
|
563 | (1) |
|
|
563 | (3) |
|
|
563 | (1) |
|
|
564 | (1) |
|
|
565 | (1) |
|
|
566 | (1) |
|
|
566 | (1) |
|
|
567 | (1) |
|
|
567 | (3) |
Chapter 15 Cryptographic Techniques |
|
570 | (46) |
|
|
572 | (20) |
|
|
572 | (1) |
|
|
572 | (2) |
|
|
574 | (1) |
|
|
575 | (1) |
|
|
576 | (1) |
|
|
576 | (1) |
|
|
576 | (1) |
|
|
577 | (1) |
|
|
578 | (1) |
|
Pseudo-Random Number Generation |
|
|
578 | (1) |
|
|
578 | (1) |
|
Data-in-Transit Encryption |
|
|
579 | (2) |
|
|
579 | (1) |
|
|
579 | (1) |
|
|
580 | (1) |
|
|
580 | (1) |
|
Data-in-Memory/Processing |
|
|
581 | (1) |
|
|
581 | (11) |
|
|
582 | (3) |
|
|
585 | (3) |
|
|
588 | (1) |
|
|
588 | (1) |
|
|
589 | (1) |
|
|
589 | (1) |
|
|
589 | (2) |
|
|
591 | (1) |
|
|
591 | (1) |
|
|
592 | (19) |
|
|
592 | (1) |
|
|
593 | (1) |
|
Cryptographic Service Providers |
|
|
593 | (1) |
|
|
593 | (1) |
|
|
594 | (1) |
|
|
594 | (1) |
|
|
595 | (1) |
|
|
595 | (1) |
|
|
596 | (1) |
|
Cryptographic Applications and Proper/Improper Implementations |
|
|
596 | (1) |
|
Strength Versus Performance Versus Feasibility to Implement Versus Interoperability |
|
|
596 | (1) |
|
|
597 | (1) |
|
|
597 | (1) |
|
|
597 | (12) |
|
|
597 | (1) |
|
|
598 | (1) |
|
|
598 | (4) |
|
|
602 | (1) |
|
|
603 | (1) |
|
|
603 | (1) |
|
|
604 | (1) |
|
|
604 | (2) |
|
|
606 | (1) |
|
|
606 | (1) |
|
|
607 | (1) |
|
|
608 | (1) |
|
|
608 | (1) |
|
Cryptocurrency/Blockchain |
|
|
609 | (1) |
|
Mobile Device Encryption Considerations |
|
|
610 | (1) |
|
Elliptic Curve Cryptography |
|
|
610 | (1) |
|
|
610 | (1) |
|
|
611 | (1) |
|
|
611 | (1) |
|
|
612 | (1) |
|
|
613 | (3) |
Chapter 16 Secure Communication and Collaboration |
|
616 | (22) |
|
|
617 | (4) |
|
|
617 | (1) |
|
|
618 | (1) |
|
|
618 | (1) |
|
|
618 | (1) |
|
|
618 | (1) |
|
Desktop and Application Sharing |
|
|
619 | (1) |
|
|
620 | (1) |
|
Unified Collaboration Tools |
|
|
621 | (13) |
|
|
621 | (1) |
|
|
622 | (1) |
|
|
623 | (1) |
|
Storage and Document Collaboration Tools |
|
|
624 | (1) |
|
|
625 | (1) |
|
|
625 | (1) |
|
|
626 | (1) |
|
|
627 | (1) |
|
|
627 | (1) |
|
|
627 | (1) |
|
|
628 | (2) |
|
|
628 | (1) |
|
|
628 | (1) |
|
|
629 | (1) |
|
|
629 | (1) |
|
|
629 | (1) |
|
Disclosure of Information |
|
|
630 | (1) |
|
|
630 | (1) |
|
Telephony and VoIP Integration |
|
|
630 | (2) |
|
|
632 | (7) |
|
|
632 | (1) |
|
Cloud-Based Collaboration |
|
|
633 | (1) |
|
|
634 | (1) |
|
|
634 | (1) |
|
|
635 | (1) |
|
|
635 | (3) |
Chapter 17 Industry Trends and Their Impact to the Enterprise |
|
638 | (26) |
|
|
639 | (4) |
|
|
640 | (1) |
|
New Technologies, Security Systems and Services |
|
|
641 | (1) |
|
Technology Evolution (e.g., RFCs, ISO) |
|
|
642 | (1) |
|
|
643 | (6) |
|
|
644 | (2) |
|
Knowledge of Current Vulnerabilities and Threats |
|
|
646 | (1) |
|
Zero-Day Mitigation Controls and Remediation |
|
|
647 | (1) |
|
|
648 | (1) |
|
Research Security Implications of Emerging Business Tools |
|
|
649 | (4) |
|
Evolving Social Media Platforms |
|
|
650 | (1) |
|
|
650 | (1) |
|
Integration Within the Business |
|
|
651 | (1) |
|
|
652 | (1) |
|
|
653 | (1) |
|
Global IA Industry/Community |
|
|
653 | (7) |
|
Computer Emergency Response Team (CERT) |
|
|
654 | (1) |
|
|
654 | (1) |
|
Research Consultants/Vendors |
|
|
655 | (1) |
|
|
655 | (5) |
|
|
656 | (1) |
|
|
657 | (1) |
|
|
657 | (1) |
|
|
657 | (1) |
|
|
658 | (1) |
|
Router/Firewall ACLs Review |
|
|
658 | (1) |
|
|
658 | (1) |
|
|
659 | (1) |
|
|
659 | (1) |
|
|
659 | (1) |
|
|
660 | (1) |
|
|
660 | (1) |
|
|
660 | (1) |
|
|
661 | (1) |
|
|
661 | (3) |
Chapter 18 Security Activities Across the Technology Life Cycle |
|
664 | (52) |
|
Systems Development Life Cycle |
|
|
665 | (8) |
|
|
667 | (1) |
|
|
668 | (1) |
|
|
668 | (1) |
|
Commissioning/Decommissioning |
|
|
668 | (1) |
|
|
669 | (3) |
|
|
669 | (1) |
|
|
670 | (1) |
|
Configuration and Change Management |
|
|
671 | (1) |
|
|
672 | (1) |
|
|
673 | (1) |
|
Software Development Life Cycle |
|
|
673 | (33) |
|
|
674 | (1) |
|
|
674 | (1) |
|
|
675 | (1) |
|
|
675 | (1) |
|
|
676 | (1) |
|
|
676 | (1) |
|
|
676 | (1) |
|
Change Management and Configuration Management/Replacement |
|
|
677 | (1) |
|
Application Security Frameworks |
|
|
677 | (1) |
|
|
677 | (11) |
|
|
677 | (1) |
|
Risk Analysis and Mitigation |
|
|
678 | (1) |
|
Regression and Acceptance Testing |
|
|
678 | (1) |
|
Security Impact of Acquired Software |
|
|
679 | (1) |
|
|
679 | (1) |
|
Industry-Accepted Approaches |
|
|
680 | (1) |
|
Web Services Security (WS-Security) |
|
|
681 | (1) |
|
Forbidden Coding Techniques |
|
|
681 | (1) |
|
|
682 | (1) |
|
|
682 | (1) |
|
|
683 | (1) |
|
|
683 | (5) |
|
|
688 | (12) |
|
|
689 | (1) |
|
|
689 | (1) |
|
|
690 | (1) |
|
|
691 | (1) |
|
|
691 | (1) |
|
|
692 | (1) |
|
Rapid Application Development (RAD) |
|
|
692 | (2) |
|
|
694 | (1) |
|
|
694 | (1) |
|
|
695 | (1) |
|
|
695 | (1) |
|
Security Implications of Agile, Waterfall, and Spiral Software Development Methodologies |
|
|
696 | (2) |
|
|
698 | (1) |
|
|
698 | (2) |
|
|
700 | (1) |
|
|
700 | (4) |
|
Security Requirements Traceability Matrix (SRTM) |
|
|
700 | (1) |
|
|
701 | (1) |
|
|
701 | (1) |
|
|
702 | (2) |
|
Validation and Acceptance Testing |
|
|
704 | (2) |
|
|
704 | (2) |
|
|
706 | (3) |
|
|
706 | (1) |
|
Address Disruptive Technologies |
|
|
707 | (1) |
|
|
708 | (1) |
|
Asset Management (Inventory Control) |
|
|
709 | (2) |
|
Device-Tracking Technologies |
|
|
709 | (8) |
|
|
709 | (1) |
|
Object Tracking and Containment Technologies |
|
|
709 | (1) |
|
|
710 | (1) |
|
|
710 | (1) |
|
|
711 | (1) |
|
|
711 | (1) |
|
|
712 | (1) |
|
|
713 | (3) |
Chapter 19 Business Unit Interaction |
|
716 | (16) |
|
Interpreting Security Requirements and Goals to Communicate with Stakeholders from Other Disciplines |
|
|
717 | (7) |
|
|
717 | (1) |
|
|
718 | (1) |
|
|
719 | (1) |
|
|
720 | (1) |
|
Management/Executive Management |
|
|
720 | (2) |
|
|
722 | (1) |
|
|
722 | (1) |
|
|
723 | (1) |
|
|
723 | (1) |
|
Physical Security Manager |
|
|
723 | (1) |
|
|
724 | (1) |
|
Provide Objective Guidance and Impartial Recommendations to Staff and Senior Management on Security Processes and Controls |
|
|
724 | (1) |
|
Establish Effective Collaboration Within Teams to Implement Secure Solutions |
|
|
725 | (1) |
|
Governance, Risk, and Compliance Committee |
|
|
726 | (1) |
|
|
727 | (1) |
|
|
727 | (1) |
|
|
728 | (1) |
|
|
729 | (3) |
Appendix A Answers |
|
732 | (22) |
Glossary |
|
754 | (44) |
Index |
|
798 | |