Introduction |
|
xxv | |
Assessment Test |
|
xxxv | |
|
Chapter 1 Risk Management |
|
|
1 | (42) |
|
|
4 | (2) |
|
The Risk Assessment Process |
|
|
6 | (1) |
|
|
6 | (2) |
|
Information Classification |
|
|
8 | (1) |
|
|
9 | (5) |
|
|
14 | (2) |
|
|
16 | (1) |
|
Policies Used to Manage Employees |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (2) |
|
End of Employment and Termination Procedures |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
Enterprise Security Architecture Frameworks and Governance |
|
|
23 | (1) |
|
Training and Awareness for Users |
|
|
24 | (1) |
|
Best Practices for Risk Assessments |
|
|
25 | (2) |
|
Business Continuity Planning and Disaster Recovery |
|
|
27 | (1) |
|
Reviewing the Effectiveness of Existing Security Controls |
|
|
28 | (2) |
|
Conducting Lessons Learned and After-Action Reviews |
|
|
30 | (1) |
|
Creation, Collection, and Analysis of Metrics |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
Analyzing Security Solutions to Ensure They Meet Business Needs |
|
|
32 | (1) |
|
|
33 | (1) |
|
Internal and External Audits |
|
|
34 | (1) |
|
Using Judgment to Solve Difficult Problems |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
36 | (2) |
|
|
38 | (5) |
|
Chapter 2 Configure and Implement Endpoint Security Controls |
|
|
43 | (20) |
|
|
45 | (2) |
|
Address Space Layout Randomization Use |
|
|
47 | (1) |
|
Hardware Security Module and Trusted Platform Module |
|
|
48 | (4) |
|
Trusted Operating Systems |
|
|
52 | (3) |
|
|
55 | (2) |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
59 | (4) |
|
Chapter 3 Security Operations Scenarios |
|
|
63 | (28) |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
67 | (4) |
|
Intelligence Collection Methods |
|
|
71 | (1) |
|
|
71 | (2) |
|
Human Intelligence and Social Engineering |
|
|
73 | (1) |
|
|
74 | (1) |
|
MITRE Adversarial Tactics, Techniques and Common Knowledge |
|
|
74 | (1) |
|
ATT&CK for Industrial Control Systems |
|
|
75 | (1) |
|
|
76 | (1) |
|
Diamond Model of Intrusion Analysis |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
Intrusion Detection and Prevention |
|
|
78 | (1) |
|
Notifications and Responses to IoCs |
|
|
79 | (1) |
|
|
80 | (5) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
86 | (5) |
|
Chapter 4 Security Ops: Vulnerability Assessments and Operational Risk |
|
|
91 | (74) |
|
|
97 | (1) |
|
|
98 | (5) |
|
Security Content Automation Protocol |
|
|
103 | (2) |
|
Self-Assessment vs. Third-Party Vendor Assessment |
|
|
105 | (3) |
|
|
108 | (2) |
|
|
110 | (2) |
|
|
112 | (12) |
|
|
124 | (5) |
|
|
129 | (2) |
|
|
131 | (3) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
136 | (1) |
|
Race Conditions (TOC/TOU) |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
138 | (1) |
|
Use of Third-Party Libraries |
|
|
138 | (1) |
|
|
138 | (1) |
|
Cryptographic Vulnerabilities |
|
|
138 | (1) |
|
|
139 | (1) |
|
Security Misconfiguration |
|
|
140 | (1) |
|
Inherently Vulnerable System/Application |
|
|
140 | (1) |
|
Client-Side Processing vs. Server-Side Processing |
|
|
141 | (4) |
|
|
145 | (8) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
161 | (4) |
|
Chapter 5 Compliance and Vendor Risk |
|
|
165 | (46) |
|
Shared Responsibility in Cloud Computing |
|
|
168 | (1) |
|
Cloud Service/Infrastructure Models |
|
|
169 | (1) |
|
Cloud Computing Providers and Hosting Options |
|
|
169 | (2) |
|
Benefits of Cloud Computing |
|
|
171 | (3) |
|
Security of On-Demand/Elastic Cloud Computing |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (6) |
|
Managing and Mitigating Risk |
|
|
182 | (3) |
|
Security Concerns of Integrating Diverse Industries |
|
|
185 | (2) |
|
Regulations, Accreditations, and Standards |
|
|
187 | (1) |
|
|
187 | (3) |
|
|
190 | (2) |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
197 | (1) |
|
Contract and Agreement Types |
|
|
198 | (4) |
|
Third-Party Attestation of Compliance |
|
|
202 | (1) |
|
|
203 | (1) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
206 | (5) |
|
Chapter 6 Cryptography and PKI |
|
|
211 | (54) |
|
The History of Cryptography |
|
|
216 | (1) |
|
Cryptographic Goals and Requirements |
|
|
217 | (1) |
|
Supporting Security Requirements |
|
|
218 | (1) |
|
Compliance and Policy Requirements |
|
|
219 | (1) |
|
Privacy and Confidentiality Requirements |
|
|
219 | (1) |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
221 | (1) |
|
|
222 | (1) |
|
Data in Process/Data in Use |
|
|
222 | (1) |
|
|
223 | (2) |
|
|
225 | (1) |
|
|
225 | (1) |
|
Message Authentication Code |
|
|
226 | (1) |
|
Hashed Message Authentication Code |
|
|
226 | (1) |
|
RACE Integrity Primitives Evaluation Message Digest |
|
|
226 | (1) |
|
|
226 | (1) |
|
|
227 | (3) |
|
|
230 | (1) |
|
|
231 | (1) |
|
Rijndael and the Advanced Encryption Standard |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
232 | (1) |
|
International Data Encryption Algorithm |
|
|
232 | (1) |
|
|
233 | (1) |
|
|
233 | (1) |
|
|
233 | (2) |
|
|
235 | (1) |
|
|
236 | (1) |
|
Elliptic Curve Cryptography |
|
|
237 | (1) |
|
|
238 | (1) |
|
Hybrid Encryption and Electronic Data Exchange (EDI) |
|
|
238 | (1) |
|
Public Key Infrastructure Hierarchy |
|
|
239 | (1) |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
241 | (2) |
|
Certificate Revocation List |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
245 | (2) |
|
Implementation of Cryptographic Solutions |
|
|
247 | (1) |
|
Application Layer Encryption |
|
|
248 | (1) |
|
Transport Layer Encryption |
|
|
249 | (1) |
|
|
250 | (1) |
|
Additional Authentication Protocols |
|
|
251 | (1) |
|
|
252 | (1) |
|
|
252 | (2) |
|
Recognizing Cryptographic Attacks |
|
|
254 | (2) |
|
Troubleshooting Cryptographic Implementations |
|
|
256 | (3) |
|
|
259 | (1) |
|
|
259 | (2) |
|
|
261 | (4) |
|
Chapter 7 Incident Response and Forensics |
|
|
265 | (36) |
|
The Incident Response Framework |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
269 | (1) |
|
|
270 | (1) |
|
The Incident Response Process |
|
|
270 | (3) |
|
Response Playbooks and Processes |
|
|
273 | (1) |
|
Communication Plan and Stakeholder Management |
|
|
274 | (3) |
|
|
277 | (1) |
|
Principles, Standards, and Practices |
|
|
278 | (1) |
|
|
279 | (4) |
|
|
283 | (1) |
|
|
284 | (1) |
|
|
284 | (2) |
|
|
286 | (2) |
|
|
288 | (1) |
|
|
289 | (1) |
|
Live Collection vs. Postmortem Tools |
|
|
290 | (4) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
295 | (6) |
|
Chapter 8 Security Architecture |
|
|
301 | (114) |
|
Security Requirements and Objectives for a Secure Network Architecture |
|
|
310 | (1) |
|
|
310 | (24) |
|
|
334 | (10) |
|
Deperimeterization/Zero Trust |
|
|
344 | (8) |
|
Merging Networks from Various Organizations |
|
|
352 | (5) |
|
Software-Defined Networking |
|
|
357 | (1) |
|
Organizational Requirements for Infrastructure Security Design |
|
|
358 | (1) |
|
|
358 | (1) |
|
|
359 | (1) |
|
|
359 | (1) |
|
|
360 | (1) |
|
|
361 | (1) |
|
|
361 | (1) |
|
Integrating Applications Securely into an Enterprise Architecture |
|
|
362 | (1) |
|
|
362 | (5) |
|
|
367 | (3) |
|
Considerations of Integrating Enterprise Applications |
|
|
370 | (3) |
|
Integrating Security into the Development Life Cycle |
|
|
373 | (11) |
|
Data Security Techniques for Securing Enterprise Architecture |
|
|
384 | (1) |
|
|
384 | (3) |
|
|
387 | (1) |
|
Data Classification, Labeling, and Tagging |
|
|
388 | (2) |
|
|
390 | (1) |
|
|
390 | (1) |
|
Encrypted vs. Unencrypted |
|
|
390 | (1) |
|
|
391 | (1) |
|
Data Inventory and Mapping |
|
|
391 | (1) |
|
Data Integrity Management |
|
|
391 | (1) |
|
Data Storage, Backup, and Recovery |
|
|
392 | (2) |
|
Security Requirements and Objectives for Authentication and Authorization Controls |
|
|
394 | (1) |
|
|
394 | (2) |
|
|
396 | (2) |
|
|
398 | (1) |
|
|
399 | (2) |
|
|
401 | (2) |
|
Multifactor Authentication |
|
|
403 | (1) |
|
|
404 | (1) |
|
|
404 | (1) |
|
|
405 | (1) |
|
JavaScript Object Notation Web Token |
|
|
405 | (1) |
|
Attestation and Identity Proofing |
|
|
406 | (1) |
|
|
406 | (1) |
|
|
407 | (3) |
|
|
410 | (5) |
|
Chapter 9 Secure Cloud and Virtualization |
|
|
415 | (52) |
|
Implement Secure Cloud and Virtualization Solutions |
|
|
418 | (1) |
|
Virtualization Strategies |
|
|
419 | (6) |
|
Deployment Models and Considerations |
|
|
425 | (4) |
|
|
429 | (4) |
|
Cloud Provider Limitations |
|
|
433 | (1) |
|
Extending Appropriate On-Premises Controls |
|
|
433 | (6) |
|
|
439 | (6) |
|
How Cloud Technology Adoption Impacts Organization Security |
|
|
445 | (1) |
|
Automation and Orchestration |
|
|
445 | (1) |
|
|
445 | (1) |
|
|
446 | (1) |
|
Monitoring Configurations |
|
|
447 | (1) |
|
Key Ownership and Location |
|
|
448 | (1) |
|
Key Life-Cycle Management |
|
|
448 | (1) |
|
Backup and Recovery Methods |
|
|
449 | (1) |
|
Infrastructure vs. Serverless Computing |
|
|
450 | (1) |
|
Software-Defined Networking |
|
|
450 | (1) |
|
|
451 | (1) |
|
|
451 | (10) |
|
|
461 | (1) |
|
|
461 | (1) |
|
|
461 | (1) |
|
|
462 | (1) |
|
|
463 | (4) |
|
Chapter 10 Mobility and Emerging Technologies |
|
|
467 | (62) |
|
Emerging Technologies and Their Impact on Enterprise Security and Privacy |
|
|
471 | (1) |
|
|
472 | (1) |
|
|
472 | (1) |
|
|
472 | (1) |
|
|
473 | (1) |
|
|
473 | (1) |
|
|
474 | (1) |
|
|
475 | (1) |
|
|
475 | (1) |
|
Virtual/Augmented Reality |
|
|
475 | (1) |
|
|
476 | (1) |
|
Passwordless Authentication |
|
|
476 | (1) |
|
|
477 | (1) |
|
|
477 | (1) |
|
Secure Enterprise Mobility Configurations |
|
|
478 | (1) |
|
|
479 | (7) |
|
|
486 | (1) |
|
Mobile Device Security Considerations |
|
|
487 | (8) |
|
Security Considerations for Technologies, Protocols, and Sectors |
|
|
495 | (1) |
|
|
495 | (1) |
|
ICS/Supervisory Control and Data Acquisition |
|
|
496 | (2) |
|
|
498 | (1) |
|
|
499 | (1) |
|
|
500 | (1) |
|
|
500 | (1) |
|
|
501 | (4) |
|
Appendix Answers to Review Questions |
|
|
505 | (1) |
|
Chapter 1 Risk Management |
|
|
506 | (1) |
|
Chapter 2 Configure and Implement Endpoint Security Controls |
|
|
507 | (2) |
|
Chapter 3 Security Operations Scenarios |
|
|
509 | (2) |
|
Chapter 4 Security Ops: Vulnerability Assessments and Operational Risk |
|
|
511 | (2) |
|
Chapter 5 Compliance and Vendor Risk |
|
|
513 | (1) |
|
Chapter 6 Cryptography and PKI |
|
|
514 | (2) |
|
Chapter 7 Incident Response and Forensics |
|
|
516 | (3) |
|
Chapter 8 Security Architecture |
|
|
519 | (3) |
|
Chapter 9 Secure Cloud and Virtualization |
|
|
522 | (2) |
|
Chapter 10 Mobility and Emerging Technologies |
|
|
524 | |
Index |
|
529 | |