Acknowledgments |
|
xxvii | |
Introduction |
|
xxix | |
|
1.0 Security and Risk Management |
|
|
1 | (84) |
|
Objective 1.1 Understand, adhere to, and promote professional ethics |
|
|
2 | (7) |
|
The (ISC)2 Code of Ethics |
|
|
3 | (1) |
|
|
3 | (1) |
|
|
3 | (1) |
|
Organizational Code of Ethics |
|
|
4 | (1) |
|
Workplace Ethics Statements and Policies |
|
|
4 | (1) |
|
Other Sources for Ethics Requirements |
|
|
5 | (2) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
Objective 1.2 Understand and apply security concepts |
|
|
9 | (7) |
|
|
9 | (1) |
|
Data, Information, Systems, and Entities |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
Supporting Tenets of Information Security |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
Auditing and Accountability |
|
|
12 | (1) |
|
|
12 | (1) |
|
Supporting Security Concepts |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
Objective 1.3 Evaluate and apply security governance principles |
|
|
16 | (7) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
Alignment of Security Functions to Business Requirements |
|
|
17 | (1) |
|
Business Strategy and Security Strategy |
|
|
17 | (1) |
|
|
18 | (1) |
|
Organizational Roles and Responsibilities |
|
|
18 | (1) |
|
Security Control Frameworks |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
Objective 1.4 Determine compliance and other requirements |
|
|
23 | (6) |
|
|
23 | (1) |
|
Legal and Regulatory Compliance |
|
|
24 | (1) |
|
|
25 | (1) |
|
Compliance with Industry Standards |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
Objective 1.5 Understand legal and regulatory issues that pertain to information security in a holistic context |
|
|
29 | (6) |
|
Legal and Regulatory Requirements |
|
|
29 | (1) |
|
|
29 | (1) |
|
Licensing and Intellectual Property Requirements |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
Objective 1.6 Understand requirements for investigation types (i.e., administrative, criminal, civil, regulatory, industry standards) |
|
|
35 | (4) |
|
|
35 | (1) |
|
Administrative Investigations |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
Regulatory Investigations |
|
|
36 | (1) |
|
Industry Standards for Investigations |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
Objective 1.7 Develop, document, and implement security policy, standards, procedures, and guidelines |
|
|
39 | (6) |
|
|
40 | (1) |
|
|
40 | (1) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
44 | (1) |
|
Objective 1.8 Identify, analyze, and prioritize Business Continuity (BC) requirements |
|
|
45 | (3) |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
Objective 1.9 Contribute to and enforce personnel security policies and procedures |
|
|
48 | (9) |
|
|
49 | (1) |
|
Candidate Screening and Hiring |
|
|
49 | (1) |
|
Employment Agreements and Policies |
|
|
50 | (1) |
|
Onboarding, Transfers, and Termination Processes |
|
|
50 | (2) |
|
Vendor, Consultant, and Contractor Agreements and Controls |
|
|
52 | (1) |
|
Compliance Policy Requirements |
|
|
53 | (1) |
|
Privacy Policy Requirements |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
Objective 1.10 Understand and apply risk management concepts |
|
|
57 | (13) |
|
|
57 | (1) |
|
|
57 | (2) |
|
Identify Threats and Vulnerabilities |
|
|
59 | (1) |
|
|
60 | (3) |
|
|
63 | (1) |
|
|
64 | (1) |
|
Countermeasure Selection and Implementation |
|
|
64 | (1) |
|
Applicable Types of Controls |
|
|
65 | (1) |
|
Control Assessments (Security and Privacy) |
|
|
66 | (1) |
|
Monitoring and Measurement |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
69 | (1) |
|
|
69 | (1) |
|
Objective 1.11 Understand and apply threat modeling concepts and methodologies |
|
|
70 | (4) |
|
|
70 | (1) |
|
|
70 | (2) |
|
Threat Modeling Methodologies |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
73 | (1) |
|
Objective 1.12 Apply Supply Chain Risk Management (SCRM) concepts |
|
|
74 | (6) |
|
Supply Chain Risk Management |
|
|
74 | (1) |
|
Risks Associated with Hardware, Software, and Services |
|
|
74 | (2) |
|
Third-Party Assessment and Monitoring |
|
|
76 | (1) |
|
Minimum Security Requirements |
|
|
77 | (1) |
|
Service Level Requirements |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
79 | (1) |
|
Objective 1.13 Establish and maintain a security awareness, education, and training program |
|
|
80 | (5) |
|
Security Awareness, Education, and Training Program |
|
|
80 | (1) |
|
Methods and Techniques to Present Awareness and Training |
|
|
80 | (2) |
|
|
82 | (1) |
|
Program Effectiveness Evaluation |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
85 | (30) |
|
Objective 2.1 Identify and classify information and assets |
|
|
86 | (4) |
|
|
86 | (1) |
|
|
87 | (2) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
90 | (1) |
|
Objective 2.2 Establish information and asset handling requirements |
|
|
90 | (6) |
|
Information and Asset Handling |
|
|
90 | (1) |
|
|
91 | (2) |
|
Information Classification and Handling Systems |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
95 | (1) |
|
|
95 | (1) |
|
Objective 2.3 Provision resources securely |
|
|
96 | (3) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
99 | (1) |
|
Objective 2.4 Manage data lifecycle |
|
|
99 | (6) |
|
Managing the Data Life Cycle |
|
|
100 | (1) |
|
|
100 | (2) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
Objective 2.5 Ensure appropriate asset retention (e.g., End-of-Life (EOL), End-of-Support (EOS)) |
|
|
105 | (4) |
|
|
105 | (1) |
|
|
106 | (1) |
|
End-of-Life and End-of-Support |
|
|
106 | (2) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
Objective 2.6 Determine data security controls and compliance requirements |
|
|
109 | (6) |
|
Data Security and Compliance |
|
|
109 | (1) |
|
|
109 | (1) |
|
Control Standards Selection |
|
|
110 | (1) |
|
Scoping and Tailoring Data Security Controls |
|
|
111 | (1) |
|
|
111 | (2) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
3.0 Security Architecture and Engineering |
|
|
115 | (68) |
|
Objective 3.1 Research, implement, and manage engineering processes using secure design principles |
|
|
116 | (6) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
122 | (1) |
|
Objective 3.2 Understand the fundamental concepts of security models (e.g., Biba, Star Model, Bell-LaPadula) |
|
|
122 | (8) |
|
|
122 | (1) |
|
|
123 | (1) |
|
System States and Processing Modes |
|
|
124 | (2) |
|
|
126 | (1) |
|
|
127 | (1) |
|
Other Access Control Models |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
130 | (1) |
|
Objective 3.3 Select controls based upon systems security requirements |
|
|
130 | (5) |
|
Selecting Security Controls |
|
|
130 | (1) |
|
Performance and Functional Requirements |
|
|
131 | (1) |
|
Data Protection Requirements |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
Risk Response Requirements |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
134 | (1) |
|
Objective 3.4 Understand security capabilities of Information Systems (IS) (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption) |
|
|
135 | (4) |
|
Information System Security Capabilities |
|
|
135 | (1) |
|
Hardware and Firmware System Security |
|
|
135 | (2) |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
139 | (1) |
|
Objective 3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements |
|
|
139 | (9) |
|
Vulnerabilities of Security Architectures, Designs, and Solutions |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
142 | (1) |
|
Industrial Control Systems |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
High-Performance Computing Systems |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
148 | (1) |
|
Objective 3.6 Select and determine cryptographic solutions |
|
|
148 | (13) |
|
|
149 | (1) |
|
|
149 | (2) |
|
|
151 | (3) |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
Public Key Infrastructure |
|
|
156 | (2) |
|
Nonrepudiation and Digital Signatures |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
161 | (1) |
|
Objective 3.7 Understand methods of cryptanalytic attacks |
|
|
161 | (6) |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
Chosen Ciphertext and Chosen Plaintext |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
Man-in-the-Middle (On-Path) |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
167 | (1) |
|
Objective 3.8 Apply security principles to site and facility design |
|
|
167 | (6) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
168 | (4) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
Objective 3.9 Design site and facility security controls |
|
|
173 | (10) |
|
Designing Facility Security Controls |
|
|
173 | (1) |
|
Crime Prevention Through Environmental Design |
|
|
174 | (1) |
|
Key Facility Areas of Concern |
|
|
174 | (7) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
182 | (1) |
|
4.0 Communication and Network Security |
|
|
183 | (42) |
|
Objective 4.1 Assess and implement secure design principles in network architectures |
|
|
184 | (23) |
|
Fundamental Networking Concepts |
|
|
184 | (1) |
|
Open Systems Interconnection and Transmission Control Protocol/Internet Protocol Models |
|
|
185 | (2) |
|
Internet Protocol Networking |
|
|
187 | (2) |
|
|
189 | (4) |
|
Application of Secure Networking Concepts |
|
|
193 | (1) |
|
Implications of Multilayer Protocols |
|
|
193 | (1) |
|
|
194 | (1) |
|
|
195 | (2) |
|
|
197 | (1) |
|
Wireless Theory and Signaling |
|
|
197 | (2) |
|
|
199 | (3) |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
204 | (1) |
|
Content Distribution Networks |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
207 | (1) |
|
Objective 4.2 Secure network components |
|
|
207 | (8) |
|
Network Security Design and Components |
|
|
208 | (1) |
|
|
208 | (4) |
|
|
212 | (1) |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
214 | (1) |
|
|
214 | (1) |
|
Objective 4.3 Implement secure communication channels according to design |
|
|
215 | (10) |
|
Securing Communications Channels |
|
|
215 | (1) |
|
|
215 | (3) |
|
|
218 | (1) |
|
|
219 | (1) |
|
|
220 | (2) |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
224 | (1) |
|
5.0 Identity and Access Management (LAM) |
|
|
225 | (34) |
|
Objective 5.1 Control physical and logical access to assets |
|
|
226 | (3) |
|
Controlling Logical and Physical Access |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
228 | (1) |
|
|
228 | (1) |
|
|
229 | (1) |
|
Objective 5.2 Manage identification and authentication of people, devices, and services |
|
|
229 | (8) |
|
Identification and Authentication |
|
|
229 | (1) |
|
Identity Management Implementation |
|
|
230 | (1) |
|
Single/Multifactor Authentication |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
Registration, Proofing, and Establishment of Identity |
|
|
232 | (1) |
|
Federated Identity Management |
|
|
233 | (1) |
|
Credential Management Systems |
|
|
233 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
236 | (1) |
|
|
236 | (1) |
|
Objective 5.3 Federated identity with a third-party service |
|
|
237 | (2) |
|
Third-Party Identity Services |
|
|
237 | (1) |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
238 | (1) |
|
|
238 | (1) |
|
|
239 | (1) |
|
|
239 | (1) |
|
Objective 5.4 Implement and manage authorization mechanisms |
|
|
239 | (6) |
|
Authorization Mechanisms and Models |
|
|
240 | (1) |
|
Discretionary Access Control |
|
|
241 | (1) |
|
|
241 | (1) |
|
Role-Based Access Control |
|
|
242 | (1) |
|
Rule-Based Access Control |
|
|
242 | (1) |
|
Attribute-Based Access Control |
|
|
243 | (1) |
|
Risk-Based Access Control |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
244 | (1) |
|
Objective 5.5 Manage the identity and access provisioning lifecycle |
|
|
245 | (7) |
|
Identity and Access Provisioning Life Cycle |
|
|
245 | (1) |
|
Provisioning and Deprovisioning |
|
|
245 | (2) |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
249 | (2) |
|
|
251 | (1) |
|
|
251 | (1) |
|
|
252 | (1) |
|
Objective 5.6 Implement authentication systems |
|
|
252 | (7) |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
253 | (1) |
|
Security Assertion Markup Language |
|
|
253 | (1) |
|
|
254 | (2) |
|
Remote Access Authentication and Authorization |
|
|
256 | (1) |
|
|
257 | (1) |
|
|
257 | (1) |
|
|
258 | (1) |
|
6.0 Security Assessment and Testing |
|
|
259 | (26) |
|
Objective 6.1 Design and validate assessment, test, and audit strategies |
|
|
260 | (4) |
|
Defining Assessments, Tests, and Audits |
|
|
260 | (1) |
|
Designing and Validating Evaluations |
|
|
261 | (1) |
|
|
261 | (1) |
|
Use of Internal, External, and Third-Party Assessors |
|
|
262 | (1) |
|
|
263 | (1) |
|
|
263 | (1) |
|
|
264 | (1) |
|
Objective 6.2 Conduct security control testing |
|
|
264 | (8) |
|
|
264 | (1) |
|
|
265 | (1) |
|
|
265 | (2) |
|
|
267 | (1) |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
269 | (1) |
|
Breach Attack Simulations |
|
|
270 | (1) |
|
|
270 | (1) |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
Objective 6.3 Collect security process data (e.g., technical and administrative) |
|
|
272 | (5) |
|
|
272 | (1) |
|
|
273 | (2) |
|
|
275 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
Objective 6.4 Analyze test output and generate report |
|
|
277 | (4) |
|
Test Results and Reporting |
|
|
277 | (1) |
|
Analyzing the Test Results |
|
|
277 | (1) |
|
|
278 | (1) |
|
Remediation, Exception Handling, and Ethical Disclosure |
|
|
278 | (2) |
|
|
280 | (1) |
|
|
280 | (1) |
|
|
280 | (1) |
|
Objective 6.5 Conduct or facilitate security audits |
|
|
281 | (4) |
|
Conducting Security Audits |
|
|
281 | (1) |
|
Internal Security Auditors |
|
|
282 | (1) |
|
External Security Auditors |
|
|
282 | (1) |
|
Third-Party Security Auditors |
|
|
283 | (1) |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
285 | (108) |
|
Objective 7.1 Understand and comply with investigations |
|
|
286 | (9) |
|
|
286 | (1) |
|
|
287 | (1) |
|
Evidence Collection and Handling |
|
|
287 | (3) |
|
Digital Forensics Tools, Tactics, and Procedures |
|
|
290 | (1) |
|
|
291 | (1) |
|
Reporting and Documentation |
|
|
292 | (1) |
|
|
293 | (1) |
|
|
294 | (1) |
|
|
294 | (1) |
|
Objective 7.2 Conduct logging and monitoring activities |
|
|
295 | (9) |
|
|
295 | (1) |
|
|
296 | (1) |
|
Intrusion Detection and Prevention |
|
|
296 | (1) |
|
Security Information and Event Management |
|
|
297 | (1) |
|
|
297 | (1) |
|
|
298 | (1) |
|
|
298 | (3) |
|
User and Entity Behavior Analytics |
|
|
301 | (1) |
|
|
302 | (1) |
|
|
303 | (1) |
|
|
304 | (1) |
|
Objective 7.3 Perform Configuration Management (CM) (e.g., provisioning, baselining, automation) |
|
|
304 | (4) |
|
Configuration Management Activities |
|
|
304 | (1) |
|
|
305 | (1) |
|
|
305 | (1) |
|
Automating the Configuration Management Process |
|
|
306 | (1) |
|
|
306 | (1) |
|
|
307 | (1) |
|
|
307 | (1) |
|
Objective 7.4 Apply foundational security operations concepts |
|
|
308 | (6) |
|
|
308 | (1) |
|
Need-to-Know/Least Privilege |
|
|
308 | (1) |
|
Separation of Duties and Responsibilities |
|
|
309 | (1) |
|
Privileged Account Management |
|
|
310 | (1) |
|
|
311 | (1) |
|
|
312 | (1) |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
Objective 7.5 Apply resource protection |
|
|
314 | (4) |
|
Media Management and Protection |
|
|
315 | (1) |
|
|
315 | (1) |
|
Media Protection Techniques |
|
|
315 | (2) |
|
|
317 | (1) |
|
|
317 | (1) |
|
|
318 | (1) |
|
Objective 7.6 Conduct incident management |
|
|
318 | (8) |
|
Security Incident Management |
|
|
318 | (1) |
|
Incident Management Life Cycle |
|
|
319 | (5) |
|
|
324 | (1) |
|
|
325 | (1) |
|
|
326 | (1) |
|
Objective 7.7 Operate and maintain detective and preventative measures |
|
|
326 | (12) |
|
Detective and Preventive Controls |
|
|
326 | (1) |
|
Allow-Listing and Deny-Listing |
|
|
327 | (1) |
|
|
328 | (3) |
|
Intrusion Detection Systems and Intrusion Prevention Systems |
|
|
331 | (1) |
|
Third-Party Provided Security Services |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
334 | (1) |
|
|
335 | (1) |
|
Machine Learning and Artificial Intelligence |
|
|
336 | (1) |
|
|
336 | (2) |
|
|
338 | (1) |
|
|
338 | (1) |
|
Objective 7.8 Implement and support patch and vulnerability management |
|
|
338 | (6) |
|
Patch and Vulnerability Management |
|
|
339 | (1) |
|
|
339 | (1) |
|
Managing Patches and Updates |
|
|
340 | (2) |
|
|
342 | (1) |
|
|
342 | (1) |
|
|
343 | (1) |
|
Objective 7.9 Understand and participate in change management processes |
|
|
344 | (4) |
|
|
344 | (1) |
|
Change Management Processes |
|
|
344 | (3) |
|
|
347 | (1) |
|
|
347 | (1) |
|
|
348 | (1) |
|
Objective 7.10 Implement recovery strategies |
|
|
348 | (11) |
|
|
348 | (1) |
|
Backup Storage Strategies |
|
|
348 | (3) |
|
|
351 | (1) |
|
Multiple Processing Sites |
|
|
352 | (3) |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
356 | (1) |
|
|
356 | (1) |
|
|
357 | (1) |
|
|
358 | (1) |
|
|
359 | (1) |
|
Objective 7.11 Implement Disaster Recovery (DR) processes |
|
|
359 | (8) |
|
|
359 | (1) |
|
Saving Lives and Preventing Harm to People |
|
|
360 | (1) |
|
The Disaster Recovery Plan |
|
|
360 | (1) |
|
|
361 | (1) |
|
|
361 | (1) |
|
|
361 | (2) |
|
|
363 | (1) |
|
|
363 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
365 | (1) |
|
|
366 | (1) |
|
|
367 | (1) |
|
Objective 7.12 Test Disaster Recovery Plans (DRP) |
|
|
367 | (5) |
|
Testing the Disaster Recovery Plan |
|
|
367 | (1) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
369 | (1) |
|
|
370 | (1) |
|
|
370 | (1) |
|
|
371 | (1) |
|
|
371 | (1) |
|
|
372 | (1) |
|
Objective 7.13 Participate in Business Continuity (BC) planning and exercises |
|
|
372 | (5) |
|
|
372 | (1) |
|
Business Continuity Planning |
|
|
373 | (2) |
|
Business Continuity Exercises |
|
|
375 | (1) |
|
|
376 | (1) |
|
|
376 | (1) |
|
|
377 | (1) |
|
Objective 7.14 Implement and manage physical security |
|
|
377 | (11) |
|
|
377 | (1) |
|
Perimeter Security Controls |
|
|
378 | (4) |
|
Internal Security Controls |
|
|
382 | (4) |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
387 | (1) |
|
Objective 7.15 Address personnel safety and security concerns |
|
|
388 | (5) |
|
Personnel Safety and Security |
|
|
388 | (1) |
|
|
388 | (1) |
|
Security Training and Awareness |
|
|
389 | (1) |
|
|
389 | (1) |
|
|
390 | (1) |
|
|
391 | (1) |
|
|
391 | (1) |
|
|
392 | (1) |
|
8.0 Software Development Security |
|
|
393 | (34) |
|
Objective 8.1 Understand and integrate security in the Software Development Life Cycle (SDLC) |
|
|
394 | (9) |
|
Software Development Life Cycle |
|
|
394 | (1) |
|
Development Methodologies |
|
|
395 | (3) |
|
|
398 | (2) |
|
Operation and Maintenance |
|
|
400 | (1) |
|
|
401 | (1) |
|
|
401 | (1) |
|
|
401 | (1) |
|
|
402 | (1) |
|
|
403 | (1) |
|
Objective 8.2 Identify and apply security controls in software development ecosystems |
|
|
403 | (9) |
|
Security Controls in Software Development |
|
|
403 | (1) |
|
|
404 | (1) |
|
|
405 | (1) |
|
|
406 | (1) |
|
Integrated Development Environment |
|
|
406 | (1) |
|
|
406 | (1) |
|
Continuous Integration and Continuous Delivery |
|
|
407 | (1) |
|
Security Orchestration, Automation, and Response |
|
|
407 | (1) |
|
Software Configuration Management |
|
|
408 | (1) |
|
|
408 | (1) |
|
Application Security Testing |
|
|
408 | (3) |
|
|
411 | (1) |
|
|
411 | (1) |
|
|
412 | (1) |
|
Objective 8.3 Assess the effectiveness of software security |
|
|
412 | (4) |
|
Software Security Effectiveness |
|
|
412 | (1) |
|
Auditing and Logging Changes |
|
|
413 | (1) |
|
Risk Analysis and Mitigation |
|
|
413 | (2) |
|
|
415 | (1) |
|
|
415 | (1) |
|
|
415 | (1) |
|
Objective 8.4 Assess security impact of acquired software |
|
|
416 | (4) |
|
Security Impact of Acquired Software |
|
|
416 | (1) |
|
Commercial-off-the-Shelf Software |
|
|
416 | (1) |
|
|
417 | (1) |
|
|
417 | (1) |
|
|
418 | (1) |
|
|
419 | (1) |
|
|
419 | (1) |
|
|
420 | (1) |
|
Objective 8.5 Define and apply secure coding guidelines and standards |
|
|
420 | (7) |
|
Secure Coding Guidelines and Standards |
|
|
420 | (1) |
|
Security Weaknesses and Vulnerabilities at the Source-Code Level |
|
|
420 | (1) |
|
Security of Application Programming Interfaces |
|
|
421 | (1) |
|
|
422 | (2) |
|
Software-Defined Security |
|
|
424 | (1) |
|
|
424 | (1) |
|
|
425 | (1) |
|
|
425 | (2) |
|
A About the Online Content |
|
|
427 | (4) |
|
|
427 | (1) |
|
Your Total Seminars Training Hub Account |
|
|
427 | (1) |
|
|
427 | (1) |
|
Single User License Terms and Conditions |
|
|
427 | (2) |
|
|
429 | (1) |
|
|
429 | (2) |
Index |
|
431 | |