Foreword |
|
xv | |
Introduction |
|
xvii | |
Editors |
|
xxi | |
Preface |
|
xxiii | |
|
Domain 1 Security & Risk Management |
|
|
|
Security & Risk Management |
|
|
1 | (6) |
|
Confidentiality, Integrity, and Availability |
|
|
7 | (2) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
7 | (2) |
|
|
9 | (14) |
|
Goals, Mission, and Objectives of the Organization |
|
|
10 | (2) |
|
|
12 | (1) |
|
Security Roles and Responsibilities |
|
|
13 | (9) |
|
Information Security Strategies |
|
|
22 | (1) |
|
The Complete and Effective Security Program |
|
|
23 | (11) |
|
Oversight Committee Representation |
|
|
23 | (8) |
|
|
31 | (2) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
34 | (7) |
|
Governance, Risk Management, and Compliance (GRC) |
|
|
36 | (1) |
|
Legislative and Regulatory Compliance |
|
|
37 | (1) |
|
Privacy Requirements Compliance |
|
|
38 | (3) |
|
Global Legal and Regulatory Issues |
|
|
41 | (16) |
|
|
41 | (4) |
|
Licensing and Intellectual Property |
|
|
45 | (2) |
|
|
47 | (3) |
|
|
50 | (1) |
|
|
51 | (2) |
|
|
53 | (2) |
|
Relevant Laws and Regulations |
|
|
55 | (2) |
|
Understand Professional Ethics |
|
|
57 | (14) |
|
Regulatory Requirements for Ethics Programs |
|
|
59 | (1) |
|
Topics in Computer Ethics |
|
|
60 | (1) |
|
Common Computer Ethics Fallacies |
|
|
61 | (2) |
|
|
63 | (1) |
|
Ethics Codes of Conduct and Resources |
|
|
63 | (2) |
|
(ISC)2 Code of Professional Ethics |
|
|
65 | (1) |
|
Support Organization's Code of Ethics |
|
|
66 | (5) |
|
Develop and Implement Security Policy |
|
|
71 | (1) |
|
Business Continuity (BC) & Disaster Recovery (DR) Requirements |
|
|
72 | (8) |
|
Project Initiation and Management |
|
|
72 | (2) |
|
Develop and Document Project Scope and Plan |
|
|
74 | (1) |
|
Conducting the Business Impact Analysis (BIA) |
|
|
75 | (1) |
|
|
75 | (3) |
|
Assess Exposure to Outages |
|
|
78 | (1) |
|
Recovery Point Objectives (RPO) |
|
|
79 | (1) |
|
Manage Personnel Security |
|
|
80 | (11) |
|
Employment Candidate Screening |
|
|
80 | (6) |
|
Employment Agreements and Policies |
|
|
86 | (3) |
|
Employee Termination Processes |
|
|
89 | (1) |
|
Vendor, Consultant, and Contractor Controls |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
91 | (65) |
|
Organizational Risk Management Concepts |
|
|
93 | (2) |
|
Risk Assessment Methodologies |
|
|
95 | (7) |
|
Identify Threats and Vulnerabilities |
|
|
102 | (1) |
|
|
103 | (6) |
|
|
109 | (1) |
|
Implementation of Risk Countermeasures |
|
|
109 | (2) |
|
|
111 | (5) |
|
|
116 | (16) |
|
Controls Assessment/Monitoring and Measuring |
|
|
132 | (12) |
|
Tangible and Intangible Asset Valuation |
|
|
144 | (2) |
|
|
146 | (1) |
|
Risk Management Frameworks |
|
|
147 | (9) |
|
|
156 | (5) |
|
Determining Potential Attacks and Reduction Analysis |
|
|
157 | (2) |
|
Technologies & Processes to Remediate Threats |
|
|
159 | (2) |
|
Acquisitions Strategy and Practice |
|
|
161 | (6) |
|
Hardware, Software, and Services |
|
|
161 | (2) |
|
Manage Third-Party Governance |
|
|
163 | (1) |
|
Minimum Security and Service-Level Requirements |
|
|
164 | (3) |
|
Security Education, Training, and Awareness |
|
|
167 | (16) |
|
Formal Security Awareness Training |
|
|
167 | (2) |
|
Awareness Activities and Methods -- Creating the Culture of Awareness in the Organization |
|
|
169 | (14) |
|
|
|
|
183 | (4) |
|
Data Management: Determine and Maintain Ownership |
|
|
187 | (6) |
|
|
187 | (1) |
|
Roles and Responsibilities |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
189 | (1) |
|
|
190 | (2) |
|
Data Documentation and Organization |
|
|
192 | (1) |
|
|
193 | (4) |
|
|
194 | (1) |
|
Data Specification and Modeling |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
195 | (1) |
|
Data Storage and Archiving |
|
|
196 | (1) |
|
|
197 | (10) |
|
|
197 | (1) |
|
Data Access, Sharing, and Dissemination |
|
|
198 | (1) |
|
|
199 | (8) |
|
Classify Information and Supporting Assets |
|
|
207 | (3) |
|
|
210 | (3) |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
213 | (5) |
|
Ensure Appropriate Retention |
|
|
218 | (5) |
|
Media, Hardware, and Personnel |
|
|
218 | (2) |
|
Company "X" Data Retention Policy |
|
|
220 | (3) |
|
Determine Data Security Controls |
|
|
223 | (9) |
|
|
223 | (2) |
|
|
225 | (3) |
|
|
228 | (3) |
|
|
231 | (1) |
|
|
232 | (17) |
|
|
232 | (3) |
|
|
235 | (2) |
|
National Cyber Security Framework Manual |
|
|
237 | (3) |
|
Framework for Improving Critical Infrastructure Cybersecurity |
|
|
240 | (9) |
|
Domain 3 Security Engineering |
|
|
|
|
249 | (6) |
|
The Engineering Lifecycle Using Security Design Principles |
|
|
255 | (5) |
|
Fundamental Concepts of Security Models |
|
|
260 | (31) |
|
|
261 | (8) |
|
|
269 | (1) |
|
Enterprise Security Architecture |
|
|
270 | (5) |
|
Common Architecture Frameworks |
|
|
275 | (1) |
|
|
276 | (12) |
|
Capturing and Analyzing Requirements |
|
|
288 | (2) |
|
Creating and Documenting Security Architecture |
|
|
290 | (1) |
|
Information Systems Security Evaluation Models |
|
|
291 | (12) |
|
Common Formal Security Models |
|
|
291 | (1) |
|
Product Evaluation Models |
|
|
292 | (6) |
|
Industry and International Security Implementation Guidelines |
|
|
298 | (5) |
|
Security Capabilities of Information Systems |
|
|
303 | (4) |
|
Access Control Mechanisms |
|
|
303 | (1) |
|
|
304 | (3) |
|
Vulnerabilities of Security Architectures |
|
|
307 | (18) |
|
|
310 | (2) |
|
Technology and Process Integration |
|
|
312 | (6) |
|
Single Point of Failure (SPOF) |
|
|
318 | (3) |
|
Client-Based Vulnerabilities |
|
|
321 | (2) |
|
Server-Based Vulnerabilities |
|
|
323 | (2) |
|
|
325 | (43) |
|
Large Scale Parallel Data Systems |
|
|
327 | (4) |
|
|
331 | (4) |
|
|
335 | (33) |
|
Software and System Vulnerabilities and Threats |
|
|
368 | (4) |
|
|
369 | (3) |
|
Vulnerabilities in Mobile Systems |
|
|
372 | (5) |
|
Risks from Remote Computing |
|
|
373 | (2) |
|
Risks from Mobile Workers |
|
|
375 | (2) |
|
Vulnerabilities in Embedded Devices and Cyber-Physical Systems |
|
|
377 | (7) |
|
The Application and Use of Cryptography |
|
|
384 | (36) |
|
The History of Cryptography |
|
|
384 | (2) |
|
|
386 | (1) |
|
Core Information Security Principles |
|
|
387 | (1) |
|
Additional Features of Cryptographic Systems |
|
|
387 | (2) |
|
The Cryptographic Lifecycle |
|
|
389 | (3) |
|
Public Key Infrastructure (PKI) |
|
|
392 | (1) |
|
|
393 | (7) |
|
Creation and Distribution of Keys |
|
|
400 | (8) |
|
|
408 | (1) |
|
Digital Rights Management (DRM) |
|
|
409 | (2) |
|
|
411 | (1) |
|
|
412 | (1) |
|
|
412 | (3) |
|
Methods of Cryptanalytic Attacks |
|
|
415 | (5) |
|
Site and Facility Design Considerations |
|
|
420 | (3) |
|
|
420 | (3) |
|
|
423 | (8) |
|
|
424 | (1) |
|
Crime Prevention through Environmental Design (CPTED) |
|
|
424 | (2) |
|
|
426 | (5) |
|
Design and Implement Facility Security |
|
|
431 | (1) |
|
Implementation and Operation of Facilities Security |
|
|
432 | (21) |
|
Communications and Server Rooms |
|
|
432 | (2) |
|
Restricted and Work Area Security |
|
|
434 | (1) |
|
|
435 | (18) |
|
Domain 4 Communications & Network Security |
|
|
|
Communications & Network Security |
|
|
453 | (6) |
|
Secure Network Architecture and Design |
|
|
459 | (26) |
|
|
459 | (11) |
|
|
470 | (5) |
|
|
475 | (10) |
|
Implications of Multi-Layer Protocols |
|
|
485 | (4) |
|
|
489 | (44) |
|
|
490 | (9) |
|
Voice over Internet Protocol (VoIP) |
|
|
499 | (5) |
|
|
504 | (4) |
|
|
508 | (3) |
|
Cryptography Used to Maintain Communications Security |
|
|
511 | (22) |
|
Securing Network Components |
|
|
533 | (17) |
|
|
537 | (4) |
|
|
541 | (3) |
|
Network Access Control Devices |
|
|
544 | (4) |
|
|
548 | (1) |
|
Content Distribution Networks |
|
|
549 | (1) |
|
Secure Communication Channels |
|
|
550 | (50) |
|
|
550 | (3) |
|
|
553 | (2) |
|
Open Protocols, Applications, and Services |
|
|
555 | (4) |
|
|
559 | (9) |
|
|
568 | (22) |
|
|
590 | (10) |
|
|
600 | (35) |
|
The Network as an Enabler or Channel of Attack |
|
|
601 | (1) |
|
The Network as a Bastion of Defense |
|
|
602 | (1) |
|
Network Security Objectives and Attack Modes |
|
|
602 | (6) |
|
|
608 | (6) |
|
Security Event Management (SEM) |
|
|
614 | (3) |
|
IP Fragmentation Attacks and Crafted Packets |
|
|
617 | (4) |
|
Denial-of-Service (DoS)/Distributed-Denial-of Service (DDoS) Attacks |
|
|
621 | (2) |
|
|
623 | (3) |
|
|
626 | (9) |
|
Domain 5 Identity & Access Management |
|
|
|
Identity & Access Management |
|
|
635 | (6) |
|
Physical and Logical Access to Assets |
|
|
641 | (6) |
|
Identification and Authentication of People and Devices |
|
|
647 | (9) |
|
Identification, Authentication, and Authorization |
|
|
647 | (9) |
|
Identity Management Implementation |
|
|
656 | (45) |
|
|
656 | (2) |
|
|
658 | (1) |
|
|
659 | (1) |
|
|
659 | (1) |
|
|
660 | (13) |
|
Single/Multi-Factor Authentication |
|
|
673 | (11) |
|
|
684 | (2) |
|
|
686 | (2) |
|
Registration and Proof of Identity |
|
|
688 | (3) |
|
Credential Management Systems |
|
|
691 | (10) |
|
Identity as a Service (IDaaS) |
|
|
701 | (5) |
|
Integrate Third-Party Identity Services |
|
|
706 | (3) |
|
Implement and Manage Authorization Mechanisms |
|
|
709 | (5) |
|
Role-Based Access Control |
|
|
709 | (2) |
|
Rule-Based Access Control |
|
|
711 | (1) |
|
Mandatory Access Controls (MACs) |
|
|
711 | (2) |
|
Discretionary Access Controls (DACs) |
|
|
713 | (1) |
|
Prevent or Mitigate Access Control Attacks |
|
|
714 | (14) |
|
Windows PowerShell Equivalent Commands |
|
|
722 | (6) |
|
Identity and Access Provisioning Lifecycle |
|
|
728 | (9) |
|
|
728 | (1) |
|
|
729 | (1) |
|
|
729 | (8) |
|
Domain 6 Security Assessment & Testing |
|
|
|
Security Assessment & Testing |
|
|
737 | (6) |
|
Assessment and Test Strategies |
|
|
743 | (26) |
|
Software Development as Part of System Design |
|
|
744 | (1) |
|
|
745 | (8) |
|
|
753 | (2) |
|
|
755 | (8) |
|
Negative Testing/Misuse Case Testing |
|
|
763 | (2) |
|
|
765 | (4) |
|
Collect Security Process Data |
|
|
769 | (5) |
|
Internal and Third-Party Audits |
|
|
774 | (11) |
|
|
774 | (11) |
|
Domain 7 Security Operations |
|
|
|
|
785 | (4) |
|
|
789 | (25) |
|
|
790 | (2) |
|
Policy, Roles, and Responsibilities |
|
|
792 | (2) |
|
Incident Handling and Response |
|
|
794 | (3) |
|
|
797 | (1) |
|
Evidence Collection and Handling |
|
|
798 | (1) |
|
Reporting and Documenting |
|
|
799 | (5) |
|
Evidence Collection and Processing |
|
|
804 | (3) |
|
Continuous and Egress Monitoring |
|
|
807 | (2) |
|
Data Leak/Loss Prevention (DLP) |
|
|
809 | (5) |
|
Provisioning of Resources through Configuration Management |
|
|
814 | (2) |
|
Foundational Security Operations Concepts |
|
|
816 | (12) |
|
|
816 | (1) |
|
Controlling Privileged Accounts |
|
|
817 | (1) |
|
Managing Accounts Using Groups and Roles |
|
|
818 | (2) |
|
Separation of Duties and Responsibilities |
|
|
820 | (2) |
|
Monitor Special Privileges |
|
|
822 | (1) |
|
|
823 | (1) |
|
Manage the Information Lifecycle |
|
|
823 | (2) |
|
Service Level Agreements (SLAs) |
|
|
825 | (3) |
|
|
828 | (7) |
|
Tangible versus Intangible Assets |
|
|
828 | (1) |
|
|
829 | (1) |
|
|
829 | (6) |
|
|
835 | (7) |
|
|
835 | (1) |
|
Security Measurements, Metrics, and Reporting |
|
|
836 | (1) |
|
Managing Security Technologies |
|
|
837 | (1) |
|
|
837 | (2) |
|
|
839 | (1) |
|
|
840 | (1) |
|
|
840 | (1) |
|
Remediation and Review (Lessons Learned) |
|
|
840 | (2) |
|
Preventative Measures against Attacks |
|
|
842 | (11) |
|
|
842 | (1) |
|
Network Intrusion Detection System Architecture |
|
|
843 | (6) |
|
Whitelisting, Blacklisting, and Greylisting... Oh My! |
|
|
849 | (1) |
|
Third-party Security Services, Sandboxing, Anti-malware, Honeypots and Honeynets |
|
|
849 | (4) |
|
Patch and Vulnerability Management |
|
|
853 | (7) |
|
Security and Patch Information Sources |
|
|
855 | (5) |
|
Change and Configuration Management |
|
|
860 | (14) |
|
|
861 | (3) |
|
|
864 | (3) |
|
Multiple Processing Sites |
|
|
867 | (1) |
|
System Resilience and Fault Tolerance Requirements |
|
|
868 | (6) |
|
The Disaster Recovery Process |
|
|
874 | (12) |
|
|
875 | (2) |
|
|
877 | (4) |
|
|
881 | (1) |
|
|
881 | (2) |
|
|
883 | (1) |
|
|
883 | (1) |
|
|
884 | (1) |
|
Exercise, Assess, and Maintain the Plan |
|
|
885 | (1) |
|
|
886 | (8) |
|
Tabletop Exercise/Structured Walk-Through Test |
|
|
887 | (1) |
|
Walk-Through Drill/Simulation Test |
|
|
888 | (1) |
|
Functional Drill/Parallel Test |
|
|
888 | (1) |
|
Full-Interruption/Full-Scale Test |
|
|
889 | (1) |
|
Update and Maintenance of the Plan |
|
|
889 | (5) |
|
Business Continuity and Other Risk Areas |
|
|
894 | (10) |
|
Implementation and Operation of Perimeter Security |
|
|
894 | (10) |
|
|
904 | (31) |
|
|
905 | (1) |
|
|
906 | (11) |
|
|
917 | (5) |
|
Building and Inside Security |
|
|
922 | (13) |
|
|
935 | (14) |
|
|
935 | (1) |
|
|
935 | (2) |
|
|
937 | (12) |
|
Domain 8 Security in the Software Development Life Cycle |
|
|
|
Security in the Software Development Life Cycle |
|
|
949 | (4) |
|
Software Development Security Outline |
|
|
953 | (11) |
|
|
954 | (5) |
|
|
959 | (1) |
|
Operation and Maintenance |
|
|
960 | (1) |
|
|
961 | (1) |
|
Integrated Product Team (e.g., DevOps) |
|
|
962 | (2) |
|
Environment and Security Controls |
|
|
964 | (24) |
|
Software Development Methods |
|
|
964 | (3) |
|
The Database and Data Warehousing Environment |
|
|
967 | (11) |
|
Database Vulnerabilities and Threats |
|
|
978 | (2) |
|
|
980 | (4) |
|
|
984 | (2) |
|
Web Application Environment |
|
|
986 | (2) |
|
Security of the Software Environment |
|
|
988 | (37) |
|
Applications Development and Programming Concepts |
|
|
988 | (2) |
|
|
990 | (11) |
|
|
1001 | (3) |
|
Security Issues in Source Code |
|
|
1004 | (6) |
|
Malicious Software (Malware) |
|
|
1010 | (10) |
|
|
1020 | (5) |
|
Software Protection Mechanisms |
|
|
1025 | (24) |
|
Security Kernels, Reference Monitors, and the TCB |
|
|
1025 | (15) |
|
|
1040 | (1) |
|
Security of Code Repositories |
|
|
1041 | (5) |
|
Security of Application Programming Interfaces (API) |
|
|
1046 | (3) |
|
Assess the Effectiveness of Software Security |
|
|
1049 | (10) |
|
Certification and Accreditation |
|
|
1049 | (2) |
|
Auditing and Logging of Changes |
|
|
1051 | (1) |
|
Risk Analysis and Mitigation |
|
|
1052 | (7) |
|
Assess Software Acquisition Security |
|
|
1059 | (12) |
Appendix A Answers to Domain Review Questions |
|
1071 | (82) |
Appendix B Domain 1 Materials |
|
1153 | (14) |
Appendix C Domain 2 Materials |
|
1167 | (20) |
Appendix D Domain 3 Materials |
|
1187 | (4) |
Appendix E Domain 4 Materials |
|
1191 | (4) |
Appendix F Domain 5 Materials |
|
1195 | (6) |
Appendix G Domain 6 Materials |
|
1201 | (6) |
Appendix H Domain 7 Materials |
|
1207 | (12) |
Appendix I Domain 8 Materials |
|
1219 | (8) |
Appendix J Glossary |
|
1227 | (30) |
Appendix K Index |
|
1257 | |