Foreword |
|
xxv | |
Introduction |
|
xxvii | |
|
Domain 1 Security and Risk Management |
|
|
1 | (130) |
|
Understand and Apply Concepts of Confidentiality, Integrity, and Availability |
|
|
2 | (4) |
|
|
3 | (3) |
|
Evaluate and Apply Security Governance Principles |
|
|
6 | (5) |
|
Alignment of Security Functions to Business Strategy, Goals, Mission, and Objectives |
|
|
6 | (1) |
|
Vision, Mission, and Strategy |
|
|
6 | (1) |
|
|
7 | (3) |
|
|
10 | (1) |
|
Determine Compliance Requirements |
|
|
11 | (2) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
Legal Compliance Expectations |
|
|
13 | (1) |
|
Understand Legal and Regulatory Issues That Pertain to Information Security in a Global Context |
|
|
13 | (36) |
|
Cyber Crimes and Data Breaches |
|
|
14 | (22) |
|
|
36 | (13) |
|
Understand, Adhere to, and Promote Professional Ethics |
|
|
49 | (8) |
|
|
49 | (2) |
|
Established Standards of Ethical Conduct |
|
|
51 | (5) |
|
|
56 | (1) |
|
Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines |
|
|
57 | (5) |
|
|
58 | (3) |
|
|
61 | (1) |
|
|
61 | (1) |
|
Identify, Analyze, and Prioritize Business Continuity Requirements |
|
|
62 | (18) |
|
Develop and Document Scope and Plan |
|
|
62 | (8) |
|
|
70 | (1) |
|
|
71 | (2) |
|
Develop the Business Continuity Plan |
|
|
73 | (7) |
|
Contribute to and Enforce Personnel Security Policies and Procedures |
|
|
80 | (19) |
|
|
80 | (2) |
|
Candidate Screening and Hiring |
|
|
82 | (9) |
|
Onboarding and Termination Processes |
|
|
91 | (5) |
|
Vendor, Consultant, and Contractor Agreements and Controls |
|
|
96 | (1) |
|
|
97 | (2) |
|
Understand and Apply Risk Management Concepts |
|
|
99 | (12) |
|
|
99 | (1) |
|
Risk Management Frameworks |
|
|
99 | (9) |
|
Risk Assessment Methodologies |
|
|
108 | (3) |
|
Understand and Apply Threat Modeling Concepts and Methodologies |
|
|
111 | (5) |
|
|
111 | (1) |
|
Threat Modeling Methodologies |
|
|
112 | (4) |
|
Apply Risk-Based Management Concepts to the Supply Chain |
|
|
116 | (5) |
|
|
116 | (3) |
|
Supply Chain Risk Management |
|
|
119 | (2) |
|
Establish and Maintain a Security Awareness, Education, and Training Program |
|
|
121 | (7) |
|
Security Awareness Overview |
|
|
122 | (1) |
|
Developing an Awareness Program |
|
|
123 | (4) |
|
|
127 | (1) |
|
|
128 | (3) |
|
|
131 | (82) |
|
|
131 | (8) |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
134 | (2) |
|
|
136 | (3) |
|
Identify and Classify Information and Assets |
|
|
139 | (6) |
|
|
141 | (4) |
|
Determine and Maintain Information and Asset Ownership |
|
|
145 | (7) |
|
Asset Management Lifecycle |
|
|
146 | (2) |
|
Software Asset Management |
|
|
148 | (4) |
|
|
152 | (23) |
|
Cross-Border Privacy and Data Flow Protection |
|
|
153 | (8) |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
164 | (4) |
|
|
168 | (1) |
|
Data Localization or Residency |
|
|
169 | (2) |
|
Government and Law Enforcement Access to Data |
|
|
171 | (1) |
|
|
172 | (1) |
|
Understanding Data States |
|
|
173 | (1) |
|
Data Issues with Emerging Technologies |
|
|
173 | (2) |
|
Ensure Appropriate Asset Retention |
|
|
175 | (6) |
|
|
178 | (1) |
|
Determining Appropriate Records Retention |
|
|
178 | (1) |
|
Retention of Records in Data Lifecycle |
|
|
179 | (1) |
|
Records Retention Best Practices |
|
|
180 | (1) |
|
Determine Data Security Controls |
|
|
181 | (27) |
|
Technical, Administrative, and Physical Controls |
|
|
183 | (2) |
|
Establishing the Baseline Security |
|
|
185 | (1) |
|
|
186 | (3) |
|
|
189 | (9) |
|
|
198 | (10) |
|
Establish Information and Asset Handling Requirements |
|
|
208 | (4) |
|
|
208 | (1) |
|
|
209 | (1) |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
212 | (1) |
|
Domain 3 Security Architecture and Engineering |
|
|
213 | (150) |
|
Implement and Manage Engineering Processes Using Secure Design Principles |
|
|
215 | (15) |
|
Saltzer and Schroeder's Principles |
|
|
216 | (5) |
|
|
221 | (8) |
|
|
229 | (1) |
|
Using Security Principles |
|
|
230 | (1) |
|
Understand the Fundamental Concepts of Security Models |
|
|
230 | (7) |
|
|
232 | (2) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
235 | (2) |
|
Select Controls Based upon Systems Security Requirements |
|
|
237 | (4) |
|
Understand Security Capabilities of Information Systems |
|
|
241 | (12) |
|
|
241 | (3) |
|
|
244 | (3) |
|
|
247 | (6) |
|
Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements |
|
|
253 | (25) |
|
|
254 | (1) |
|
|
255 | (2) |
|
|
257 | (3) |
|
|
260 | (7) |
|
Industrial Control Systems |
|
|
267 | (4) |
|
|
271 | (3) |
|
|
274 | (1) |
|
|
275 | (3) |
|
Assess and Mitigate Vulnerabilities in Web-Based Systems |
|
|
278 | (9) |
|
Injection Vulnerabilities |
|
|
279 | (1) |
|
|
280 | (3) |
|
|
283 | (1) |
|
|
284 | (1) |
|
|
284 | (1) |
|
Security Misconfiguration |
|
|
285 | (1) |
|
|
285 | (1) |
|
Using Components with Known Vulnerabilities |
|
|
286 | (1) |
|
Insufficient Logging and Monitoring |
|
|
286 | (1) |
|
Cross-Site Request Forgery |
|
|
287 | (1) |
|
Assess and Mitigate Vulnerabilities in Mobile Systems |
|
|
287 | (5) |
|
|
288 | (1) |
|
Multifactor Authentication |
|
|
288 | (1) |
|
|
289 | (1) |
|
|
290 | (1) |
|
|
290 | (1) |
|
Unpatched Operating System or Browser |
|
|
290 | (1) |
|
|
291 | (1) |
|
|
291 | (1) |
|
Assess and Mitigate Vulnerabilities in Embedded Devices |
|
|
292 | (3) |
|
|
295 | (47) |
|
|
295 | (3) |
|
|
298 | (13) |
|
Public Key Infrastructure |
|
|
311 | (4) |
|
|
315 | (3) |
|
|
318 | (2) |
|
|
320 | (1) |
|
|
321 | (4) |
|
Understand Methods of Cryptanalytic Attacks |
|
|
325 | (14) |
|
Digital Rights Management |
|
|
339 | (3) |
|
Apply Security Principles to Site and Facility Design |
|
|
342 | (1) |
|
Implement Site and Facility Security Controls |
|
|
343 | (19) |
|
|
343 | (2) |
|
Wiring Closets/Intermediate Distribution Facilities |
|
|
345 | (1) |
|
Server Rooms/Data Centers |
|
|
346 | (2) |
|
|
348 | (1) |
|
|
349 | (1) |
|
Restricted and Work Area Security |
|
|
349 | (2) |
|
Utilities and Heating, Ventilation, and Air Conditioning |
|
|
351 | (4) |
|
|
355 | (3) |
|
Fire Prevention, Detection, and Suppression |
|
|
358 | (4) |
|
|
362 | (1) |
|
Domain 4 Communication and Network Security |
|
|
363 | (120) |
|
Implement Secure Design Principles in Network Architectures |
|
|
364 | (47) |
|
Open Systems Interconnection and Transmission Control Protocol/Internet Protocol Models |
|
|
365 | (17) |
|
Internet Protocol Networking |
|
|
382 | (10) |
|
Implications of Multilayer Protocols |
|
|
392 | (2) |
|
|
394 | (1) |
|
Software-Defined Networks |
|
|
395 | (1) |
|
|
396 | (13) |
|
Internet, Intranets, and Extranets |
|
|
409 | (1) |
|
|
410 | (1) |
|
|
410 | (1) |
|
Secure Network Components |
|
|
411 | (38) |
|
|
412 | (6) |
|
Network Address Translation |
|
|
418 | (3) |
|
Intrusion Detection System |
|
|
421 | (1) |
|
Security Information and Event Management |
|
|
422 | (1) |
|
Network Security from Hardware Devices |
|
|
423 | (6) |
|
|
429 | (13) |
|
|
442 | (5) |
|
Implementing Defense in Depth |
|
|
447 | (1) |
|
Content Distribution Networks |
|
|
448 | (1) |
|
Implement Secure Communication Channels According to Design |
|
|
449 | (32) |
|
Secure Voice Communications |
|
|
449 | (3) |
|
|
452 | (6) |
|
|
458 | (8) |
|
|
466 | (4) |
|
|
470 | (11) |
|
|
481 | (2) |
|
Domain 5 Identity and Access Management |
|
|
483 | (56) |
|
Control Physical and Logical Access to Assets |
|
|
484 | (8) |
|
|
485 | (1) |
|
|
486 | (1) |
|
|
487 | (1) |
|
|
488 | (4) |
|
Manage Identification and Authentication of People, Devices, and Services |
|
|
492 | (33) |
|
Identity Management Implementation |
|
|
494 | (2) |
|
Single Factor/Multifactor Authentication |
|
|
496 | (15) |
|
|
511 | (1) |
|
|
511 | (2) |
|
Registration and Proofing of Identity |
|
|
513 | (7) |
|
Federated Identity Management |
|
|
520 | (4) |
|
Credential Management Systems |
|
|
524 | (1) |
|
Integrate Identity as a Third-Party Service |
|
|
525 | (3) |
|
|
526 | (1) |
|
|
527 | (1) |
|
|
527 | (1) |
|
Implement and Manage Authorization Mechanisms |
|
|
528 | (5) |
|
Role-Based Access Control |
|
|
528 | (1) |
|
Rule-Based Access Control |
|
|
529 | (1) |
|
|
530 | (1) |
|
Discretionary Access Control |
|
|
531 | (1) |
|
Attribute-Based Access Control |
|
|
531 | (2) |
|
Manage the Identity and Access Provisioning Lifecycle |
|
|
533 | (4) |
|
|
534 | (1) |
|
System Account Access Review |
|
|
535 | (1) |
|
Provisioning and Deprovisioning |
|
|
535 | (1) |
|
|
536 | (1) |
|
|
537 | (2) |
|
Domain 6 Security Assessment and Testing |
|
|
539 | (58) |
|
Design and Validate Assessment, Test, and Audit Strategies |
|
|
540 | (5) |
|
|
543 | (2) |
|
Conduct Security Control Testing |
|
|
545 | (30) |
|
|
546 | (8) |
|
|
554 | (10) |
|
|
564 | (1) |
|
|
565 | (2) |
|
|
567 | (4) |
|
|
571 | (2) |
|
|
573 | (1) |
|
|
574 | (1) |
|
Collect Security Process Data |
|
|
575 | (12) |
|
|
577 | (2) |
|
Management Review and Approval |
|
|
579 | (1) |
|
Key Performance and Risk Indicators |
|
|
580 | (3) |
|
|
583 | (1) |
|
|
584 | (1) |
|
Disaster Recovery and Business Continuity |
|
|
585 | (2) |
|
Analyze Test Output and Generate Report |
|
|
587 | (3) |
|
Conduct or Facilitate Security Audits |
|
|
590 | (6) |
|
|
591 | (1) |
|
|
591 | (1) |
|
|
592 | (1) |
|
Integrating Internal and External Audits |
|
|
593 | (1) |
|
|
593 | (1) |
|
|
594 | (2) |
|
|
596 | (1) |
|
Domain 7 Security Operations |
|
|
597 | (98) |
|
Understand and Support Investigations |
|
|
598 | (12) |
|
Evidence Collection and Handling |
|
|
599 | (2) |
|
Reporting and Documentation |
|
|
601 | (1) |
|
|
602 | (2) |
|
Digital Forensics Tools, Techniques, and Procedures |
|
|
604 | (6) |
|
Understand Requirements for Investigation Types |
|
|
610 | (7) |
|
|
611 | (2) |
|
|
613 | (1) |
|
|
614 | (2) |
|
|
616 | (1) |
|
|
616 | (1) |
|
Conduct Logging and Monitoring Activities |
|
|
617 | (15) |
|
|
618 | (1) |
|
|
619 | (1) |
|
|
620 | (1) |
|
Intrusion Detection and Prevention |
|
|
621 | (2) |
|
Security Information and Event Management |
|
|
623 | (2) |
|
|
625 | (4) |
|
|
629 | (2) |
|
|
631 | (1) |
|
Securely Provision Resources |
|
|
632 | (5) |
|
|
632 | (2) |
|
|
634 | (1) |
|
|
635 | (2) |
|
Understand and Apply Foundational Security Operations Concepts |
|
|
637 | (10) |
|
Need to Know/Least Privilege |
|
|
637 | (1) |
|
Separation of Duties and Responsibilities |
|
|
638 | (2) |
|
Privileged Account Management |
|
|
640 | (2) |
|
|
642 | (1) |
|
|
643 | (1) |
|
|
644 | (3) |
|
Apply Resource Protection Techniques to Media |
|
|
647 | (3) |
|
|
647 | (1) |
|
|
647 | (1) |
|
|
648 | (1) |
|
Sanitization and Disposal |
|
|
649 | (1) |
|
Conduct Incident Management |
|
|
650 | (13) |
|
An Incident Management Program |
|
|
651 | (2) |
|
|
653 | (3) |
|
|
656 | (1) |
|
|
657 | (1) |
|
|
658 | (3) |
|
|
661 | (1) |
|
|
661 | (1) |
|
|
661 | (1) |
|
Third-Party Considerations |
|
|
662 | (1) |
|
Operate and Maintain Detective and Preventative Measures |
|
|
663 | (7) |
|
White-listing/Black-listing |
|
|
665 | (1) |
|
Third-Party Security Services |
|
|
665 | (2) |
|
|
667 | (1) |
|
|
667 | (3) |
|
Implement and Support Patch and Vulnerability Management |
|
|
670 | (2) |
|
Understand and Participate in Change Management Processes |
|
|
672 | (1) |
|
Implement Recovery Strategies |
|
|
673 | (6) |
|
Backup Storage Strategies |
|
|
673 | (3) |
|
|
676 | (2) |
|
Multiple Processing Sites |
|
|
678 | (1) |
|
System Resilience, High Availability, Quality of Service, and Fault Tolerance |
|
|
679 | (1) |
|
Implement Disaster Recovery Processes |
|
|
679 | (6) |
|
|
680 | (1) |
|
|
680 | (2) |
|
|
682 | (1) |
|
|
682 | (1) |
|
|
683 | (1) |
|
|
684 | (1) |
|
Test Disaster Recovery Plans |
|
|
685 | (3) |
|
|
686 | (1) |
|
|
687 | (1) |
|
|
687 | (1) |
|
|
687 | (1) |
|
|
688 | (1) |
|
Participate in Business Continuity Planning and Exercises |
|
|
688 | (1) |
|
Implement and Manage Physical Security |
|
|
689 | (4) |
|
|
689 | (3) |
|
|
692 | (1) |
|
Address Personnel Safety and Security Concerns |
|
|
693 | (1) |
|
|
693 | (1) |
|
|
693 | (1) |
|
|
694 | (1) |
|
Domain 8 Software Development Security |
|
|
695 | (180) |
|
Understand and Integrate Security in the Software Development Lifecycle |
|
|
696 | (80) |
|
Development Methodologies |
|
|
696 | (57) |
|
|
753 | (15) |
|
Operations and Maintenance |
|
|
768 | (2) |
|
|
770 | (3) |
|
|
773 | (3) |
|
Identify and Apply Security Controls in Development Environments |
|
|
776 | (26) |
|
Security of the Software Environment |
|
|
777 | (19) |
|
Configuration Management as an Aspect of Secure Coding |
|
|
796 | (2) |
|
Security of Code Repositories |
|
|
798 | (4) |
|
Assess the Effectiveness of Software Security |
|
|
802 | (33) |
|
Logging and Auditing of Changes |
|
|
802 | (15) |
|
Risk Analysis and Mitigation |
|
|
817 | (18) |
|
Assess the Security Impact of Acquired Software |
|
|
835 | (18) |
|
|
835 | (7) |
|
Software Acquisition Process |
|
|
842 | (3) |
|
|
845 | (3) |
|
|
848 | (4) |
|
Certification and Accreditation |
|
|
852 | (1) |
|
Define and Apply Secure Coding Standards and Guidelines |
|
|
853 | (21) |
|
Security Weaknesses and Vulnerabilities at the Source-Code Level |
|
|
854 | (5) |
|
Security of Application Programming Interfaces |
|
|
859 | (9) |
|
|
868 | (6) |
|
|
874 | (1) |
Index |
|
875 | |