Foreword |
|
xxi | |
Introduction |
|
xxiii | |
|
Chapter 1 Access Controls |
|
|
1 | (64) |
|
|
3 | (9) |
|
|
4 | (2) |
|
Privileges: What Subjects Can Do with Objects |
|
|
6 | (1) |
|
Data Classification and Access Control |
|
|
7 | (2) |
|
Access Control via Formal Security Models |
|
|
9 | (3) |
|
Implement and Maintain Authentication Methods |
|
|
12 | (26) |
|
Single-Factor/Multifactor Authentication |
|
|
13 | (19) |
|
|
32 | (2) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
36 | (2) |
|
Support Internetwork Trust Architectures |
|
|
38 | (5) |
|
Trust Relationships (One-Way, Two-Way, Transitive) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
42 | (1) |
|
Participate in the Identity Management Lifecycle |
|
|
43 | (15) |
|
|
44 | (1) |
|
|
45 | (1) |
|
Provisioning/Deprovisioning |
|
|
46 | (2) |
|
Identity and Access Maintenance |
|
|
48 | (4) |
|
|
52 | (3) |
|
Identity and Access Management Systems |
|
|
55 | (3) |
|
Implement Access Controls |
|
|
58 | (5) |
|
Mandatory, Discretionary, and Nondiscretionary |
|
|
59 | (2) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
63 | (2) |
|
Chapter 2 Security Operations and Administration |
|
|
65 | (82) |
|
Comply with Codes of Ethics |
|
|
66 | (4) |
|
Understand, Adhere to, and Promote Professional Ethics |
|
|
67 | (1) |
|
|
68 | (1) |
|
Organizational Code of Ethics |
|
|
69 | (1) |
|
Understand Security Concepts |
|
|
70 | (31) |
|
Conceptual Models for Information Security |
|
|
71 | (1) |
|
|
72 | (7) |
|
|
79 | (2) |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
82 | (8) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
93 | (5) |
|
Access Control and Need-to-Know |
|
|
98 | (1) |
|
Job Rotation and Privilege Creep |
|
|
99 | (2) |
|
Document, Implement, and Maintain Functional Security Controls |
|
|
101 | (6) |
|
|
101 | (2) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
The Lifecycle of a Control |
|
|
106 | (1) |
|
Participate in Asset Management |
|
|
107 | (13) |
|
|
108 | (3) |
|
Lifecycle (Hardware, Software, and Data) |
|
|
111 | (1) |
|
|
112 | (1) |
|
Software Inventory and Licensing |
|
|
113 | (1) |
|
|
114 | (6) |
|
Implement Security Controls and Assess Compliance |
|
|
120 | (10) |
|
|
121 | (1) |
|
|
122 | (3) |
|
|
125 | (3) |
|
Periodic Audit and Review |
|
|
128 | (2) |
|
Participate in Change Management |
|
|
130 | (5) |
|
Execute Change Management Process |
|
|
132 | (2) |
|
|
134 | (1) |
|
Testing/Implementing Patches, Fixes, and Updates |
|
|
134 | (1) |
|
Participate in Security Awareness and Training |
|
|
135 | (3) |
|
Security Awareness Overview |
|
|
136 | (1) |
|
Competency as the Criterion |
|
|
137 | (1) |
|
Build a Security Culture, One Awareness Step at a Time |
|
|
137 | (1) |
|
Participate in Physical Security Operations |
|
|
138 | (8) |
|
|
138 | (4) |
|
|
142 | (1) |
|
|
143 | (3) |
|
|
146 | (1) |
|
Chapter 3 Risk Identification, Monitoring, and Analysis |
|
|
147 | (100) |
|
Defeating the Kill Chain One Skirmish at a Time |
|
|
148 | (8) |
|
Kill Chains: Reviewing the Basics |
|
|
151 | (4) |
|
|
155 | (1) |
|
Understand the Risk Management Process |
|
|
156 | (47) |
|
Risk Visibility and Reporting |
|
|
159 | (6) |
|
|
165 | (20) |
|
Risk Management Frameworks |
|
|
185 | (10) |
|
|
195 | (8) |
|
Perform Security Assessment Activities |
|
|
203 | (17) |
|
Security Assessment Workflow Management |
|
|
204 | (2) |
|
Participate in Security Testing |
|
|
206 | (9) |
|
Interpretation and Reporting of Scanning and Testing Results |
|
|
215 | (1) |
|
|
216 | (1) |
|
Audit Finding Remediation |
|
|
217 | (1) |
|
Manage the Architectures: Asset Management and Configuration Control |
|
|
218 | (2) |
|
Operate and Maintain Monitoring Systems |
|
|
220 | (18) |
|
|
222 | (7) |
|
|
229 | (1) |
|
|
230 | (6) |
|
Legal and Regulatory Concerns |
|
|
236 | (2) |
|
Analyze Monitoring Results |
|
|
238 | (8) |
|
Security Baselines and Anomalies |
|
|
240 | (3) |
|
Visualizations, Metrics, and Trends |
|
|
243 | (1) |
|
|
244 | (1) |
|
Document and Communicate Findings |
|
|
245 | (1) |
|
|
246 | (1) |
|
Chapter 4 Incident Response and Recovery |
|
|
247 | (88) |
|
Support the Incident Lifecycle |
|
|
249 | (38) |
|
|
253 | (1) |
|
Physical, Logical, and Administrative Surfaces |
|
|
254 | (1) |
|
Incident Response: Measures of Merit |
|
|
254 | (1) |
|
The Lifecycle of a Security Incident |
|
|
255 | (2) |
|
|
257 | (7) |
|
Detection, Analysis, and Escalation |
|
|
264 | (11) |
|
|
275 | (2) |
|
|
277 | (2) |
|
|
279 | (4) |
|
Lessons Learned; Implementation of New Countermeasures |
|
|
283 | (1) |
|
Third-Party Considerations |
|
|
284 | (3) |
|
Understand and Support Forensic Investigations |
|
|
287 | (19) |
|
Legal and Ethical Principles |
|
|
289 | (2) |
|
Logistics Support to Investigations |
|
|
291 | (1) |
|
|
292 | (5) |
|
|
297 | (9) |
|
Understand and Support Business Continuity Plan and Disaster Recovery Plan Activities |
|
|
306 | (22) |
|
Emergency Response Plans and Procedures |
|
|
307 | (3) |
|
Interim or Alternate Processing Strategies |
|
|
310 | (3) |
|
|
313 | (2) |
|
Backup and Redundancy Implementation |
|
|
315 | (4) |
|
Data Recovery and Restoration |
|
|
319 | (2) |
|
|
321 | (1) |
|
|
322 | (6) |
|
CIANA at Layer 8 and Above |
|
|
328 | (5) |
|
It Is a Dangerous World Out There |
|
|
329 | (3) |
|
People Power and Business Continuity |
|
|
332 | (1) |
|
|
333 | (2) |
|
|
335 | (132) |
|
Understand Fundamental Concepts of Cryptography |
|
|
336 | (59) |
|
Building Blocks of Digital Cryptographic Systems |
|
|
339 | (8) |
|
|
347 | (4) |
|
|
351 | (2) |
|
Symmetric Block and Stream Ciphers |
|
|
353 | (12) |
|
|
365 | (6) |
|
|
371 | (1) |
|
|
371 | (9) |
|
Elliptical Curve Cryptography |
|
|
380 | (3) |
|
|
383 | (5) |
|
|
388 | (4) |
|
|
392 | (1) |
|
|
393 | (2) |
|
Cryptographic Attacks, Cryptanalysis, and Countermeasures |
|
|
395 | (19) |
|
Cryptologic Hygiene as Countermeasures |
|
|
396 | (5) |
|
Common Attack Patterns and Methods |
|
|
401 | (8) |
|
Secure Cryptoprocessors, Hardware Security Modules, and Trusted Platform Modules |
|
|
409 | (5) |
|
Understand the Reasons and Requirements for Cryptography |
|
|
414 | (10) |
|
|
414 | (1) |
|
Integrity and Authenticity |
|
|
415 | (2) |
|
|
417 | (1) |
|
|
418 | (1) |
|
|
418 | (2) |
|
|
420 | (1) |
|
|
421 | (1) |
|
|
422 | (1) |
|
|
423 | (1) |
|
Transparency and Auditability |
|
|
423 | (1) |
|
|
424 | (1) |
|
Understand and Support Secure Protocols |
|
|
424 | (22) |
|
|
425 | (12) |
|
|
437 | (5) |
|
Deploying Cryptography: Some Challenging Scenarios |
|
|
442 | (2) |
|
Limitations and Vulnerabilities |
|
|
444 | (2) |
|
Understand Public Key Infrastructure Systems |
|
|
446 | (18) |
|
Fundamental Key Management Concepts |
|
|
447 | (12) |
|
|
459 | (3) |
|
|
462 | (2) |
|
|
464 | (3) |
|
Chapter 6 Network and Communications Security |
|
|
467 | (182) |
|
Understand and Apply Fundamental Concepts of Networking |
|
|
468 | (42) |
|
Complementary, Not Competing, Frameworks |
|
|
470 | (1) |
|
|
471 | (15) |
|
|
486 | (15) |
|
|
501 | (7) |
|
|
508 | (1) |
|
Software-Defined Networks |
|
|
509 | (1) |
|
IPv4 Addresses, DHCP, and Subnets |
|
|
510 | (4) |
|
|
510 | (2) |
|
|
512 | (1) |
|
Running Out of Addresses? |
|
|
513 | (1) |
|
IPv4 vs. IPv6: Key Differences and Options |
|
|
514 | (22) |
|
|
516 | (5) |
|
|
521 | (4) |
|
|
525 | (5) |
|
Commonly Used Ports and Protocols |
|
|
530 | (6) |
|
Understand Network Attacks and Countermeasures |
|
|
536 | (29) |
|
CIANA+PS Layer by Layer 5 |
|
|
38 | (515) |
|
Common Network Attack Types |
|
|
553 | (9) |
|
SCADA, IoT, and the Implications of Multilayer Protocols |
|
|
562 | (3) |
|
Manage Network Access Controls |
|
|
565 | (18) |
|
Network Access Control and Monitoring |
|
|
568 | (5) |
|
Network Access Control Standards and Protocols |
|
|
573 | (2) |
|
Remote Access Operation and Configuration |
|
|
575 | (8) |
|
|
583 | (10) |
|
Logical and Physical Placement of Network Devices |
|
|
586 | (1) |
|
|
587 | (4) |
|
|
591 | (2) |
|
Operate and Configure Network-Based Security Devices |
|
|
593 | (22) |
|
Network Address Translation |
|
|
594 | (2) |
|
Additional Security Device Considerations |
|
|
596 | (2) |
|
|
598 | (7) |
|
Network Intrusion Detection/Prevention Systems |
|
|
605 | (2) |
|
Security Information and Event Management Systems |
|
|
607 | (2) |
|
|
609 | (1) |
|
Network Security from Other Hardware Devices |
|
|
610 | (3) |
|
|
613 | (2) |
|
Operate and Configure Wireless Technologies |
|
|
615 | (31) |
|
Wireless: Common Characteristics |
|
|
616 | (8) |
|
|
624 | (13) |
|
|
637 | (1) |
|
Near-Field Communications |
|
|
638 | (1) |
|
Cellular/Mobile Phone Networks |
|
|
639 | (1) |
|
|
640 | (2) |
|
|
642 | (3) |
|
Wireless Security Devices |
|
|
645 | (1) |
|
|
646 | (3) |
|
Chapter 7 Systems and Application Security |
|
|
649 | (81) |
|
Systems and Software Insecurity |
|
|
650 | (20) |
|
Software Vulnerabilities Across the Lifecycle |
|
|
654 | (9) |
|
Risks of Poorly Merged Systems |
|
|
663 | (1) |
|
Hard to Design It Right, Easy to Fix It? |
|
|
664 | (3) |
|
Hardware and Software Supply Chain Security |
|
|
667 | (1) |
|
Positive and Negative Models for Software Security |
|
|
668 | (1) |
|
Is Blacklisting Dead? Or Dying? |
|
|
669 | (1) |
|
Information Security = Information Quality + Information Integrity |
|
|
670 | (8) |
|
|
671 | (3) |
|
Preserving Data Across the Lifecycle |
|
|
674 | (4) |
|
Identify and Analyze Malicious Code and Activity |
|
|
678 | (11) |
|
|
679 | (3) |
|
Malicious Code Countermeasures |
|
|
682 | (2) |
|
|
684 | (4) |
|
Malicious Activity Countermeasures |
|
|
688 | (1) |
|
Implement and Operate Endpoint Device Security |
|
|
689 | (12) |
|
|
691 | (1) |
|
|
692 | (1) |
|
Application White Listing |
|
|
693 | (1) |
|
|
694 | (1) |
|
|
695 | (1) |
|
|
696 | (1) |
|
|
697 | (3) |
|
|
700 | (1) |
|
Operate and Configure Cloud Security |
|
|
701 | (19) |
|
|
702 | (1) |
|
|
703 | (3) |
|
|
706 | (3) |
|
Legal and Regulatory Concerns |
|
|
709 | (7) |
|
Data Storage and Transmission |
|
|
716 | (1) |
|
Third-Party/Outsourcing Requirements |
|
|
716 | (1) |
|
|
717 | (1) |
|
Shared Responsibility Model |
|
|
718 | (1) |
|
Layered Redundancy as a Survival Strategy |
|
|
719 | (1) |
|
Operate and Secure Virtual Environments |
|
|
720 | (10) |
|
Software-Defined Networking |
|
|
723 | (2) |
|
|
725 | (1) |
|
|
726 | (1) |
|
Continuity and Resilience |
|
|
727 | (1) |
|
Attacks and Countermeasures |
|
|
727 | (2) |
|
|
729 | (1) |
Summary |
|
730 | (1) |
Index |
|
731 | |