• Describe cloud reference architecture.
  • Understand security concepts relevant to cloud computing.
  • Cover the cloud secure data lifecycle, business continuity, disaster recovery, and functional security requirements.
  • Base evaluations on verification criteria, system certifications, cryptography, identity and access control, data sanitization, network security, virtualization security, common threats, and security hygiene.
  • Outline the data life cycle phases, data dispersion, and data flows.
  • Consider storage types and threats.
  • Design and apply data security technologies and strategies.
  • Identify structured, unstructured, and semi-structured data and data location.
  • Describe encryption and key management, hashing, data obfuscation, tokenization, data loss prevention (DLP), keys, secrets, certificates management, data classification policies, data mapping, and data labeling.

hours

30

language

English

Summary

  • Describe cloud reference architecture.
  • Understand security concepts relevant to cloud computing.
  • Cover the cloud secure data lifecycle, business continuity, disaster recovery, and functional security requirements.
  • Base evaluations on verification criteria, system certifications, cryptography, identity and access control, data sanitization, network security, virtualization security, common threats, and security hygiene.
  • Outline the data life cycle phases, data dispersion, and data flows.
  • Consider storage types and threats.
  • Design and apply data security technologies and strategies.
  • Identify structured, unstructured, and semi-structured data and data location.
  • Describe encryption and key management, hashing, data obfuscation, tokenization, data loss prevention (DLP), keys, secrets, certificates management, data classification policies, data mapping, and data labeling.

Topics Covered

  • 1 - Understand, adhere to, and promote professional ethics
  • ISC2 Code of Professional Ethics
  • Organizational code of ethics
  • 2 - Understand and apply security concepts
  • Confidentiality, integrity, and availability, authenticity and nonrepudiation
  • 3 – Evaluate and apply security governance principles
  • Alignment of the security function to business strategy, goals, mission, and objectives
  • Organizational processes (e.g., acquisitions, divestitures, governance committees)
  • Organizational roles and responsibilities
  • Security control frameworks
  • Due care/due diligence
  • 4 – Determine compliance and other requirements
  • Contractual, legal, industry standards, and regulatory requirements
  • Privacy requirements
  • 5 – Understand legal and regulatory issues that pertain to information security in a holistic context
  • Cybercrimes and data breaches
  • Licensing and Intellectual Property (IP) requirements
  • Import/export controls
  • Transborder data flow
  • Privacy
  • 6 – Understand requirements for investigation types (i.e., administrative, criminal, civil, regulatory, industry standards)
  • 7 - Develop, document, and implement security policy, standards, procedures, and guidelines
  • 8 - Identify, analyze, and prioritize Business Continuity (BC) requirements
  • Business Impact Analysis (BIA)
  • Develop and document the scope and the plan
  • 9 - Contribute to and enforce personnel security policies and procedures
  • Candidate screening and hiring
  • Employment agreements and policies
  • Onboarding, transfers, and termination processes
  • Vendor, consultant, and contractor agreements and controls
  • Compliance policy requirements
  • Privacy policy requirements
  • 10 - Understand and apply risk management concepts
  • Identify threats and vulnerabilities
  • Risk assessment/analysis
  • Risk response
  • Countermeasure selection and implementation
  • Applicable types of controls (e.g., preventive, detective, corrective)
  • Control assessments (security and privacy)
  • Monitoring and measurement
  • Reporting
  • Continuous improvement (e.g., Risk maturity modeling)
  • Risk frameworks
  • 11 – Understand and apply threat modeling concepts and methodologies
  • 12 – Apply Supply Chain Risk Management (SCRM) concepts
  • Risks associated with hardware, software, and services.
  • Third-party assessment and monitoring
  • Minimum security requirements
  • Service level requirements
  • 13 – Establish and maintain a security awareness, education, and training program
  • Methods and techniques to present awareness and training (e.g., social engineering, phishing, security champions, gamification)
  • Periodic content reviews
  • Program effectiveness evaluation
  • 1 – Identify and classify information and assets
  • Data classification
  • Asset Classification
  • 2 – Establish information and asset handling requirements
  • 3 – Provision resources securely
  • Data classification
  • Asset Classification
  • 4 – Manage date lifecycle
  • Data roles (i.e., owners, controllers, custodians, processors, users/subjects)
  • Data collection
  • Data location
  • Data maintenance
  • Data retention
  • Data remanence
  • Data destruction
  • 5 – Ensure appropriate asset retention (e.g., End-of-Life (EOL), End-of-Support (EOS))
  • 6 – Determine data security controls and compliance requirements
  • Data states (e.g., in use, in transit, at rest)
  • Scoping and tailoring
  • Standards selection
  • Data protection methods (e.g., Digital Rights Management (DRM), Data Loss Prevention (DLP), Cloud Access Security Broker (CASB))
  • 1 – Research, implement and manage engineering processes using secure design principles
  • Threat modeling
  • Least privilege
  • Defense in depth
  • Secure defaults
  • Fail securely
  • Separation of Duties (SoD)
  • Keep it simple
  • Zero Trust
  • Privacy by design
  • Trust but verify
  • Shared responsibility
  • 2 – Understand the fundamental concepts of security models (e.g., Biba, Star Model, Bell-LaPadula)
  • 3 – Select controls based upon systems security requirements
  • 4 – Understand security capabilities of Information Systems (IS) (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption)
  • 5 – Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
  • Client-based systems
  • Server-based systems
  • Database systems
  • Cryptographic systems
  • Industrial Control Systems (ICS)
  • Cloud-based systems (e.g., Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS))
  • Distributed systems
  • Internet of Things (IoT)
  • Microservices
  • Containerization
  • Serverless
  • Embedded systems
  • High-Performance Computing (HPC) systems
  • Edge computing systems
  • Virtualized systems
  • 6 – Select and determine cryptographic solutions
  • Cryptographic life cycle (e.g., keys, algorithm selection)
  • Cryptographic methods (e.g., symmetric, asymmetric, elliptic curves, quantum)
  • Public Key Infrastructure (PKI)
  • Key management practices
  • Digital signatures and digital certificates
  • Non-repudiation
  • Integrity (e.g., hashing)
  • 7 – Understand methods of cryptanalytic attacks
  • Brute force
  • Ciphertext only
  • Known plaintext
  • Frequency analysis
  • Chosen ciphertext
  • Implementation attacks
  • Side-channel
  • Fault injection
  • Timing
  • Man-in-the-Middle (MITM)
  • Pass the hash
  • Kerberos exploitation
  • Ransomware
  • 8 – Apply security principles to site and facility design
  • 9 – Design site and facility security controls
  • Wiring closets/intermediate distribution facilities
  • Server rooms/data centers
  • Media storage facilities
  • Evidence storage
  • Restricted and work area security
  • Utilities and Heating, Ventilation, and Air Conditioning (HVAC)
  • Environmental issues
  • Fire prevention, detection, and suppression
  • Power (e.g., redundant, backup)
  • 1 – Assess and implement secure design principles in network architectures
  • Open System Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) models
  • Internet Protocol (IP) networking (e.g., Internet Protocol Security (IPSec), Internet Protocol (IP) v4/6)
  • Secure protocols
  • Implications of multilayer protocols
  • Converged protocols (e.g., Fiber Channel Over Ethernet (FCoE), Internet Small Computer Systems Interface (iSCSI), Voice over Internet Protocol (VoIP))
  • Micro-segmentation (e.g., Software Defined Networks (SDN), Virtual eXtensible Local Area Network (VXLAN), Encapsulation, Software-Defined Wide Area Network (SD-WAN))
  • Wireless networks (e.g., Li-Fi, Wi-Fi, Zigbee, satellite)
  • Cellular networks (e.g., 4G, 5G)
  • Content Distribution Networks (CDN)
  • 2 – Secure network components
  • Operation of hardware (e.g., redundant power, warranty, support)
  • Transmission media
  • Network Access Control (NAC) devices
  • Endpoint security
  • 3 – Implement secure communication channels according to design
  • Voice
  • Multimedia collaboration
  • Remote access
  • Data communications
  • Virtualized networks
  • Third-party connectivity
  • 1– Control physical and logical access to assets
  • Information
  • Systems
  • Devices
  • Facilities
  • Applications
  • 2 – Manage identification and authentication of people, devices, and services
  • Identity Management (IdM) implementation
  • Single/Multi-Factor Authentication (MFA)
  • Accountability
  • Session management
  • Registration, proofing, and establishment of identity
  • Federated Identity Management (FIM)
  • Credential management systems
  • Single Sign On (SSO)
  • Just-In-Time (JIT)
  • 3 – Federated identity with a third-party service
  • On-premise
  • Cloud
  • Hybrid
  • 4 – Implement and manage authorization mechanisms
  • Role Based Access Control (RBAC)
  • Rule based access control
  • Mandatory Access Control (MAC)
  • Discretionary Access Control (DAC)
  • Attribute Based Access Control (ABAC)
  • Risk based access control
  • 5 – Manage the identity and access provisioning lifecycle
  • Account access review (e.g., user, system, service)
  • Provisioning and deprovisioning (e.g., on /off boarding and transfers)
  • Role definition (e.g., people assigned to new roles)
  • Privilege escalation (e.g., managed service accounts, use of sudo, minimizing its use)
  • 6 – Implement authentication systems
  • OpenID Connect (OIDC)/Open Authorization (Oauth)
  • Security Assertion Markup Language (SAML)
  • Kerberos
  • Remote Authentication Dial-In User Service (RADIUS)/Terminal Access Controller Access Control System Plus (TACACS+)
  •  
  • 1 – Design and validate assessment, test, and audit strategies
  • Internal
  • External
  • Third-party
  • 2 – Conduct security control testing
  • Vulnerability assessment
  • Penetration testing
  • Log reviews
  • Synthetic transactions
  • Code review and testing
  • Misuse case testing
  • Test coverage analysis
  • Interface testing
  • Breach attack simulations
  • Compliance checks
  • 3 – Collect security process data (e.g., technical and administrative)
  • Account management
  • Management review and approval
  • Key performance and risk indicators
  • Backup verification data
  • Training and awareness
  • Disaster Recovery (DR) and Business Continuity (BC)
  • 4 – Analyze test output and generate report
  • Remediation
  • Exception handling
  • Ethical disclosure
  • 5 – Conduct or facilitate security audits
  • Internal
  • External
  • Third-party
  • 1 – Understand and comply with investigations
  • Evidence collection and handling
  • Reporting and documentation
  • Investigative techniques
  • Digital forensics tools, tactics, and procedures
  • Artifacts (e.g., computer, network, mobile device)
  • 2 – Conduct or facilitate security audits
  • Intrusion detection and prevention
  • Security Information and Event Management (SIEM)
  • Continuous monitoring
  • Egress monitoring
  • Log management
  • Threat intelligence (e.g., threat feeds, threat hunting)
  • User and Entity Behavior Analytics (UEBA)
  • 3 – Perform Configuration Management (CM) (e.g., provisioning, baselining, automation)
  • 4 – Apply foundational security operations concepts
  • Need-to-know/least privilege
  • Separation of Duties (SoD) and responsibilities
  • Privileged account management
  • Job rotation
  • Service Level Agreements (SLAs)
  • 5 – Apply resource protection
  • Media management
  • Media protection techniques
  • 6 – Conduct incident management
  • Detection
  • Response
  • Mitigation
  • Reporting
  • Recovery
  • Remediation
  • Lessons learned
  • 7 – Operate and maintain detective and preventative measures
  • Firewalls (e.g., next generation, web application, network)
  • Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)
  • Whitelisting/blacklisting
  • Third-party provided security services
  • Sandboxing
  • Honeypots/honeynets
  • Anti-malware
  • Machine learning and Artificial Intelligence (AI) based tools
  • 8 – Implement and support patch and vulnerability management
  • 9 – Understand and participate in change management processes
  • 10 – Implement recovery strategies
  • Backup storage strategies
  • Recovery site strategies
  • Multiple processing sites
  • System resilience, High Availability (HA), Quality of Service (QoS), and fault tolerance
  • 11 – Implement Disaster Recovery (DR) processes
  • Response
  • Personnel
  • Communications
  • Assessment
  • Restoration
  • Training and awareness
  • Lessons learned
  • 12 – Test Disaster Recovery Plans (DRP)
  • Read-through/tabletop
  • Walkthrough
  • Simulation
  • Parallel
  • Full interruption
  • 13 – Participate in Business Continuity (BC) planning and exercises
  • 14 – Implement and manage physical security
  • Perimeter security controls
  • Internal security controls
  • 15 – Address personnel safety and security concerns
  • Travel
  • Security training and awareness
  • Emergency management
  • Duress
  • 1 – Understand and integrate security in the Software Development Life Cycle (SDLC)
  • Development methodologies (e.g., Agile, Waterfall, DevOps, DevSecOps)
  • Maturity models (e.g., Capability Maturity Model (CMM), Software Assurance Maturity Model (SAMM))
  • Operation and maintenance
  • Change management
  • Integrated Product Team (IPT)
  • 2 – Identify and apply security controls in software development ecosystems
  • Programming languages
  • Libraries
  • Tool sets
  • Integrated Development Environment (IDE)
  • Runtime
  • Continuous Integration and Continuous Delivery (CI/CD)
  • Security Orchestration, Automation, and Response (SOAR)
  • Software Configuration Management (SCM)
  • Code repositories
  • Application security testing (e.g., Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST))
  • 3 – Assess the effectiveness of software security
  • Auditing and logging of changes
  • Risk analysis and mitigation
  • 4 – Assess security impact of acquired software
  • Commercial-off-the-shelf (COTS)
  • Open source
  • Third-party
  • Managed services (e.g., Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS))
  • 5 – Define and apply secure coding guidelines and standards
  • Security weaknesses and vulnerabilities at the source-code level
  • Security of Application Programming Interfaces (APIs)
  • Secure coding practices
  • minimize course outline