GRC and Audit

  • Security and Risk Management

  • CIA Triad confidentiality, integrity and availability

  • Confidentiality and Integrity tightly coupled on each other

  • Security control evaluation using CIA Triad

    • Scenarios which violates these security CIA triad and how to detect and address

      • For ex: weak encryption and enforce strong encryption

    • DOS attacks

    • BCP

  • IAAAA

  • Layering defense in depth

BCP

DR

Data encryption

Data hiding

  • Security governance principles (IT and corporate governance)

    • Change management (change advisory board)

    • Data classification

      • Who are data owners

      • Data custodians

      • Levels of classification

  • Security policies and security management planning

    • Strategic plan

    • Tactical plan

    • Operational plan

  • Security frameworks

    • NIST 800-53 or 800-100

  • Org roles

    • Senior manager

    • Security professional

    • Data owner

    • Data custodian

    • User

    • Auditor

  • Security control frameworks

    • COBIT

    • OSSTMM

    • ISO 27002/1

  • Security policies

  • Security standards

  • Security baselines

  • Security guidelines

  • Security procedures

  • Security governance

  • Third party governance

  • Threat modeling

    • Proactive

    • Reactive

    • Stride

    • Pasta

  • Threat reduction analysis

  • Threat prioritization and reduction

    • DREAD

  • Supply chain and third party service risk assessment

  • Audit

    • PCI

    • CJIS

    • SOC 2

  • Separation of duties

  • Job responsibilities

  • Job rotation

  • Cross training

  • Employee onboarding process

    • Security awareness training

  • Employee termination process

    • Access revoke

    • Audit activity

  • NDA

  • NCA

  • SLA

    • Vendors, contractors, contract agreements

  • Compliance policy requirements

  • Privacy policy requirement

  • Risk Management

    • Asset

      • Asset inventory

      • Classes and criticality

      • Asset valuation

    • Asset valuation

    • Threats

    • Vulnerability

    • Exposure

    • Risk

    • Safeguards

    • Attack

    • Breach

  • Identifying the threats and vulnerabilities

  • Risk assessment

    • Quantitative risk analysis

      • Exposure factor

      • Single loss expectancy

      • Annualized rate of occurrence

      • Annualized loss expectancy

      • Calculating safe guard costs

    • Qualitative risk analysis

      • Risk responses

        • Risk mitigation

        • Avoidance

        • Etc..

      • Counter measures

        • Security controls

          • Physical

          • Logical/technical

          • Administrative

      • Types of controls

        • Deterrent

        • Preventive

        • Detective

        • Compensating

        • Corrective

        • Recovery

        • Directive

    • Security control assessment

      • NIST Guide for Assessing the Security Controls in Federal Information Systems

    • RISK frameworks

      • NIST SP 800-37

    • Security awareness training

  • Business continuity plan

  • Disaster recovery plan

  • Legal and regulatory requirements

  • Business Impact Analysis

    • Business priorities

    • Identifying the risk/risk assessment

      • SaaS application

      • Cloud

  • Law

    • Cyberlaw

    • Criminal activity law

    • FISMA Act

  • Compliance

  • Asset Security

    • Data classification

      • DLP

      • PII

      • PHI

      • Classification levels

    • NIST SP 800-122

    • Data thefts

    • Asset classification

    • Data security controls

      • Email data security

      • Strong encryption algo AES 256

    • Data states

      • In rest

      • In transit

      • In use

    • Labeling

      • Sensitive data

      • Sensitive systems

    • Sensitive data destroying

    • Data remanence, destruction, clearing, degaussing, purging

    • Data protection policies/methods

    • Ownership

      • Data owners

      • Asset owners

      • Asset owners

      • Business owners

    • Data processors

      • Anonymization

    • NIST 800-53

    • Security baselines

      • Scoping

      • Standards

        • NISR

        • CIS

        • PCI

  • Security Architecture

  • Cryptography

    • FIPS 140

    • Ciphers

    • One time pads

    • Symmetric key

    • Asymmetric key

    • Hashing

  • Data encryption standards

  • Key management

    • PKI

    • Public key encryption

    • Private key encryption

    • Key distribution

    • Key escrow and recover

    • RSA

    • Elliptic curve

    • Digital signatures

    • HMAC

    • Public key infra

    • Certificate authority

    • Certificates

    • Digital signing

    • TPM

    • Portable device encryption

    • PGP

    • TLS/SSL

    • Networking

      • IPSEC

      • Wpa2

      • Wireless

    • Cryptographic attacks

    • Man in middle attacks

  • Security architecture references

    • Perimeter security

    • Access controls

    • ITSEC

    • Org certification and accreditation

    • TPM

    • Protection

      • Os level

      • Application

      • Firmware

      • BIOS

      • UEFI

  • Memory

    • Browser

    • System/RAM

    • Pendrives

    • Storage

  • Client based systems

    • Applets

    • Java

  • Server based systems

  • Cache based attacks

    • ARP

    • DNS

  • Database security

  • Backup monitoring

  • Distributed systems security

  • DMZ

  • Endpoint security

  • Cloud security

  • Virutual machines security

  • Paas

  • Saas

  • Iaas

  • Cloud acces security broker

  • Peer to peer

  • IOT https://www .nist.gov/itl/applied-cybersecurity/nist-initiatives-iot

  • ICS

  • SCADA

  • PLC

  • SAML

  • HIDS

  • USB security

  • Device security

    • Device encryption

    • Remote wiping

    • Lockout

    • Screen locks

    • GPS

    • Application control

    • Storage segmentation

    • Asset Tracking

    • Inventory control

    • Mobile Device Management

    • BYOD

    • Device Access Control

    • Removable storage media

  • Application security

    • Key Management

    • Credential Management

    • Authentication

    • Geo tagging

    • Encryption

    • Application whitelisting

    • Corporate mobile devices

    • Virtual mobile infrastructure

  • Mobile

    • Android

    • ios

  • Web app security

    • OWASP

    • TLS/SSL

  • DLP

  • Data Ownership

  • Forensics

  • Patch Management

  • System Engineering

  • Vulnerability Management

  • Antivirus Management

  • User acceptance and policies

  • Asset on boarding and off boarding

  • Embedded systems security

  • Cyber physical security

  • Network segmentation

  • Application firewalls

  • Security layers

  • Version control

  • Monitoring

  • Network Security

    • OSI

    • TCP/IP

    • Port numbers

    • Tcp three way handshake

    • Protocol discovery using sniffer

    • Organization ipv 4 ranges

    • Network diagram

    • Attacks

      • Dos

      • Dns poisoning

      • Domain hijacking

    • Wireless networks

    • Secure encryption protocols

    • Wireless attacks

    • Network access control

    • Attacks on networks

    • Firewalls

    • Secure communication protocols

    • Authentication protocosl

    • Vedio/audio communication protocols

    • Social engineering attacks

    • Email security

    • Remote access security

    • Vpn

    • Tunneling

    • Virtualization

    • NAT

  • Identity and access management

    • Assets access

    • CIA triad for authentication/authorization/identification

    • Password manament

    • Best practices

    • Single sign on

    • Kerberos

    • Azure dc

  • Security Assessment and training

    • Security testing and assessment

    • External audits

    • Third party audits

    • Vulnerability assessments

    • Scap

    • Scom

    • Network discovery scanning

    • Network vulnerability scanning

    • Database vulnerability scanning

    • Penetrations testing

    • Secure code review

    • Log monitoring

    • Account management

    • Backup reviews

  • Security operations

    • Privilege management

    • Os baselining

    • Incident response

    • Preventive measure

    • Logging and monitoring

  • Security assessment and testing

  • Cyber Investigations

  • Forensics

  • Asset Security

  • Security Architecture and Engineering

  • Communication and Network Security

  • Identity and Access Management (IAM)

  • Security Assessment and Testing

  • Security Operations

  • Software Development Security

References:

https://blog.rsisecurity.com/what-is-the-purpose-of-cybersecurity-architecture/

https://blog.rsisecurity.com/what-is-cybersecurity-architecture/

https://www.simplilearn.com/book-resources-to-read-for-cissp-certification-exam-article

https://www.conqueryourexam.com/best-cissp-study-guides/https://www.reddit.com/r/cissp/comments/c6d0jt/my_personal_cissp_journey_and_recommended_study/

https://www.reddit.com/r/cissp/comments/fdd33d/received_4_books_which_ones_are_best/

Last updated

Was this helpful?