Program permissions such as the right to execute a program on an application server
Data rights such as the right to retrieve or update information in a database
The candidate should fully understand access control concepts, methodologies, and implementation within centralized and decentralized environments across the enterprise’s computer systems. Access control techniques and detective and corrective measures should be studied to understand the potential risks, vulnerabilities, and exposures.
Control access by applying the following concepts/methodologies/techniques.
1.
Policies2.
Types of controls such as preventive, detective, and corrective3.
Techniques such as nondiscretionary, discretionary, and mandatory4.
Identification and authentication5.
Decentralized/distributed access control techniques6.
Authorization mechanisms7.
Logging and monitoringUnderstand access control attacks.
1.
Threat modeling2.
Asset valuation3.
Vulnerability analysis4.
Access aggregationAssess effectiveness of access controls.
1.
User entitlement2.
Access review and auditIdentity and access provisioning life cycle such as provisioning, review, and revocation.
DOMAIN 2: TELECOMMUNICATIONS AND NETWORK SECURITY
The telecommunications and network security domain encompasses the structures, techniques, transport protocols, and security measures used to provide integrity, availability, confidentiality, and authentication for transmissions over private and public communications networks and media.
The candidate is expected to demonstrate an understanding of communications and network security as it relates to data communications in local-area and wide-area networks, remote access; Internet/intranet/extranet configurations, and other network equipment (such as switches, bridges, and routers), protocols (such as TCP/IP); VPNs and, techniques (such as the correct use and placement of firewalls and IDS) for preventing and detecting network based attacks.
Understand secure network architecture and design such as IP and non-IP protocols, and segmentation.
1.
OSI and TCP/IP models2.
IP networking3.
Implications of multi-layer protocolsSecure network components.
1.
Hardware such as modems, switches, routers, and wireless access points2.
Transmission media such as wired, wireless, and fiber3.
Network access control devices such as firewalls and proxies4.
End-point securityEstablish secure communication channels such as VPN, TLS/SSL, and VLAN.
1.
Voice such as POTS, PBX, and VoIP2.
Multimedia collaboration such as remote meeting technology and instant messaging3.
Remote access such as screen scraper, virtual application/desktop, and telecommuting4.
Data communicationsUnderstand network attacks such as DDoS and spoofing.
DOMAIN 3: INFORMATION SECURITY GOVERNANCE AND RISK MANAGEMENT
Information security governance and risk management domain entails the identification of an organization’s information assets and the development, documentation, implementation, and updating of policies, standards, procedures, and guidelines that ensure confidentiality, integrity, and availability. Management tools such as data classification, risk assessment, and risk analysis are used to identify threats, classify assets, and to rate their vulnerabilities so that effective security measures and controls can be implemented.
The candidate is expected to understand the planning, organization, and roles and responsibilities of individuals in identifying and securing an organization’s information assets; the development and use of policies stating management’s views and position on particular topics, and the use of guidelines, standards, and procedures to support the policies; security training to make employees aware of the importance of information security, its significance, and the specific security-related requirements relative to their position; the importance of confidentiality, proprietary, and private information; third party management and service level agreements related to information security; employment agreements; employee hiring and termination practices; and risk management practices and tools to identify, rate, and reduce the risk to specific resources.
Understand and align security function to goals, mission, and objectives of the organization.
Understand and apply security governance.
1.
Organizational processes such as acquisitions, divestitures, and governance committees2.
Security roles and responsibilities3.
Legislative and regulatory compliance4.
Privacy requirements compliance5.
Control frameworks6.
Due care7.
Due diligenceUnderstand and apply concepts of confidentiality, integrity, and availability.
Develop and implement security policy.
1.
Security policies