2.
Standards/baselines3.
Procedures4.
Guidelines5.
DocumentationManage the information life cycle such as classification, categorization, and ownership.
Manage third-party governance such as onsite assessment, document exchange and review, and process/poly review.
Understand and apply risk management concepts.
1.
Identify threats and vulnerabilities2.
Risk assessments/analysis such as qualitative, quantitative, and hybrid3.
Risk assignment/acceptance4.
Countermeasure selection5.
Tangible and intangible asset valuationManage personnel security.
1.
Employment candidate screening such as reference checks, education, and verification2.
Employment agreements and policies3.
Employee termination processes4.
Vendor, consultant, and contractor controlsDevelop and manage security education, training, and awareness.
Manage the security function.
1.
Budget2.
Metrics3.
Resources4.
Develop and implement information security strategies5.
Assess the completeness and effectiveness of the security programDOMAIN 4: SOFTWARE DEVELOPMENT SECURITY
Software development security domain refers to the controls that are included within systems and applications software and the steps used in their development. Software refers to system software (operating systems) and application programs (agents, applets, software, databases, data warehouses, and knowledge-based systems). These applications may be used in distributed or centralized environments.
The candidate should fully understand the security and controls of the systems development process, system life cycle, application controls, change controls, data warehousing, data mining, knowledge-based systems, program interfaces, and concepts used to ensure data and application integrity, security, and availability.
Understand and apply security in the software development life cycle.
1.
Development life cycle2.
Maturity models3.
Operation and maintenance4.
Change managementUnderstand the environment and security controls.
1.
Security of the software environment2.
Security issues of programming languages3.
Security issues in source code such as buffer overflow, escalation of privilege, and backdoor4.
Configuration managementAssess the effectiveness of software security.
1.
Certification and accreditation such as system authorization2.
Auditing and logging3.
Risk analysis and mitigationDOMAIN 5: CRYPTOGRAPHY
The cryptography domain addresses the principles, means, and methods of disguising information to ensure its integrity, confidentiality, and authenticity.
Procedures and protocols that meet some or all of the above criteria are known as cryptosystems. Cryptosystems are often thought to refer only to mathematical procedures and computer programs; however, they also include the regulation of human behavior, such as choosing hard-to-guess passwords, logging off unused systems, and not discussing sensitive procedures with outsiders.
The candidate is expected to know the basic concepts within cryptography; public and private key algorithms in terms of their applications and uses; algorithm construction, key distribution and management, and methods of attack; the applications, construction, use of digital signatures to provide authenticity of electronic transactions, and nonrepudiation of the parties involved; and the organization and management of the public key infrastructures (PKIs) and digital certificates distribution and management.
Understand the application and use of cryptography:
1.
Data at rest (e.g., Hard drive)2.
Data in transit (e.g., On the wire)Understand the cryptographic life cycle such as cryptographic limitations, algorithm/protocol governance.
Understand encryption concepts.
1.
Foundational concepts2.
Symmetric cryptography3.
Asymmetric cryptography4.
Hybrid cryptography5.
Message digests6.
HashingUnderstand key management processes.
1.
Creation/distribution2.
Storage/destruction3.
Recovery4.
Key escrowUnderstand digital signatures.
Understand nonrepudiation.
Understand methods of cryptanalytic attacks.
1.
Chosen plaintext2.
Social engineering for key discovery3.
Brute force such as rainbow tables, specialized/scalable architecture4.
Ciphertext only5.
Known plaintext6.
Frequency analysis7.
Chosen ciphertext8.
Implementation attacksUse cryptography to maintain network security.
Use cryptography to maintain application security.
Understand public key infrastructure (PKI).
Understand certificate-related issues.
Understand information-hiding alternatives such as steganography and watermarking.
DOMAIN 6: SECURITY ARCHITECTURE AND DESIGN