This is the content of Security and Risk Management of CISSP®

This domain 1 is worth 16% of the grade to be achieved.

Domaine 1 of CISSP®

Content updated according to the new official programme for 2024

Description
1.1Understand, adhere to, and promote professional ethics
1.1.1(ISC) Code of Professional Ethics)
1.1.2Organizational code of ethics)
1.2Understand and apply security concepts
1.2.1Confidentiality
1.2.2Integrity
1.2.3Availability
1.2.4Authenticity
1.2.5Nonrepudiation
1.3Evaluate and apply security governance principles
1.3.1Alignment of the security function to business strategy, goals, mission, and objectives
1.3.2Organizational processes (e.g., acquisitions, divestitures, governance committees
1.3.3Organizational roles and responsibilities
1.3.4Security control frameworks
1.3.5Due care/due diligence
1.4Determine compliance and other requirements
1.4.1Determine contractual compliance and other requirements
1.4.2Legal
1.4.3Industry standards
1.4.4Regulatory Requirements
1.4.5Privacy requirements
1.5Understand legal and regulatory issues that pertain to information security in a holistic context
1.5.1Cybercrimes and Data Breaches
1.5.2Licensing and Intellectual Property (IP)requirements
1.5.3Import/export controls
1.5.4Transborder data flow
1.5.5Privacy
1.6Understand requirements for investigation types (ie, administrative, criminal, civil, regulatory, industry standards)
1.7Develop, document, and implement security policy, standards, procedures, and guidelines
1.8Identify, analyze, and prioritize Business Continuity (BC) requirements)
1.8.1Business Impact Analysis (BIA)
1.8.2Develop and document the scope and the plan
1.9Contribute to and enforce personnel security policies and procedures
1.9.1Candidate screening and hiring
1.9.2Employment agreements and policies
1.9.3Onboarding, transfers, and termination processes
1.9.4Vendor, consultant, and contractor agreements and controls
1.9.5Compliance policy requirements
1.9.6Privacy policy requirements
1.10Understand and apply risk management concepts
1.10.1Identify threats and vulnerabilities
1.10.2Risk assessment/analysis
1.10.3Risk Response
1.10.4Countermeasure selection and implementation
1.10.5Applicable types of controls (eg, preventive, detective, corrective)
1.10.6Control assessments (security and privacy)
1.10.7Monitoring and measurement
1.10.8Reporting
1.10.9Continuous improvement (eg, Risk maturity modeling)
1.10.10Risk frameworks
1.11Understand and apply threat modeling concepts and methodologies
1.12Apply Supply Chain Risk Management (SCRM) concepts)
1.12.1Risks associated with hardware, software, and services
1.12.2Third-party assessment and monitoring
1.12.3Minimum security requirements
1.12.4Service level requirements
1.13Establish and maintain a security awareness, education, and training program
1.13.1Methods and techniques to present awareness and training (eg, social engineering, phishing, security champions, gamification)
1.13.2Periodic content reviews
1.13.3Program effectiveness evaluation

Ready to Start?