Voici le contenu du domaine 7 du CISSP®

Ce domaine vaut 13 % du la note à atteindre

Domaine 7 du CISSP®

Contenu réactualisé en fonction du nouveau programme officiel de 2024

Description
7.1Understand and comply with investigations
7.1.1Evidence collection and handling
7.1.2Reporting and documentation
7.1.3Investigative techniques
7.1.4Digital forensics tools, tactics, and procedures
7.1.5Artifacts (eg, computer, network, mobile device)
7.2Conduct logging and monitoring activities
7.2.1Intrusion detection and prevention
7.2.2Security Information and Event Management(SIEM)
7.2.3Continuous monitoring
7.2.4Egress monitoring
7.2.5Log management
7.2.6Threat intelligence (eg,Threat feeds,Threat hunting)
7.2.7User and Entity Behavior Analytics (UEBA)
7.3Perform Configuration Management (CM) (eg, provisioning, baselining, automation)
7.4Apply foundational security operations concepts
7.4.1Need-to-know/least privilege
7.4.2Separation of Duties (SoD) and responsibilities
7.4.3Privileged account management
7.4.4Job rotation
7.4.5Service Level Agreements (SLAs)
7.5Apply resource protection
7.5.1Media Management
7.5.2Media protection techniques
7.6Conduct incident management
7.6.1Detection
7.6.2Response
7.6.3Mitigation
7.6.4Reporting
7.6.5Recovery
7.6.6Remediation
7.6.7Lessons Learned
7.7Operate and maintain detective and preventative measures
7.7.1Firewalls (eg, next generation, web application, network)
7.7.2Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)
7.7.3Whitelisting/blacklisting
7.7.4Third-party provided security services
7.7.5Sandboxing
7.7.6Honeypots/honeynets
7.7.7Anti-malware
7.7.8Machine learning and Artificial Intelligence (AI) based tools)
7.8Implement and support patch and vulnerability management
7.9Understand and participate in change management processes
7.10Implement recovery strategies
7.10.1Backup storage strategies
7.10.2Recovery site strategies
7.10.3Multiple processing sites
7.10.4System resilience, High Availability (HA), Quality of Service (QoS), and fault tolerance)
7.11Implement Disaster Recovery (DR) processes)
7.11.1Response
7.11.2Personnel
7.11.3Communications
7.11.4Assessment
7.11.5Restoration
7.11.6Training and awareness
7.11.7Lessons learned
7.12Test Disaster Recovery Plans (DRP))
7.12.1Read-through/tabletop
7.12.2Walkthrough
7.12.3Simulation
7.12.4Parallel
7.12.5Full interruption
7.13Participate in Business Continuity (BC) planning and exercises
7.14Implement and manage physical security
7.14.1Perimeter security controls
7.14.2Internal security controls
7.15Address personnel safety And security concerns
7.15.1Travel
7.15.2Security training and awareness
7.15.3Emergency management
7.15.4Duress

Ready to Start?