» (ISC)2 Code of Professional Ethics
» Organizational code of ethics
» Confidentiality, integrity, and availability, authenticity and nonrepudiation
» Alignment of the security function to business strategy, goals, mission, and objectives
» Organizational processes (e.g., acquisitions, divestitures, governance committees)
» Organizational roles and responsibilities
» Security control frameworks
» Due care/due diligence
» Contractual, legal, industry standards, and regulatory requirements
» Privacy requirements
» Cybercrimes and data breaches
» Licensing and Intellectual Property (IP) requirements
» Import/export controls
» Transborder data flow
» Privacy
» Business Impact Analysis (BIA)
» Develop and document the scope and the plan
» Candidate screening and hiring
» Employment agreements and policies
» Onboarding, transfers, and termination processes
» Vendor, consultant, and contractor agreements and controls
» Compliance policy requirements
» Privacy policy requirements
» Identify threats and vulnerabilities
» Risk assessment/analysis
» Risk response
» Countermeasure selection and implementation
» Applicable types of controls (e.g., preventive,
detective, corrective)
» Control assessments (security and privacy)
» Monitoring and measurement
» Reporting
» Continuous improvement
(e.g., Risk maturity modeling)
» Risk frameworks
» Risks associated with hardware, software,
and services
» Third-party assessment and monitoring
» Minimum security requirements
» Service level requirements
» Methods and techniques to present awareness and training (e.g., social engineering,
phishing, security champions, gamification)
» Periodic content reviews
» Program effectiveness evaluation
» Data classification
» Asset Classification
» Information and asset ownership
» Asset inventory (e.g., tangible, intangible)
» Asset management
» Data roles (i.e., owners, controllers, custodians,
processors, users/subjects)
» Data collection
» Data location
» Data maintenance
» Data retention
» Data remanence
» Data destruction
» Data states (e.g., in use, in transit, at rest)
» Scoping and tailoring
» Standards selection
» Data protection methods (e.g., Digital Rights Management (DRM), Data Loss Prevention (DLP),
Cloud Access Security Broker (CASB)
» Threat modeling
» Least privilege
» Defense in depth
» Secure defaults
» Fail securely
» Separation of Duties (SoD)
» Keep it simple
» Zero Trust
» Privacy by design
» Trust but verify
» Shared responsibility
» Client-based systems
» Server-based systems
» Database systems
» Cryptographic systems
» Industrial Control Systems (ICS)
» Cloud-based systems (e.g., Software as a Service
(SaaS), Infrastructure as a Service (IaaS), Platform as
a Service (PaaS))
» Distributed systems
» Internet of Things (IoT)
» Microservices
» Containerization
» Serverless
» Embedded systems
» High-Performance Computing (HPC) systems
» Edge computing systems
» Virtualized systems
» Cryptographic life cycle (e.g., keys, algorithm
selection)
» Cryptographic methods (e.g., symmetric,
asymmetric, elliptic curves, quantum)
» Public Key Infrastructure (PKI)
» Key management practices
» Digital signatures and digital certificates
» Non-repudiation
» Integrity (e.g., hashing)
» Brute force
» Ciphertext only
» Known plaintext
» Frequency analysis
» Chosen ciphertext
» Implementation attacks
» Side-channel
» Fault injection
» Timing
» Man-in-the-Middle (MITM)
» Pass the hash
» Kerberos exploitation
» Ransomware
Wiring closets/intermediate distribution facilities
» Server rooms/data centers
» Media storage facilities
» Evidence storage
» Restricted and work area security
» Utilities and Heating, Ventilation, and Air
Conditioning (HVAC)
» Environmental issues
» Fire prevention, detection, and suppression
» Power (e.g., redundant, backup)
Open System Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) models
» Internet Protocol (IP) networking (e.g., Internet Protocol Security (IPSec), Internet Protocol (IP) v4/6)
» Secure protocols
» Implications of multilayer protocols
» Converged protocols (e.g., Fiber Channel Over Ethernet (FCoE),
Internet Small Computer Systems Interface (iSCSI), Voice over Internet Protocol (VoIP))
» Micro-segmentation (e.g., Software Defined Networks (SDN), Virtual eXtensible Local Area Network (VXLAN),
Encapsulation, Software-Defined Wide Area Network (SD-WAN))
» Wireless networks (e.g., Li-Fi, Wi-Fi, Zigbee, satellite)
» Cellular networks (e.g., 4G, 5G)
» Content Distribution Networks (CDN)
»Operation of hardware
(e.g., redundant power, warranty, support)
» Transmission media
» Network Access Control (NAC) devices
» Endpoint security
» Voice
» Multimedia collaboration
» Remote access
» Data communications
» Virtualized networks
» Third-party connectivity
» Information
» Systems
» Devices
» Facilities
» Applications
» Identity Management (IdM) implementation
» Single/Multi-Factor Authentication (MFA)
» Accountability
» Session management
» Registration, proofing, and establishment
of identity
» Federated Identity Management (FIM)
» Credential management systems
» Single Sign On (SSO)
» Just-In-Time (JIT)
» On-premise
» Cloud
» Hybrid
» Role Based Access Control (RBAC)
» Rule based access control
» Mandatory Access Control (MAC)
» Discretionary Access Control (DAC)
» Attribute Based Access Control (ABAC)
» Risk based access control
» Account access review (e.g., user, system, service)
» Provisioning and deprovisioning
(e.g., on /off boarding and transfers)
» Role definition (e.g., people assigned to new roles)
» Privilege escalation (e.g., managed service
accounts, use of sudo, minimizing its use)
» OpenID Connect (OIDC)/Open Authorization
(Oauth)
» Security Assertion Markup Language (SAML)
» Kerberos
» Remote Authentication Dial-In User Service
(RADIUS)/Terminal Access Controller Access
Control System Plus (TACACS+)
» Internal
» External
» Third-party
» Vulnerability assessment
» Penetration testing
» Log reviews
» Synthetic transactions
» Code review and testing
» Misuse case testing
» Test coverage analysis
» Interface testing
» Breach attack simulations
» Compliance checks
» Account management
» Management review and approval
» Key performance and risk indicators
» Backup verification data
» Training and awareness
» Disaster Recovery (DR) and Business Continuity
(BC)
» Remediation
» Exception handling
» Ethical disclosure
» Internal
» External
» Third-party
» Evidence collection and handling
» Reporting and documentation
» Investigative techniques
» Digital forensics tools, tactics, and procedures
» Artifacts (e.g., computer, network, mobile device)
» Intrusion detection and prevention
» Security Information and Event Management
(SIEM)
» Continuous monitoring
» Egress monitoring
» Log management
» Threat intelligence (e.g., threat feeds, threat
hunting)
» User and Entity Behavior Analytics (UEBA)
» Need-to-know/least privilege
» Separation of Duties (SoD) and responsibilities
» Privileged account management
» Job rotation
» Service Level Agreements (SLAs)
» Media management
» Media protection techniques
» Detection
» Response
» Mitigation
» Reporting
» Recovery
» Remediation
» Lessons learned
» Firewalls (e.g., next generation, web
application, network)
» Intrusion Detection Systems (IDS) and Intrusion
Prevention Systems (IPS)
» Whitelisting/blacklisting
» Third-party provided security services
» Sandboxing
» Honeypots/honeynets
» Anti-malware
» Machine learning and Artificial Intelligence (AI)
based tools
» Backup storage strategies
» Recovery site strategies
» Multiple processing sites
» System resilience, High Availability (HA), Quality
of Service (QoS), and fault tolerance
» Response
» Personnel
» Communications
» Assessment
» Restoration
» Training and awareness
» Lessons learned
» Read-through/tabletop
» Walkthrough
» Simulation
» Parallel
» Full interruption
» Perimeter security controls
» Internal security controls
» Travel
» Security training and awareness
» Emergency management
» Duress
» Development methodologies (e.g., Agile, Waterfall, DevOps, DevSecOps)
» Maturity models (e.g., Capability Maturity Model (CMM), Software Assurance Maturity Model (SAMM))
» Operation and maintenance
» Change management
» Integrated Product Team (IPT)
» Programming languages
» Libraries
» Tool sets
» Integrated Development Environment (IDE)
» Runtime
» Continuous Integration and Continuous Delivery
(CI/CD)
» Security Orchestration, Automation, and Response
(SOAR)
» Software Configuration Management (SCM)
» Code repositories
» Application security testing (e.g., Static Application
Security Testing (SAST), Dynamic Application
Security Testing (DAST))
» Auditing and logging of changes
» Risk analysis and mitigation
» Commercial-off-the-shelf (COTS)
» Open source
» Third-party
» Managed services (e.g., Software as a Service
(SaaS), Infrastructure as a Service (IaaS), Platform
as a Service (PaaS))
» Security weaknesses and vulnerabilities at the source-code level
» Security of Application Programming Interfaces (APIs)
» Secure coding practices
» Software-defined security