SlideShare a Scribd company logo
#
l
e
a
r
n
t
o
r
i
s
e
www.infosectrain.com
INTERNAL DATA SOURCES
CRISC
DOMAIN
4
Prior risk assessments
Project documents (risk logs, lessons learned)
Tickets from change, problem, release, con๏ฌguration,
asset, and incident management systems
Audit and incident reports
User feedback and observation
Interviews with management
Security and test reports
Event and activity logs
www.infosectrain.com
CRISC
DOMAIN
4
LOGS
Identify security violations and assist in forensics
Capture and store data for analysis
Alert to malicious activity
Trade-off between speed, detail, and utility
Examples:
Time synchronization of log entries
IDS/IPS logging
www.infosectrain.com
SMART
CRITERIA
SECURITY INFORMATION AND EVENT
MANAGEMENT (SIEM)
Analyze system, application, and network activity
Capture data from multiple sources
Detect attacks in progress
Highlight relationships among activities
Examples: Correlation based on type, timing, sequence
www.infosectrain.com
CRISC
DOMAIN
4
INTEGRATED TEST FACILITIES (ITF)
Test data through production systems
Examples:
Observe the operation of production systems
Fictitious customers or transactions
www.infosectrain.com
CRISC
DOMAIN
4
EXTERNAL SOURCES OF INFORMATION
CERT/CIRT advisories
Security company reports
Examples
Regulatory bodies
Peer organizations
Media reports
Verizon Data Breach Investigations report
Government cybersecurity monitoring services
www.infosectrain.com
EFFECTIVE
CONTROL
MONITORING
CONTROL ASSESSMENT TYPES
Ensure data accuracy and completeness
Encourage local ownership of risk and control monitoring
Prefer data retrieved directly by risk practitioner
www.infosectrain.com
CRISC
DOMAIN
4
Align risk management program with audit program
Independent and objective review of control environment
Update risk action plans and risk register
Enhance controls
Examples:
Review of access control policies
Examination of incident response plans
IS AUDIT
www.infosectrain.com
CRISC
DOMAIN
4
VULNERABILITY ASSESSMENT
Methodical review of security
Scope ranges from single system to entire business process
Inform management of risk management effectiveness
Recommend new controls
Understand existing security controls
Use tools for automation or supplementation
Regular and rigorous assessment
Examples
Scanning for open ports
Checking for outdated software
www.infosectrain.com
CRISC
DOMAIN
4
PENETRATION TESTING
Validate vulnerability assessment (white hat)
Test systems believed to be secure (black hat)
Examples
Use same tools as malicious hackers
Management approval and oversight required
Targeted attempt to break into an environment
Attempting to exploit a known vulnerability
Social engineering attacks
www.infosectrain.com
CRISC
DOMAIN
4
THIRD-PARTY ASSURANCE
External IS audit or compliance certi๏ฌcation
Earn customer and shareholder con๏ฌdence
Evaluate processes and validate compliance
SSAE 16 for third-party service suppliers
Examples:
ISO/IEC 27001 certi๏ฌcation
PCI DSS compliance audit
www.infosectrain.com
CRISC
DOMAIN
4
MATURITY MODEL ASSESSMENT AND
IMPROVEMENT TECHNIQUES
Commitment to continuous improvement
Capability
Maturity
Model (CMM)
Mature risk
management
program
Prevent, detect, and respond to security events
and risk scenarios
Learning from past events
Develop skills, tools, and team
Consistency in risk identi๏ฌcation, assessment,
mitigation, and monitoring
Level 1: Performed - Process achieves its purpose
Level 0: Unde๏ฌned and ad hoc activities
Level 2: Managed - Process is planned,
monitored, and adjusted
Level 3: Established - Process is de๏ฌned and
capable of achieving outcomes
Level 4: Predictable - Process operates
within de๏ฌned limits
Level 5: Optimized - Process is continuously
improved
To Get More Insights Through Our FREE
FOUND THIS USEFUL?
Courses | Workshops | eBooks | Checklists | Mock Tests
LIKE FOLLOW
SHARE

More Related Content

PDF
CISSP Cheatsheet.pdf
PPT
Web Application Security Testing
PDF
CompTIA Security+ Domain 5 Overview.pdf
PDF
CompTIA Security+ Domain 5 Overview: Mastering Security Governance, Risk Mana...
PDF
CompTIA Security+ Domain 5 Overview: Mastering Security Governance, Risk Mana...
PPT
Software Security Engineering
PPS
Application Security Review 5 Dec 09 Final
PPTX
Penetration testing dont just leave it to chance
CISSP Cheatsheet.pdf
Web Application Security Testing
CompTIA Security+ Domain 5 Overview.pdf
CompTIA Security+ Domain 5 Overview: Mastering Security Governance, Risk Mana...
CompTIA Security+ Domain 5 Overview: Mastering Security Governance, Risk Mana...
Software Security Engineering
Application Security Review 5 Dec 09 Final
Penetration testing dont just leave it to chance

Similar to CRISC Domain 4 Data Collection and Extraction Tools and Techniques.pdf (20)

PPT
Risk Assessment Methodologies
PPT
II Security At Microsoft
PPT
Software security engineering
PPT
Software security engineering
PPT
Audit Practice at CipherTechs
PPTX
Security assessment isaca sv presentation jan 2016
PPT
Security Consulting Methodology
PPT
Core.co.enterprise.deck.06.16.10
PPTX
Mastering Incident Threat Detection and Response: Strategies and Best Practices
PPTX
Enterprise under attack dealing with security threats and compliance
PPT
What Every Organization Should Log And Monitor
PDF
CRISC Domain 2 Control Environment Assessment in Risk Management.pdf
PPTX
Security for Architects and Developers
PDF
Security Domain 4 Security Operations 28.pdf
PDF
Mind Map Overview - Security Operations in Security+ Domain 4.pdf
PDF
Infosectrain Security plus domain 4 security operation
PPT
Cyber crime with privention
PPTX
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
PPTX
Cloud computingsec p3
PDF
cissp-course content.pdf & cissp description
Risk Assessment Methodologies
II Security At Microsoft
Software security engineering
Software security engineering
Audit Practice at CipherTechs
Security assessment isaca sv presentation jan 2016
Security Consulting Methodology
Core.co.enterprise.deck.06.16.10
Mastering Incident Threat Detection and Response: Strategies and Best Practices
Enterprise under attack dealing with security threats and compliance
What Every Organization Should Log And Monitor
CRISC Domain 2 Control Environment Assessment in Risk Management.pdf
Security for Architects and Developers
Security Domain 4 Security Operations 28.pdf
Mind Map Overview - Security Operations in Security+ Domain 4.pdf
Infosectrain Security plus domain 4 security operation
Cyber crime with privention
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Cloud computingsec p3
cissp-course content.pdf & cissp description
Ad

More from infosec train (20)

PDF
CRISC 100 Days Study Plan InfosecTrain0.pdf
PDF
Red Team Expert_Interview Questions and Answers.pdf
PDF
Vulnerability Scanning with Nessus-A Practical Guide.pdf
PDF
CISA Revision material InfosecTrain .pdf
PDF
Black Widow s Stealth Mastering Ethical Hacking Techniques.pdf
PDF
GRC Analyst Interview Questions Infosec.pdf
PDF
OSI Model vs. TCPIP by InfosecTrain .pdf
PDF
Top 10 Network Security Solutions.pdf
PDF
Upcoming Free Webinar InfosecTrain.pdf
PDF
Advanced Cloud Security Governance.pdf
PDF
Top 25 ISO 27001 Lead Auditor Interview Questions.pdf
PDF
Internal Audit Interview Questions.pdf
PDF
ISO 22301 2019 Checklist InfosecTrain.pdf
PDF
Skill Switch Then vs Now InfosecTrain.pdf
PDF
Understanding CEH Module 3 Scanning Networks.pdf
PDF
CISA 100 Days Study Plan InfosecTrain.pdf
PDF
CISSP Exam Practice Questions & Answers.pdf
PDF
Achievers of the Month InfosecTrain .pdf
PDF
Jurassic World Rebirth Cybersecurity.pdf
PDF
CCSP Exam Practice Questions and Answers.pdf
CRISC 100 Days Study Plan InfosecTrain0.pdf
Red Team Expert_Interview Questions and Answers.pdf
Vulnerability Scanning with Nessus-A Practical Guide.pdf
CISA Revision material InfosecTrain .pdf
Black Widow s Stealth Mastering Ethical Hacking Techniques.pdf
GRC Analyst Interview Questions Infosec.pdf
OSI Model vs. TCPIP by InfosecTrain .pdf
Top 10 Network Security Solutions.pdf
Upcoming Free Webinar InfosecTrain.pdf
Advanced Cloud Security Governance.pdf
Top 25 ISO 27001 Lead Auditor Interview Questions.pdf
Internal Audit Interview Questions.pdf
ISO 22301 2019 Checklist InfosecTrain.pdf
Skill Switch Then vs Now InfosecTrain.pdf
Understanding CEH Module 3 Scanning Networks.pdf
CISA 100 Days Study Plan InfosecTrain.pdf
CISSP Exam Practice Questions & Answers.pdf
Achievers of the Month InfosecTrain .pdf
Jurassic World Rebirth Cybersecurity.pdf
CCSP Exam Practice Questions and Answers.pdf
Ad

Recently uploaded (20)

PDF
Complications of Minimal Access Surgery at WLH
PPTX
Cell Types and Its function , kingdom of life
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
Classroom Observation Tools for Teachers
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy โ€“ Electronic Transition...
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
Trump Administration's workforce development strategy
PDF
1_English_Language_Set_2.pdf probationary
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
ย 
PPTX
Introduction to Building Materials
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
Complications of Minimal Access Surgery at WLH
Cell Types and Its function , kingdom of life
Final Presentation General Medicine 03-08-2024.pptx
Hazard Identification & Risk Assessment .pdf
Final Presentation General Medicine 03-08-2024.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Classroom Observation Tools for Teachers
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy โ€“ Electronic Transition...
Paper A Mock Exam 9_ Attempt review.pdf.
Supply Chain Operations Speaking Notes -ICLT Program
Indian roads congress 037 - 2012 Flexible pavement
Trump Administration's workforce development strategy
1_English_Language_Set_2.pdf probationary
Orientation - ARALprogram of Deped to the Parents.pptx
Unit 4 Skeletal System.ppt.pptxopresentatiom
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
ย 
Introduction to Building Materials
Chinmaya Tiranga quiz Grand Finale.pdf

CRISC Domain 4 Data Collection and Extraction Tools and Techniques.pdf

  • 2. www.infosectrain.com INTERNAL DATA SOURCES CRISC DOMAIN 4 Prior risk assessments Project documents (risk logs, lessons learned) Tickets from change, problem, release, con๏ฌguration, asset, and incident management systems Audit and incident reports User feedback and observation Interviews with management Security and test reports Event and activity logs
  • 3. www.infosectrain.com CRISC DOMAIN 4 LOGS Identify security violations and assist in forensics Capture and store data for analysis Alert to malicious activity Trade-off between speed, detail, and utility Examples: Time synchronization of log entries IDS/IPS logging
  • 4. www.infosectrain.com SMART CRITERIA SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) Analyze system, application, and network activity Capture data from multiple sources Detect attacks in progress Highlight relationships among activities Examples: Correlation based on type, timing, sequence
  • 5. www.infosectrain.com CRISC DOMAIN 4 INTEGRATED TEST FACILITIES (ITF) Test data through production systems Examples: Observe the operation of production systems Fictitious customers or transactions
  • 6. www.infosectrain.com CRISC DOMAIN 4 EXTERNAL SOURCES OF INFORMATION CERT/CIRT advisories Security company reports Examples Regulatory bodies Peer organizations Media reports Verizon Data Breach Investigations report Government cybersecurity monitoring services
  • 7. www.infosectrain.com EFFECTIVE CONTROL MONITORING CONTROL ASSESSMENT TYPES Ensure data accuracy and completeness Encourage local ownership of risk and control monitoring Prefer data retrieved directly by risk practitioner
  • 8. www.infosectrain.com CRISC DOMAIN 4 Align risk management program with audit program Independent and objective review of control environment Update risk action plans and risk register Enhance controls Examples: Review of access control policies Examination of incident response plans IS AUDIT
  • 9. www.infosectrain.com CRISC DOMAIN 4 VULNERABILITY ASSESSMENT Methodical review of security Scope ranges from single system to entire business process Inform management of risk management effectiveness Recommend new controls Understand existing security controls Use tools for automation or supplementation Regular and rigorous assessment Examples Scanning for open ports Checking for outdated software
  • 10. www.infosectrain.com CRISC DOMAIN 4 PENETRATION TESTING Validate vulnerability assessment (white hat) Test systems believed to be secure (black hat) Examples Use same tools as malicious hackers Management approval and oversight required Targeted attempt to break into an environment Attempting to exploit a known vulnerability Social engineering attacks
  • 11. www.infosectrain.com CRISC DOMAIN 4 THIRD-PARTY ASSURANCE External IS audit or compliance certi๏ฌcation Earn customer and shareholder con๏ฌdence Evaluate processes and validate compliance SSAE 16 for third-party service suppliers Examples: ISO/IEC 27001 certi๏ฌcation PCI DSS compliance audit
  • 12. www.infosectrain.com CRISC DOMAIN 4 MATURITY MODEL ASSESSMENT AND IMPROVEMENT TECHNIQUES Commitment to continuous improvement Capability Maturity Model (CMM) Mature risk management program Prevent, detect, and respond to security events and risk scenarios Learning from past events Develop skills, tools, and team Consistency in risk identi๏ฌcation, assessment, mitigation, and monitoring Level 1: Performed - Process achieves its purpose Level 0: Unde๏ฌned and ad hoc activities Level 2: Managed - Process is planned, monitored, and adjusted Level 3: Established - Process is de๏ฌned and capable of achieving outcomes Level 4: Predictable - Process operates within de๏ฌned limits Level 5: Optimized - Process is continuously improved
  • 13. To Get More Insights Through Our FREE FOUND THIS USEFUL? Courses | Workshops | eBooks | Checklists | Mock Tests LIKE FOLLOW SHARE