SlideShare a Scribd company logo
Explore the comprehensive CISSP Certification Course syllabus with InfosecTrain's
www.infosectrain.com | sales@infosectrain.com 01
Overview
The information security architect plays a vital
role to implement a sound security program in the
organizations as an expert shouldering the role
between a C-suite and upper managerial level. As an
information security architect or analyst, this role
involves executing diverse information security
consultative and analytical processes. The CISSP-
ISSAP is an all-embracing certification that validates
your technical skills in security architecture and
grants the globally accepted credentials of chief
security architect or analyst. This extensive
certification evaluates your proficiency to develop,
design and analyze various security solutions and
instills skills to provide risk-based guidance to the
higher management inaddressing various
organizational goals.
www.infosectrain.com | sales@infosectrain.com 02
Target Audience
CISSP-ISSAP training helps advancing the technical
competencies of:
Pre-Requisite
A minimum of 2 years of full-time and cumulative paid
work experience in at least one of the six CISSP-ISSAP
CBK domains
• System Architects
• Business Analysts
• System and Network Designers
• Chief Security Officers
• Chief Technology Officers
17%
21%
15%
Architect for Governance,
Compliance and Risk Management
DOMAIN 1
Infrastructure Security Architecture
DOMAIN 3
13% Architect for Application Security
DOMAIN 5
Security Architecture Modeling
DOMAIN 2
16%
Identity and Access Management
(IAM) Architecture
DOMAIN 4
18%
Security Operations Architecture
DOMAIN 4
www.infosectrain.com | sales@infosectrain.com 03
DOMAIN 1
Architect for Governance,
Compliance and Risk Management
1.1 Determine legal, regulatory, organizational and industry
requirements
• Determine applicable information security standards and guidelines
• Identify third-party and contractual obligations (e.g., supply chain,
outsourcing, partners)
• Determine applicable sensitive/personal data standards, guidelines
and privacy regulations
• Design for auditability (e.g., determine regulatory, legislative, forensic
requirements, segregation, high assurance systems)
• Coordinate with external entities (e.g., law enforcement, public
relations, independent assessor)
1.2 Manage Risk
• Identify and classify risks
• Assess risk
• Recommend risk treatment (e.g., mitigate, transfer, accept, avoid)
• Risk monitoring and reporting
www.infosectrain.com | sales@infosectrain.com 04
DOMAIN 2
Security Architecture Modeling
2.1 Identify security architecture approach
• Types and scope (e.g., enterprise, network, Service-Oriented
Architecture (SOA), cloud, Internet of Things (IoT), Industrial Control
Systems (ICS)/Supervisory Control and Data Acquisition (SCADA))
• Frameworks (e.g., Sherwood Applied Business Security Architecture
(SABSA), Service-Oriented Modeling Framework (SOMF))
• Reference architectures and blueprints
• Security configuration (e.g., baselines, benchmarks, profiles)
• Network configuration (e.g., physical, logical, high availability,
segmentation, zones)
2.2 Verify and validate design (e.g., Functional Acceptance
Testing (FAT), regression)
• Validate results of threat modeling (e.g., threat vectors, impact,
probability)
• Identify gaps and alternative solutions
• Independent Verification and Validation (IV&V) (e.g., tabletop
exercises, modeling and simulation, manual review of functions)
www.infosectrain.com | sales@infosectrain.com 05
DOMAIN 3
Infrastructure Security Architecture
• On-premise, cloud-based, hybrid
• Internet of Things (IoT), zero trust
• Management networks
• Industrial Control Systems (ICS) security
• Network security
• Operating systems (OS) security
• Database security
• Container security
• Cloud workload security
• Firmware security
• User security awareness
considerations
3.1 Develop infrastructure security requirements
3.2 Design defense-in-depth architecture
3.3 Secure shared services (e.g., wireless, e-mail, Voice over
Internet Protocol (VoIP), Unified Communications (UC),
Domain Name System (DNS), Network Time Protocol (NTP))
3.4 Integrate technical security controls
3.5 Design and integrate infrastructure monitoring
• Network visibility (e.g., sensor placement, time reconciliation,
span of control, record compatibility)
• Active/Passive collection solutions (e.g., span port, port mirroring,
tap, inline, flow logs)
• Security analytics (e.g., Security Information and Event Manage-
ment (SIEM), log collection, machine learning, User Behavior Analytics
(UBA))
• Design boundary protection (e.g., firewalls, Virtual Private Network
(VPN), airgaps, software defined perimeters, wireless, cloud-native)
• Secure device management (e.g., Bring Your Own Device (BYOD),
mobile, server, endpoint, cloud instance, storage)
www.infosectrain.com | sales@infosectrain.com 06
3.6 Design infrastructure cryptographic solutions
• Determine cryptographic design considerations and constraints
• Determine cryptographic implementation (e.g., in-transit, in-use, at-rest)
• Plan key management lifecycle (e.g., generation, storage, distribution)
• Map physical security requirements to organizational needs (e.g., perime-
ter protection and internal zoning, fire suppression)
• Validate physical security controls
3.7 Design secure network and communication infrastructure
(e.g., Virtual Private Network (VPN), Internet Protocol Security
(IPsec), Transport Layer Security (TLS))
3.8 Evaluate physical and environmental security requirements
www.infosectrain.com | sales@infosectrain.com 07
DOMAIN 4
Identity and Access Management
(IAM) Architecture
4.1 Design identity management and lifecycle
• Establish and verify identity
• Assign identifiers (e.g., to users, services, processes, devices)
• Identity provisioning and de-provisioning
• Define trust relationships (e.g., federated, standalone)
• Define authentication methods (e.g., Multi-Factor Authentication
(MFA), risk-based, location-based, knowledge-based, object-based,
characteristicsbased)
• Authentication protocols and technologies (e.g., Security Assertion
Markup Language (SAML), Remote Authentication Dial-In User Service
(RADIUS), Kerberos)
4.2 Design access control management and lifecycle
• Access control concepts and principles (e.g., discretionary/mandato-
ry, segregation/Separation of Duties (SoD), least privilege)
• Access control configurations (e.g., physical, logical, administrative)
• Authorization process and workflow (e.g., governance, issuance,
periodic review, revocation)
• Roles, rights, and responsibilities related to system, application, and
data access control (e.g., groups, Digital Rights Management (DRM), trust
relationships)
• Management of privileged accounts
• Authorization (e.g., Single Sign-On (SSO), rulebased, role-based,
attribute- based)
www.infosectrain.com | sales@infosectrain.com 08
4.3 Design identity and access solutions
• Access control protocols and technologies (e.g., eXtensible Access
Control Markup Language (XACML), Lightweight Directory Access Protocol
(LDAP))
• Credential management technologies (e.g., password management,
certificates, smart cards)
• Centralized Identity and Access Management (IAM) architecture (e.g.,
cloud-based, on-premise, hybrid)
• Decentralized Identity and Access Management (IAM) architecture (e.g.,
cloud-based, on-premise, hybrid)
• Privileged Access Management (PAM) implementation (for users with
elevated privileges)
• Accounting (e.g., logging, tracking, auditing)
www.infosectrain.com | sales@infosectrain.com 09
DOMAIN 5
Architect for Application Security
5.1 Integrate Software Development Life Cycle (SDLC) with application
security architecture (e.g., Requirements Traceability Matrix (RTM),
security architecture documentation, secure coding)
• Assess code review methodology (e.g., dynamic, manual, static)
• Assess the need for application protection (e.g., Web Application
Firewall (WAF), anti-malware, secure Application Programming Interface
(API), secure Security Assertion Markup Language (SAML))
• Determine encryption requirements (e.g., at-rest, in-transit, in-use)
• Assess the need for secure communications between applications
and databases or other endpoints
• Leverage secure code repository
5.2 Determine application security capability requirements and
strategy (e.g., open source, Cloud Service Providers (CSP),
Software as a Service (SaaS)/Infrastructure as a Service (IaaS)/
Platform as a Service (PaaS) environments)
5.3 Identify common proactive controls for applications (e.g., Open
Web Application Security Project (OWASP))
• Review security of applications (e.g., custom, Commercial
Off-the-Shelf (COTS), in-house, cloud)
• Determine application cryptographic solutions (e.g., cryptographic
Application Programming Interface (API), Pseudo Random Number
Generator (PRNG), key management)
• Evaluate applicability of security controls for system components
(e.g., mobile and web client applications; proxy, application, and database
services)
www.infosectrain.com | sales@infosectrain.com 10
DOMAIN 6
Security Operations Architecture
6.1 Gather security operations requirements (e.g., legal, compliance,
organizational, and business requirements)
6.2 Design information security monitoring (e.g., Security Information
and Event Management (SIEM), insider threat, threat intelligence,
user behavior analytics, Incident Response (IR) procedures)
6.4 Validate Business Continuity Plan (BCP)/Disaster Recovery Plan
(DRP) architecture
6.5 Design Incident Response (IR) management
6.3 Design Business Continuity (BC) and resiliency solutions
• Detection and analysis
• Proactive and automated security monitoring and remediation (e.g.,
vulnerability management, compliance audit, penetration testing)
• Preparation (e.g., communication
plan, Incident Response Plan (IRP),
training)
• Identification
• Containment
• Eradication
• Recovery
• Review lessons learned
• Incorporate Business Impact Analysis (BIA)
• Determine recovery and survivability strategy
• Identify continuity and availability solutions (e.g., cold, warm, hot, cloud
backup)
• Define processing agreement requirements (e.g., provider, reciprocal,
mutual, cloud, virtualization)
• Establish Recovery Time Objectives (RTO) and Recovery Point Objectives
(RPO)
• Design secure contingency communication for operations (e.g., backup
communication channels, Out-of-Band (OOB))
www.infosectrain.com | sales@infosectrain.com 11
www.infosectrain.com | sales@infosectrain.com

More Related Content

PDF
CompTIA Security+ SY0-601 Domain 2
PDF
cissp-course content.pdf & cissp description
PDF
CISSP _Course _Description and course overview
PDF
CISSP Preview - For the next generation of Security Leaders
PDF
Lecture 1-2.pdf
PDF
Comp tia security sy0 601 domain 3 implementation
PDF
Cybersecurity_Security_architecture_2023.pdf
PDF
CISSP Certification Training By Edvistaar
CompTIA Security+ SY0-601 Domain 2
cissp-course content.pdf & cissp description
CISSP _Course _Description and course overview
CISSP Preview - For the next generation of Security Leaders
Lecture 1-2.pdf
Comp tia security sy0 601 domain 3 implementation
Cybersecurity_Security_architecture_2023.pdf
CISSP Certification Training By Edvistaar

Similar to Explore the comprehensive CISSP Certification Course syllabus with InfosecTrain's (20)

PDF
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
PPTX
SCADA and HMI Security in InduSoft Web Studio
PDF
CNIT 160 Ch 4a: Information Security Programs
PDF
CNIT 160 Ch 4a: Information Security Programs
PDF
CCISO_Certification_Training_Course-Outline.pdf
PPTX
Forget cyber, it's all about AppSec
PDF
Security audit
PDF
Security+ SY0-701 CERTIFICATION TRAINING.pdf
PDF
CompTIA_Security_plus_SY0-701_course_content.pdf
PDF
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
PDF
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
PDF
CompTIA Security+ (Plus) Certification Training Course
PDF
CompTIA_Security_plus_SY0-701_course_content.pdf
PPTX
PPT
Open group spc rosenthal v3
PPT
Integrating Physical And Logical Security
DOCX
I need 10 pages of report and 10 slides PurposeThis course p
PDF
Information Security - Goals, Challenges, and Best Practices Discussed | USCSI®
PPTX
Computer security plan
PDF
CISSP Domain: Identity and Access Management (IAM) – Securing Access to Peopl...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
SCADA and HMI Security in InduSoft Web Studio
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security Programs
CCISO_Certification_Training_Course-Outline.pdf
Forget cyber, it's all about AppSec
Security audit
Security+ SY0-701 CERTIFICATION TRAINING.pdf
CompTIA_Security_plus_SY0-701_course_content.pdf
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
CompTIA Security+ (Plus) Certification Training Course
CompTIA_Security_plus_SY0-701_course_content.pdf
Open group spc rosenthal v3
Integrating Physical And Logical Security
I need 10 pages of report and 10 slides PurposeThis course p
Information Security - Goals, Challenges, and Best Practices Discussed | USCSI®
Computer security plan
CISSP Domain: Identity and Access Management (IAM) – Securing Access to Peopl...
Ad

More from InfosecTrain Education (20)

PDF
Protect Your Online World: Essential Tips to Stay Secure
PDF
Top 12 Free and Open-Source Tools for Threat Hunting.pdf
PDF
Top 12 Open Source Tools for Port Scanning: Boost Your Network Security Today
PDF
Blockchain Security: Application and Challenges .pdf
PDF
Ace the CISA Exam: Must-Know Insights for Success
PDF
How to make a complaint to the police for Social Media Fraud.pdf
PDF
Master the Essentials: Top 40+ Linux Commands by InfosecTrain for IT Pros! .pdf
PDF
Demystifying Records of Processing Activities (ROPA): Essential Transparency ...
PDF
Master DevSecOps: Join InfosecTrain’s Practical Online Training!
PDF
Mastering CISM, CISSP, Azure Security, and CISA Exams: Your Ultimate Guide to...
PDF
Master Your Next Audit Interview: Scenario-Based Questions Unveiled
PDF
How to Stay Cyber Safe While Traveling: Expert Tips.pdf
PDF
Top 10 Cybersecurity Resolutions for 2024 .pdf
PDF
Cloud vs. Local Storage - Choose Your Data Destination.pdf
PDF
Embrace the Core Layers of Enterprise Information Security Architecture (EISA)
PDF
Demystifying Detection: Essential Cybersecurity Terms You Need to Know
PDF
Navigating Cloud Data Breaches: A Strategic Approach.pdf
PDF
Comprehensive Guide to Cybersecurity Risk Metrics: Stay Ahead of Threats.pdf
PDF
Privacy Tech Revolution: 10 Cutting-Edge Solutions You Need to Know
PDF
Top Event IDs Every SOC Professional Should Know
Protect Your Online World: Essential Tips to Stay Secure
Top 12 Free and Open-Source Tools for Threat Hunting.pdf
Top 12 Open Source Tools for Port Scanning: Boost Your Network Security Today
Blockchain Security: Application and Challenges .pdf
Ace the CISA Exam: Must-Know Insights for Success
How to make a complaint to the police for Social Media Fraud.pdf
Master the Essentials: Top 40+ Linux Commands by InfosecTrain for IT Pros! .pdf
Demystifying Records of Processing Activities (ROPA): Essential Transparency ...
Master DevSecOps: Join InfosecTrain’s Practical Online Training!
Mastering CISM, CISSP, Azure Security, and CISA Exams: Your Ultimate Guide to...
Master Your Next Audit Interview: Scenario-Based Questions Unveiled
How to Stay Cyber Safe While Traveling: Expert Tips.pdf
Top 10 Cybersecurity Resolutions for 2024 .pdf
Cloud vs. Local Storage - Choose Your Data Destination.pdf
Embrace the Core Layers of Enterprise Information Security Architecture (EISA)
Demystifying Detection: Essential Cybersecurity Terms You Need to Know
Navigating Cloud Data Breaches: A Strategic Approach.pdf
Comprehensive Guide to Cybersecurity Risk Metrics: Stay Ahead of Threats.pdf
Privacy Tech Revolution: 10 Cutting-Edge Solutions You Need to Know
Top Event IDs Every SOC Professional Should Know
Ad

Recently uploaded (20)

PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Institutional Correction lecture only . . .
PPTX
Cell Types and Its function , kingdom of life
PPTX
Cell Structure & Organelles in detailed.
PDF
Insiders guide to clinical Medicine.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
master seminar digital applications in india
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Pharma ospi slides which help in ospi learning
PDF
Pre independence Education in Inndia.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Abdominal Access Techniques with Prof. Dr. R K Mishra
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Institutional Correction lecture only . . .
Cell Types and Its function , kingdom of life
Cell Structure & Organelles in detailed.
Insiders guide to clinical Medicine.pdf
TR - Agricultural Crops Production NC III.pdf
master seminar digital applications in india
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
RMMM.pdf make it easy to upload and study
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Pharma ospi slides which help in ospi learning
Pre independence Education in Inndia.pdf
VCE English Exam - Section C Student Revision Booklet
Final Presentation General Medicine 03-08-2024.pptx
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
human mycosis Human fungal infections are called human mycosis..pptx
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF

Explore the comprehensive CISSP Certification Course syllabus with InfosecTrain's

  • 2. www.infosectrain.com | sales@infosectrain.com 01 Overview The information security architect plays a vital role to implement a sound security program in the organizations as an expert shouldering the role between a C-suite and upper managerial level. As an information security architect or analyst, this role involves executing diverse information security consultative and analytical processes. The CISSP- ISSAP is an all-embracing certification that validates your technical skills in security architecture and grants the globally accepted credentials of chief security architect or analyst. This extensive certification evaluates your proficiency to develop, design and analyze various security solutions and instills skills to provide risk-based guidance to the higher management inaddressing various organizational goals.
  • 3. www.infosectrain.com | sales@infosectrain.com 02 Target Audience CISSP-ISSAP training helps advancing the technical competencies of: Pre-Requisite A minimum of 2 years of full-time and cumulative paid work experience in at least one of the six CISSP-ISSAP CBK domains • System Architects • Business Analysts • System and Network Designers • Chief Security Officers • Chief Technology Officers
  • 4. 17% 21% 15% Architect for Governance, Compliance and Risk Management DOMAIN 1 Infrastructure Security Architecture DOMAIN 3 13% Architect for Application Security DOMAIN 5 Security Architecture Modeling DOMAIN 2 16% Identity and Access Management (IAM) Architecture DOMAIN 4 18% Security Operations Architecture DOMAIN 4 www.infosectrain.com | sales@infosectrain.com 03
  • 5. DOMAIN 1 Architect for Governance, Compliance and Risk Management 1.1 Determine legal, regulatory, organizational and industry requirements • Determine applicable information security standards and guidelines • Identify third-party and contractual obligations (e.g., supply chain, outsourcing, partners) • Determine applicable sensitive/personal data standards, guidelines and privacy regulations • Design for auditability (e.g., determine regulatory, legislative, forensic requirements, segregation, high assurance systems) • Coordinate with external entities (e.g., law enforcement, public relations, independent assessor) 1.2 Manage Risk • Identify and classify risks • Assess risk • Recommend risk treatment (e.g., mitigate, transfer, accept, avoid) • Risk monitoring and reporting www.infosectrain.com | sales@infosectrain.com 04
  • 6. DOMAIN 2 Security Architecture Modeling 2.1 Identify security architecture approach • Types and scope (e.g., enterprise, network, Service-Oriented Architecture (SOA), cloud, Internet of Things (IoT), Industrial Control Systems (ICS)/Supervisory Control and Data Acquisition (SCADA)) • Frameworks (e.g., Sherwood Applied Business Security Architecture (SABSA), Service-Oriented Modeling Framework (SOMF)) • Reference architectures and blueprints • Security configuration (e.g., baselines, benchmarks, profiles) • Network configuration (e.g., physical, logical, high availability, segmentation, zones) 2.2 Verify and validate design (e.g., Functional Acceptance Testing (FAT), regression) • Validate results of threat modeling (e.g., threat vectors, impact, probability) • Identify gaps and alternative solutions • Independent Verification and Validation (IV&V) (e.g., tabletop exercises, modeling and simulation, manual review of functions) www.infosectrain.com | sales@infosectrain.com 05
  • 7. DOMAIN 3 Infrastructure Security Architecture • On-premise, cloud-based, hybrid • Internet of Things (IoT), zero trust • Management networks • Industrial Control Systems (ICS) security • Network security • Operating systems (OS) security • Database security • Container security • Cloud workload security • Firmware security • User security awareness considerations 3.1 Develop infrastructure security requirements 3.2 Design defense-in-depth architecture 3.3 Secure shared services (e.g., wireless, e-mail, Voice over Internet Protocol (VoIP), Unified Communications (UC), Domain Name System (DNS), Network Time Protocol (NTP)) 3.4 Integrate technical security controls 3.5 Design and integrate infrastructure monitoring • Network visibility (e.g., sensor placement, time reconciliation, span of control, record compatibility) • Active/Passive collection solutions (e.g., span port, port mirroring, tap, inline, flow logs) • Security analytics (e.g., Security Information and Event Manage- ment (SIEM), log collection, machine learning, User Behavior Analytics (UBA)) • Design boundary protection (e.g., firewalls, Virtual Private Network (VPN), airgaps, software defined perimeters, wireless, cloud-native) • Secure device management (e.g., Bring Your Own Device (BYOD), mobile, server, endpoint, cloud instance, storage) www.infosectrain.com | sales@infosectrain.com 06
  • 8. 3.6 Design infrastructure cryptographic solutions • Determine cryptographic design considerations and constraints • Determine cryptographic implementation (e.g., in-transit, in-use, at-rest) • Plan key management lifecycle (e.g., generation, storage, distribution) • Map physical security requirements to organizational needs (e.g., perime- ter protection and internal zoning, fire suppression) • Validate physical security controls 3.7 Design secure network and communication infrastructure (e.g., Virtual Private Network (VPN), Internet Protocol Security (IPsec), Transport Layer Security (TLS)) 3.8 Evaluate physical and environmental security requirements www.infosectrain.com | sales@infosectrain.com 07
  • 9. DOMAIN 4 Identity and Access Management (IAM) Architecture 4.1 Design identity management and lifecycle • Establish and verify identity • Assign identifiers (e.g., to users, services, processes, devices) • Identity provisioning and de-provisioning • Define trust relationships (e.g., federated, standalone) • Define authentication methods (e.g., Multi-Factor Authentication (MFA), risk-based, location-based, knowledge-based, object-based, characteristicsbased) • Authentication protocols and technologies (e.g., Security Assertion Markup Language (SAML), Remote Authentication Dial-In User Service (RADIUS), Kerberos) 4.2 Design access control management and lifecycle • Access control concepts and principles (e.g., discretionary/mandato- ry, segregation/Separation of Duties (SoD), least privilege) • Access control configurations (e.g., physical, logical, administrative) • Authorization process and workflow (e.g., governance, issuance, periodic review, revocation) • Roles, rights, and responsibilities related to system, application, and data access control (e.g., groups, Digital Rights Management (DRM), trust relationships) • Management of privileged accounts • Authorization (e.g., Single Sign-On (SSO), rulebased, role-based, attribute- based) www.infosectrain.com | sales@infosectrain.com 08
  • 10. 4.3 Design identity and access solutions • Access control protocols and technologies (e.g., eXtensible Access Control Markup Language (XACML), Lightweight Directory Access Protocol (LDAP)) • Credential management technologies (e.g., password management, certificates, smart cards) • Centralized Identity and Access Management (IAM) architecture (e.g., cloud-based, on-premise, hybrid) • Decentralized Identity and Access Management (IAM) architecture (e.g., cloud-based, on-premise, hybrid) • Privileged Access Management (PAM) implementation (for users with elevated privileges) • Accounting (e.g., logging, tracking, auditing) www.infosectrain.com | sales@infosectrain.com 09
  • 11. DOMAIN 5 Architect for Application Security 5.1 Integrate Software Development Life Cycle (SDLC) with application security architecture (e.g., Requirements Traceability Matrix (RTM), security architecture documentation, secure coding) • Assess code review methodology (e.g., dynamic, manual, static) • Assess the need for application protection (e.g., Web Application Firewall (WAF), anti-malware, secure Application Programming Interface (API), secure Security Assertion Markup Language (SAML)) • Determine encryption requirements (e.g., at-rest, in-transit, in-use) • Assess the need for secure communications between applications and databases or other endpoints • Leverage secure code repository 5.2 Determine application security capability requirements and strategy (e.g., open source, Cloud Service Providers (CSP), Software as a Service (SaaS)/Infrastructure as a Service (IaaS)/ Platform as a Service (PaaS) environments) 5.3 Identify common proactive controls for applications (e.g., Open Web Application Security Project (OWASP)) • Review security of applications (e.g., custom, Commercial Off-the-Shelf (COTS), in-house, cloud) • Determine application cryptographic solutions (e.g., cryptographic Application Programming Interface (API), Pseudo Random Number Generator (PRNG), key management) • Evaluate applicability of security controls for system components (e.g., mobile and web client applications; proxy, application, and database services) www.infosectrain.com | sales@infosectrain.com 10
  • 12. DOMAIN 6 Security Operations Architecture 6.1 Gather security operations requirements (e.g., legal, compliance, organizational, and business requirements) 6.2 Design information security monitoring (e.g., Security Information and Event Management (SIEM), insider threat, threat intelligence, user behavior analytics, Incident Response (IR) procedures) 6.4 Validate Business Continuity Plan (BCP)/Disaster Recovery Plan (DRP) architecture 6.5 Design Incident Response (IR) management 6.3 Design Business Continuity (BC) and resiliency solutions • Detection and analysis • Proactive and automated security monitoring and remediation (e.g., vulnerability management, compliance audit, penetration testing) • Preparation (e.g., communication plan, Incident Response Plan (IRP), training) • Identification • Containment • Eradication • Recovery • Review lessons learned • Incorporate Business Impact Analysis (BIA) • Determine recovery and survivability strategy • Identify continuity and availability solutions (e.g., cold, warm, hot, cloud backup) • Define processing agreement requirements (e.g., provider, reciprocal, mutual, cloud, virtualization) • Establish Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO) • Design secure contingency communication for operations (e.g., backup communication channels, Out-of-Band (OOB)) www.infosectrain.com | sales@infosectrain.com 11