Skip to content Skip to footer

Coverage: 1.1–1.12 in the (ISC)² outline. [cisa.gov]


1.1 Professional Ethics

What the CISSP expects of you

  • (ISC)² Code of Professional Ethics requires you to: protect society and the common good; act honorably, honestly, justly, responsibly and legally; provide diligent and competent service; and advance and protect the profession. [cisa.gov]
  • Organizational codes of ethics (e.g., conflict of interest, anti‑corruption, acceptable use) are employer policies that you must follow in addition to your professional code. [cisa.gov]

Scenario

  • Your manager asks you to “quietly” view an employee’s email without authorization: you must decline and escalate to the appropriate authority because it violates law/policy and the (ISC)² Code. [cisa.gov]

1.2 Security Concepts: CIA + Authenticity + Nonrepudiation

Core definitions

  • Confidentiality prevents unauthorized disclosure (e.g., encryption, access controls, segmentation). [cisa.gov]
  • Integrity prevents unauthorized modification (e.g., hashes, digital signatures, checksums). [cisa.gov]
  • Availability ensures timely and reliable access (e.g., redundancy, DR/BC, clustering, UPS). [cisa.gov]
  • Authenticity confirms an entity or artifact is genuine (e.g., code signing, certificates). [cisa.gov]
  • Nonrepudiation prevents denial of actions (e.g., digitally signed transactions and immutable, time‑stamped logging). [cisa.gov]

How STRIDE maps to CIA+A+NR (high‑yield association)

  • Spoofing → Authentication property; Tampering → Integrity; Repudiation → Nonrepudiation; Information Disclosure → Confidentiality; Denial of Service → Availability; Elevation of Privilege → Authorization. [csrc.nist.gov]

1.3 Security Governance Principles & Frameworks

Aligning security to business

  • Governance aligns security to mission, goals, strategy and embeds risk into organizational decision‑making (e.g., governance committees, M&A, reporting lines). [cisa.gov]

Due Care vs. Due Diligence (test favorite)

  • Due Care = acting prudently (publish/enforce policy, set minimum standards, training). [cisa.gov]
  • Due Diligence = ongoing verification and analysis (risk assessments, vendor reviews, vulnerability management); it informs due‑care choices. [cisa.gov]

Frameworks — what each is best at (know the differences)

  • ISO/IEC 27001: certifiable ISMS; strong governance + Annex A controls; used to prove security maturity to customers/regulators. [mitre.org]
  • NIST CSF 2.0: voluntary risk framework (Govern/Identify/Protect/Detect/Respond/Recover) to improve posture; not a certification. [mitre.org]
  • COBIT: enterprise IT governance (EDM/APO/BAI/DSS/MEA), connects business goals to IT processes and audits. [pcisecurit…ndards.org]
  • SABSA: business‑driven security architecture; traceability from business attributes → policies → services → mechanisms. [nvlpubs.nist.gov]
  • PCI DSS: industry standard for cardholder/sensitive auth data; prescriptive controls; contractual enforcement via payment ecosystem. [aptori.com]
  • FedRAMP: authorization/baselines for US federal cloud systems; narrower use‑case than ISO/NIST CSF. [cisa.gov]

1.4 Legal, Regulatory, and Compliance

The legal landscape

  • Cybercrime/data breach laws define offenses and penalties as well as notification duties after incidents. [cisa.gov]
  • Intellectual property & licensing govern use/redistribution of software and content. [cisa.gov]
  • Export controls limit transfer of strong cryptography and dual‑use technologies. [cisa.gov]
  • Transborder data flow rules (e.g., GDPR, CCPA, PIPL, POPIA) restrict how personal data moves across jurisdictions with different rights and transfer mechanisms. [cisa.gov]

Contractual vs. statutory obligations

  • PCI DSS is a contractual/industry standard required by the card brands and acquiring banks for entities that store/process/transmit CHD/SAD, not a government law. [aptori.com]

1.5 Investigation Requirements (Administrative, Criminal, Civil, Regulatory)

Types of investigations (how they differ)

  • Administrative: internal policy violations; HR‑led; lower standard of proof; may precede other actions. [cisa.gov]
  • Criminal: law enforcement; warrants; strict chain of custody and forensic soundness; evidence must meet rules of evidence. [cisa.gov]
  • Civil: lawsuits between parties; discovery process; “preponderance of evidence” standard. [cisa.gov]
  • Regulatory: sector‑specific agencies/enforcers; statutory deadlines; audits, corrective actions, fines. [cisa.gov]

Evidence handling basics

  • Maintain chain of custody, capture hashes, document who/what/when/where/how, and preserve originals via forensically sound imaging when criminal/civil admissibility is required. [cisa.gov]

1.6 Security Policies, Standards, Procedures, Guidelines (PSPG)

What each document does

  • Policy: management intent (the “what/why”), brief and mandatory. [cisa.gov]
  • Standard: mandatory specifics (e.g., TLS 1.2+, 14‑char passwords, device hardening baseline). [cisa.gov]
  • Procedure: step‑by‑step “how‑to” for consistent execution. [cisa.gov]
  • Guideline: recommended best practice, non‑mandatory, allows local discretion. [cisa.gov]

1.7 Business Continuity (BC) Requirements

BIA essentials (and key metrics)

  • Business Impact Analysis (BIA) identifies critical processes, quantifies impacts, and defines RTO (how fast to restore) and RPO (how much data loss is tolerable). [cisa.gov]
  • Consider external dependencies (providers, utilities, logistics) because their outages drive your downstream impacts and recovery sequence. [cisa.gov]

BC vs. DR (difference)

  • BC = keeping the business running (people, sites, suppliers, manual workarounds); DR = restoring IT systems/data; both are informed by the BIA. [cisa.gov]

1.8 Personnel Security

Lifecycle controls

  • Screening/hiring (e.g., background checks as permitted by law), employment agreements/NDAs, onboarding/transfer/offboarding, and third‑party/contractor controls reduce human risk. [cisa.gov]

How this differs from IAM

  • Personnel security = administrative/HR‑centric measures; IAM (Domain 5) = digital identities, entitlements, authentication/authorization systems. [cisa.gov]

1.9 Risk Management Concepts

Terminology & risk math

  • Threat (potential cause of harm) vs. Vulnerability (weakness) vs. Risk (likelihood × impact of a threat exploiting a vulnerability). [nist.gov]
  • Qualitative analysis uses scales (High/Med/Low) when reliable data is limited. [nist.gov]
  • Quantitative analysis estimates SLE, ARO, ALE to express financial exposure and justify control cost‑benefit. [nist.gov]

Treatment options & control types

  • Treat/mitigate, transfer (insurance, contract), avoid, accept — choose based on risk appetite and cost‑benefit. [nist.gov]
  • Preventive, detective, corrective (plus deterrent, compensating, physical) — layered per scenario for depth. [cisa.gov]

Continuous monitoring

  • Move beyond point‑in‑time checks: SIEM, KPIs/KRIs, vulnerability management, reporting, and continuous improvement are part of a mature program. [cisa.gov]

Risk frameworks

  • NIST SP 800‑30 Rev.1 gives structured steps for risk assessments (prepare → conduct → maintain), focusing on residual risk and decision support. [nist.gov]
  • COBIT connects risk/governance to business processes with defined domains and capabilities. [pcisecurit…ndards.org]
  • SABSA links business requirements to security architecture with bidirectional traceability. [nvlpubs.nist.gov]

1.10 Threat Modeling Concepts & Methodologies

Methods (how they differ and when to use)

  • STRIDE (Microsoft): category‑based coverage using DFDs; easy to teach and scale; doesn’t inherently prioritize by risk. [csrc.nist.gov]
  • PASTA: 7‑stage risk‑centric method with attack simulation and alignment to business objectives; deeper traceability; heavier process. [nvlpubs.nist.gov]
  • DREAD: scoring (Damage, Reproducibility, Exploitability, Affected Users, Discoverability) for prioritization; often used to score threats identified via STRIDE; subjectivity is a known caveat. [csrc.nist.rip]
  • MITRE ATT&CK: empirical catalog of adversary tactics/techniques for detection engineering, hunting, and purple teaming — complements design‑time models by informing detection coverage. [isc2.org]

Practical combo (likely exam logic)


1.11 Supply Chain Risk Management (SCRM)

What can go wrong (layers of risk)

  • Hardware/firmware risks: tampering, counterfeits, implants; mitigations include silicon root of trust and physically unclonable functions (PUF) along with provenance controls. [cisa.gov]
  • Software risks: hidden vulnerable dependencies and compromised build pipelines; mitigations include third‑party assessments, minimum security requirements, SLAs, and SBOM transparency. [cisa.gov]

SBOM (and why it matters)

  • SBOM = machine‑readable “ingredients list” of software components to speed vulnerability exposure analysis and license compliance. [sabsa.org]
  • NIST describes SBOM’s minimum elements as data fields, automation support, and operational processes, with common formats SPDX, CycloneDX, SWID for interoperability. [en.wikipedia.org]
  • CISA’s 2025 draft proposes enhancements (e.g., component hash, license, tool name, generation context) and stresses operationalization and VEX/CSAF alignment. [avolutions…ftware.com]
  • OMB M‑26‑05 encourages agencies to apply risk‑based software/hardware assurance and allows requiring SBOM upon request, rather than imposing a universal one‑size‑fits‑all; it references NIST SSDF and CISA SBOM work. [davidlynas.com]

1.12 Security Awareness, Education, and Training

Building an effective program

  • Methods include phishing simulations, social engineering exercises, gamification, and security champion networks to embed knowledge in product/ops teams. [cisa.gov]
  • Periodic content reviews must reflect new tech/trends (AI, blockchain, cryptocurrency) to stay relevant and risk‑aligned. [cisa.gov]
  • Program effectiveness should be measured (report rates, behavior change, reduced incidents), not just attendance. [cisa.gov]