SlideShare a Scribd company logo
1 of 43
CISSP Training
Pages 566-631
Tim Jensen
StaridLabs
Security Awareness Training
●Designed to tell why a policy exists
●Show practical examples and ways to identify
threats
●Turn employees into human security sensors
Topics
● Corporate security policies
● Organization's security program
● Regulatory compliance requirements for the
organization
● Social Engineering
● Business continuity
● Disaster Recovery
Topics Cont'd
● Emergency Management (hazmat, biohaz, etc)
● Security incident response
● Data classification
● Information labeling and handling
● Personnel security, safety, and soundness
● Physical Security
Topics Still Cont'd
● Appropriate computing resource use
● Proper care and handling of security
credentials (usernames, passwords)
● Risk assessment
● Accidents, errors, or omissions
Teaching why policy is necessary
● Show real world examples of security failures
that could have been fixed with policy
● Security teams identify risks to the company
and create policies to mitigate just the risks
present. Without policy every risk would have
mitigation even if the risk didn't apply to the
company/department
Why are security policies important
● The end goal of security policies is to
protect:
● The organization
● The employees
● The Assets of the company
● (It's customers when possible)
Questions to answer in training
● How does all this security stuff affect my
job at the company?
● Do I have to do it?
● If I don't do it, what are you going to do?
● All this security crap is just going to
waste time and make my job harder!
What should I be looking for?
Awareness Activities
● Formal training courses
● Posters
● Business unit walk throughs
● Security articles/reminders on intranet
● Appointment of a 'security awareness mentor'
● Security Awareness Day – activies, prizes, recognition for winners
● Sponsor event with security organization (ISSA, ISACA, SANS, ISC2, Infragard, etc)
● Provide trinkets for the users within the organization that support security
management principles
● Promote Security Awareness Week/month
● Provide security reference materials to employees (books, videos, websites)
Job Training
● Employees should be professionally trained
on the systems/processes they manage.
● Lack of training leads to misconfigurations or
process gaps which can lead to compromise
● It's the sign of a good employee to self learn.
It's the sign of bad management to blindly
trust that the employee is doing so.
● Vendor neutral vs vendor certifications
Performance Metrics
● Consistent metrics allow for the
identification of security gaps, identify is
process improvements helped or hurt,
and identify non-compliance
● Can be walkthroughs, quizes, or etc
Managing the Security Function
IS Security Officers
● The Information Security Officer is accountable for ensuring the
protection of all of the business information assets from intentional
and unintentional loss, disclosure, alteration, destruction, and
unavailability.
● The security officer typically doesn't have the resources available to
perform all of these functions and must depend on involvement from
other departments/individuals
● Must keep up with emerging technologies and risks
● Security officers often operate CIRT teams
● Provides the leadership for the information security awareness
program by ensuring that the program is delivered in a meaningful,
understandable way to the intended audience.
Bridging IT with Executives
● IS Security Officers translate threats based
on configuration/technoligies into:
● What is the real perceived threat?
● What is the risk (impact/probability)
● What is the cost of the safeguard?
● What will be the residual risk?
● How long will the project take (time, money,
people, systems)
Reporting
● Security officer should report as high in
the organization as possible to:
● Maintain visibility of the importance of
security
● Limit the distortion or inaccurate translation
of the message
Budget
● Security maintains it's own budget as
well as ensures each applicable
department's budget contains funds for
security training/remediation
Work Metrics
● Automated metric systems should be implimented to rate the
day to day security and long term trends.
● Helpdesk tickets/hour/day
● Inbound email/hour/day
● Outbound email/hour/day
● Inbound connections at border firewall
– Packets dropped at border firewall
– Packets dropped at internal firewall
● Employee hours spent on compliance reporting
● Report metrics – how effective is each report? Has it ever caught
anything?
Interdepartmental resources
● Buy doughnuts for:
● System Admins
● Database Admins
● Network Admins
● Privacy Officers
● Compliance Officers
● Legal
● Law Enforcement
● QA testers
● Helpdesk
● Budget Officers
● Procurement Specialists
● Business Analysts
● Administrative Professionals
● Enterprise Architects
● Software Developers
Strategic Planning
● Make 3-5 year plans
● Review annually or before
Tactical Plans
● 6-18 month plans for specific purposes:
reducing vulnerabilities, etc
Review Security Program
● Anaully review security program for
completeness and to identify gaps
Domain 4
Software Development Security
Jem Jensen
StaridLabs
Overview
● Planning, programming, and management of
software systems
● Includes both operating systems and
applications
● Software is layered, kind of like networking
● Hardware, drivers, OS, utilities and applications
Software Development Life Cycle
● SDLC is is project management process
used to plan, execute, and control a
software development project
● Can differ from project to project
● Specific model should best fit the project
Basic SDLC Phases
● Project initiation and planning
● Functional requirements definition
● System design specifications
● Development and implementation
● Documentation and common program controls
● Acceptance
● Testing and evaluation control
● Transition to production
Project initiation and planning
● Vision, goal
● Proposed technical solution
● Documentation: charter, scope
● Include objectives, strategy, costs, time
estimates, milestones
● Usually ends with management signoff on
charter and/or scope
Project initiation and planning
● Security professional mental checklist:
● Is particular info sensitive? (alone or together)
● Has info owner determined the info value?
● Classifications/Categories?
● Is there a risk of sensitive info exposure?
● Will data be transmitted or stored in public?
● Are controlled areas required?
● What systems interconnect with this?
● How will this affect the org culture?
● Could the company become dependent upon it?
Functional requirements definition
● Define end-user needs
● Formalize security requirements
● Often rolled-into project initiation phase
for small projects
System design specifications
● Design:
● System architecture
● System outputs
● System interface
● Security features
● Generally based on over-all architecture
for the company
Development and implementation
● Generate:
● Source code
● Test cases
● Perform unit tests and functional tests
● Perform vulnerability analysis on code
Documentation and common
program controls
● Controls for editing data within the
program
● What types of logging the program does
● How program versions should be stored
● Tests and integrity checks
Acceptance
● Ideally, an independent group develops
test data and tests the code
● Should simulate live environment for
good tests
● Ensure the application meets security
requirements and specifications
Testing and Evaluation Controls
● Test data should include:
● Data at the ends of acceptable ranges
● Data beyond acceptable bounds
● Various data points between acceptable range
● Random data
● Data validations – review data before and after each
test to ensure data has not been changed
inadvertently
● Bounds checking
Testing and Evaluation Controls
● Never use production data
● Sanitize test data
● Test all changes
● Management should be informed and
sign off on testing results
Transition to Production
● Train new users
● Implement the system
● Installation
● Data conversions (if needed)
● Parallel operations (to reduce disruption)
Revisions
● Regular evaluation and audits
● Should incorporate security planning to
avoid future problems
● Document failures
● Helps to justify future enhancements
Maturity Models
● CMM
● Capability Maturity Model
● Framework to product higher quality
software products
● Continual optimization of processes
● ISO 9000?
Operation and Maintenance
● Monitor performance of the system
● Detect defects and weaknesses
● Verify changes don't impact existing
functionality or circumvent security
measures
Change Management
● Track changes in software and systems to
prevent unintended or unauthorized changes
● Should be a formal cycle with planning,
approval, testing, and documentation
● Patch management
● Should include testing and rollback features

More Related Content

What's hot

Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseDesmond Devendran
 
2. Asset Security
2. Asset Security2. Asset Security
2. Asset SecuritySam Bowne
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset SecurityKarthikeyan Dhayalan
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsKarthikeyan Dhayalan
 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security PresentationWajahat Rajab
 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and TestingSam Bowne
 
3. security architecture and models
3. security architecture and models3. security architecture and models
3. security architecture and models7wounders
 
Ch 3a: Risk Management Concepts
Ch 3a: Risk Management ConceptsCh 3a: Risk Management Concepts
Ch 3a: Risk Management ConceptsSam Bowne
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
CISSP - Chapter 3 - System security architecture
CISSP - Chapter 3  - System security architectureCISSP - Chapter 3  - System security architecture
CISSP - Chapter 3 - System security architectureKarthikeyan Dhayalan
 
2. access control
2. access control2. access control
2. access control7wounders
 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)Sam Bowne
 
4 Operations Security
4 Operations Security4 Operations Security
4 Operations SecurityAlfred Ouyang
 

What's hot (20)

Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control Fundamentals
 
CISSP - Security Assessment
CISSP - Security AssessmentCISSP - Security Assessment
CISSP - Security Assessment
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review Course
 
2. Asset Security
2. Asset Security2. Asset Security
2. Asset Security
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security Presentation
 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and Testing
 
3. security architecture and models
3. security architecture and models3. security architecture and models
3. security architecture and models
 
Ch 3a: Risk Management Concepts
Ch 3a: Risk Management ConceptsCh 3a: Risk Management Concepts
Ch 3a: Risk Management Concepts
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
CISSP - Chapter 3 - System security architecture
CISSP - Chapter 3  - System security architectureCISSP - Chapter 3  - System security architecture
CISSP - Chapter 3 - System security architecture
 
Lesson 1- Intrusion Detection
Lesson 1- Intrusion DetectionLesson 1- Intrusion Detection
Lesson 1- Intrusion Detection
 
ITIL # Lecture 8
ITIL # Lecture 8ITIL # Lecture 8
ITIL # Lecture 8
 
2. access control
2. access control2. access control
2. access control
 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)
 
CISSP Chapter 1 BCP
CISSP Chapter 1 BCPCISSP Chapter 1 BCP
CISSP Chapter 1 BCP
 
4 Operations Security
4 Operations Security4 Operations Security
4 Operations Security
 
Chapter 1 Law & Ethics
Chapter 1   Law & EthicsChapter 1   Law & Ethics
Chapter 1 Law & Ethics
 

Viewers also liked

CISSP Week 5
CISSP Week 5CISSP Week 5
CISSP Week 5jemtallon
 
Access Control - Week 4
Access Control - Week 4Access Control - Week 4
Access Control - Week 4jemtallon
 
Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2infosecedu
 
CISSP Week 21
CISSP Week 21CISSP Week 21
CISSP Week 21jemtallon
 
CISSP Week 18
CISSP Week 18CISSP Week 18
CISSP Week 18jemtallon
 
Cissp Week 24
Cissp Week 24Cissp Week 24
Cissp Week 24jemtallon
 
CISSP week 25
CISSP week 25CISSP week 25
CISSP week 25jemtallon
 
CISSP Week 13
CISSP Week 13CISSP Week 13
CISSP Week 13jemtallon
 
CISSP Week 14
CISSP Week 14CISSP Week 14
CISSP Week 14jemtallon
 
CISSP Week 16
CISSP Week 16CISSP Week 16
CISSP Week 16jemtallon
 
CISSP Week 7
CISSP Week 7CISSP Week 7
CISSP Week 7jemtallon
 
CISSP Week 20
CISSP Week 20CISSP Week 20
CISSP Week 20jemtallon
 
CISSP Week 6
CISSP Week 6CISSP Week 6
CISSP Week 6jemtallon
 
CISSP Proposal
CISSP ProposalCISSP Proposal
CISSP Proposaljemtallon
 

Viewers also liked (15)

CISSP Week 5
CISSP Week 5CISSP Week 5
CISSP Week 5
 
Access Control - Week 4
Access Control - Week 4Access Control - Week 4
Access Control - Week 4
 
Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2
 
CISSP Week 21
CISSP Week 21CISSP Week 21
CISSP Week 21
 
CISSP Week 18
CISSP Week 18CISSP Week 18
CISSP Week 18
 
Cissp Week 24
Cissp Week 24Cissp Week 24
Cissp Week 24
 
CISSP week 25
CISSP week 25CISSP week 25
CISSP week 25
 
CISSP Week 13
CISSP Week 13CISSP Week 13
CISSP Week 13
 
CISSP Week 14
CISSP Week 14CISSP Week 14
CISSP Week 14
 
CISSP Week 16
CISSP Week 16CISSP Week 16
CISSP Week 16
 
CISSP Week 7
CISSP Week 7CISSP Week 7
CISSP Week 7
 
CISSP Week 20
CISSP Week 20CISSP Week 20
CISSP Week 20
 
CISSP Week 6
CISSP Week 6CISSP Week 6
CISSP Week 6
 
CISSP Proposal
CISSP ProposalCISSP Proposal
CISSP Proposal
 
SlideShare 101
SlideShare 101SlideShare 101
SlideShare 101
 

Similar to CISSP Training on Security Awareness and Software Development (Chapters 566-631

Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Frances Coronel
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principlesDivya Tiwari
 
Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015
Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015
Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015Cory Scott
 
Assessing System Risk the Smart Way
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart WaySecurity Innovation
 
Implementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentorImplementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentortmbainjr131
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniyaseraljohani
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniYaser Alrefai
 
MCGlobalTech Cyber Capability Statement
MCGlobalTech Cyber Capability Statement MCGlobalTech Cyber Capability Statement
MCGlobalTech Cyber Capability Statement William McBorrough
 
Security Fundamentals and Threat Modelling
Security Fundamentals and Threat ModellingSecurity Fundamentals and Threat Modelling
Security Fundamentals and Threat ModellingKnoldus Inc.
 
Agile Secure Development
Agile Secure DevelopmentAgile Secure Development
Agile Secure DevelopmentBosnia Agile
 
SanerNow a platform for Endpoint security and systems Management
SanerNow  a platform for Endpoint security and systems ManagementSanerNow  a platform for Endpoint security and systems Management
SanerNow a platform for Endpoint security and systems ManagementSecPod Technologies
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditingPiyush Jain
 
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.pptgealehegn
 
Venkatesh M S - Security Audit and Compliance
Venkatesh M S - Security Audit and ComplianceVenkatesh M S - Security Audit and Compliance
Venkatesh M S - Security Audit and ComplianceVenkatesh M S
 

Similar to CISSP Training on Security Awareness and Software Development (Chapters 566-631 (20)

Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)
 
Building Security Teams
Building Security TeamsBuilding Security Teams
Building Security Teams
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015
Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015
Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015
 
Assessing System Risk the Smart Way
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart Way
 
Implementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentorImplementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentor
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
002.itsecurity bcp v1
002.itsecurity bcp v1002.itsecurity bcp v1
002.itsecurity bcp v1
 
Bai giang-se-16jan14
Bai giang-se-16jan14Bai giang-se-16jan14
Bai giang-se-16jan14
 
Vulnerability Management V0.1
Vulnerability Management V0.1Vulnerability Management V0.1
Vulnerability Management V0.1
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
MCGlobalTech Cyber Capability Statement
MCGlobalTech Cyber Capability Statement MCGlobalTech Cyber Capability Statement
MCGlobalTech Cyber Capability Statement
 
Security Fundamentals and Threat Modelling
Security Fundamentals and Threat ModellingSecurity Fundamentals and Threat Modelling
Security Fundamentals and Threat Modelling
 
Agile Secure Development
Agile Secure DevelopmentAgile Secure Development
Agile Secure Development
 
SanerNow a platform for Endpoint security and systems Management
SanerNow  a platform for Endpoint security and systems ManagementSanerNow  a platform for Endpoint security and systems Management
SanerNow a platform for Endpoint security and systems Management
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
 
Agile security
Agile securityAgile security
Agile security
 
Venkatesh M S - Security Audit and Compliance
Venkatesh M S - Security Audit and ComplianceVenkatesh M S - Security Audit and Compliance
Venkatesh M S - Security Audit and Compliance
 

Recently uploaded

MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 

Recently uploaded (20)

MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 

CISSP Training on Security Awareness and Software Development (Chapters 566-631

  • 2. Security Awareness Training ●Designed to tell why a policy exists ●Show practical examples and ways to identify threats ●Turn employees into human security sensors
  • 3. Topics ● Corporate security policies ● Organization's security program ● Regulatory compliance requirements for the organization ● Social Engineering ● Business continuity ● Disaster Recovery
  • 4. Topics Cont'd ● Emergency Management (hazmat, biohaz, etc) ● Security incident response ● Data classification ● Information labeling and handling ● Personnel security, safety, and soundness ● Physical Security
  • 5. Topics Still Cont'd ● Appropriate computing resource use ● Proper care and handling of security credentials (usernames, passwords) ● Risk assessment ● Accidents, errors, or omissions
  • 6. Teaching why policy is necessary ● Show real world examples of security failures that could have been fixed with policy ● Security teams identify risks to the company and create policies to mitigate just the risks present. Without policy every risk would have mitigation even if the risk didn't apply to the company/department
  • 7. Why are security policies important ● The end goal of security policies is to protect: ● The organization ● The employees ● The Assets of the company ● (It's customers when possible)
  • 8. Questions to answer in training ● How does all this security stuff affect my job at the company? ● Do I have to do it? ● If I don't do it, what are you going to do? ● All this security crap is just going to waste time and make my job harder!
  • 9. What should I be looking for?
  • 10.
  • 11.
  • 12. Awareness Activities ● Formal training courses ● Posters ● Business unit walk throughs ● Security articles/reminders on intranet ● Appointment of a 'security awareness mentor' ● Security Awareness Day – activies, prizes, recognition for winners ● Sponsor event with security organization (ISSA, ISACA, SANS, ISC2, Infragard, etc) ● Provide trinkets for the users within the organization that support security management principles ● Promote Security Awareness Week/month ● Provide security reference materials to employees (books, videos, websites)
  • 13. Job Training ● Employees should be professionally trained on the systems/processes they manage. ● Lack of training leads to misconfigurations or process gaps which can lead to compromise ● It's the sign of a good employee to self learn. It's the sign of bad management to blindly trust that the employee is doing so. ● Vendor neutral vs vendor certifications
  • 14.
  • 15. Performance Metrics ● Consistent metrics allow for the identification of security gaps, identify is process improvements helped or hurt, and identify non-compliance ● Can be walkthroughs, quizes, or etc
  • 16. Managing the Security Function IS Security Officers ● The Information Security Officer is accountable for ensuring the protection of all of the business information assets from intentional and unintentional loss, disclosure, alteration, destruction, and unavailability. ● The security officer typically doesn't have the resources available to perform all of these functions and must depend on involvement from other departments/individuals ● Must keep up with emerging technologies and risks ● Security officers often operate CIRT teams ● Provides the leadership for the information security awareness program by ensuring that the program is delivered in a meaningful, understandable way to the intended audience.
  • 17. Bridging IT with Executives ● IS Security Officers translate threats based on configuration/technoligies into: ● What is the real perceived threat? ● What is the risk (impact/probability) ● What is the cost of the safeguard? ● What will be the residual risk? ● How long will the project take (time, money, people, systems)
  • 18. Reporting ● Security officer should report as high in the organization as possible to: ● Maintain visibility of the importance of security ● Limit the distortion or inaccurate translation of the message
  • 19. Budget ● Security maintains it's own budget as well as ensures each applicable department's budget contains funds for security training/remediation
  • 20. Work Metrics ● Automated metric systems should be implimented to rate the day to day security and long term trends. ● Helpdesk tickets/hour/day ● Inbound email/hour/day ● Outbound email/hour/day ● Inbound connections at border firewall – Packets dropped at border firewall – Packets dropped at internal firewall ● Employee hours spent on compliance reporting ● Report metrics – how effective is each report? Has it ever caught anything?
  • 21.
  • 22. Interdepartmental resources ● Buy doughnuts for: ● System Admins ● Database Admins ● Network Admins ● Privacy Officers ● Compliance Officers ● Legal ● Law Enforcement ● QA testers ● Helpdesk ● Budget Officers ● Procurement Specialists ● Business Analysts ● Administrative Professionals ● Enterprise Architects ● Software Developers
  • 23. Strategic Planning ● Make 3-5 year plans ● Review annually or before
  • 24. Tactical Plans ● 6-18 month plans for specific purposes: reducing vulnerabilities, etc
  • 25. Review Security Program ● Anaully review security program for completeness and to identify gaps
  • 26. Domain 4 Software Development Security Jem Jensen StaridLabs
  • 27. Overview ● Planning, programming, and management of software systems ● Includes both operating systems and applications ● Software is layered, kind of like networking ● Hardware, drivers, OS, utilities and applications
  • 28. Software Development Life Cycle ● SDLC is is project management process used to plan, execute, and control a software development project ● Can differ from project to project ● Specific model should best fit the project
  • 29. Basic SDLC Phases ● Project initiation and planning ● Functional requirements definition ● System design specifications ● Development and implementation ● Documentation and common program controls ● Acceptance ● Testing and evaluation control ● Transition to production
  • 30. Project initiation and planning ● Vision, goal ● Proposed technical solution ● Documentation: charter, scope ● Include objectives, strategy, costs, time estimates, milestones ● Usually ends with management signoff on charter and/or scope
  • 31. Project initiation and planning ● Security professional mental checklist: ● Is particular info sensitive? (alone or together) ● Has info owner determined the info value? ● Classifications/Categories? ● Is there a risk of sensitive info exposure? ● Will data be transmitted or stored in public? ● Are controlled areas required? ● What systems interconnect with this? ● How will this affect the org culture? ● Could the company become dependent upon it?
  • 32. Functional requirements definition ● Define end-user needs ● Formalize security requirements ● Often rolled-into project initiation phase for small projects
  • 33. System design specifications ● Design: ● System architecture ● System outputs ● System interface ● Security features ● Generally based on over-all architecture for the company
  • 34. Development and implementation ● Generate: ● Source code ● Test cases ● Perform unit tests and functional tests ● Perform vulnerability analysis on code
  • 35. Documentation and common program controls ● Controls for editing data within the program ● What types of logging the program does ● How program versions should be stored ● Tests and integrity checks
  • 36. Acceptance ● Ideally, an independent group develops test data and tests the code ● Should simulate live environment for good tests ● Ensure the application meets security requirements and specifications
  • 37. Testing and Evaluation Controls ● Test data should include: ● Data at the ends of acceptable ranges ● Data beyond acceptable bounds ● Various data points between acceptable range ● Random data ● Data validations – review data before and after each test to ensure data has not been changed inadvertently ● Bounds checking
  • 38. Testing and Evaluation Controls ● Never use production data ● Sanitize test data ● Test all changes ● Management should be informed and sign off on testing results
  • 39. Transition to Production ● Train new users ● Implement the system ● Installation ● Data conversions (if needed) ● Parallel operations (to reduce disruption)
  • 40. Revisions ● Regular evaluation and audits ● Should incorporate security planning to avoid future problems ● Document failures ● Helps to justify future enhancements
  • 41. Maturity Models ● CMM ● Capability Maturity Model ● Framework to product higher quality software products ● Continual optimization of processes ● ISO 9000?
  • 42. Operation and Maintenance ● Monitor performance of the system ● Detect defects and weaknesses ● Verify changes don't impact existing functionality or circumvent security measures
  • 43. Change Management ● Track changes in software and systems to prevent unintended or unauthorized changes ● Should be a formal cycle with planning, approval, testing, and documentation ● Patch management ● Should include testing and rollback features