To Contact Me

Phone: 07768 113497

Fax: 01473 423491


CISSP Domain 7 : OPERATIONS SECURITY (page 1)

Home Page | Network Penetration Testing | Firewall and VPN Engineering | Network Design | Security Policy | Network Support | Employment / Contract History | CV and References | Personal

.Overview

Operations Security is used to identify the controls over hardware, media,

and the operators with access privileges to any of these resources. Audit

and monitoring is the mechanisms, tools and facilities that permit the

identification of security events and subsequent actions to identify the key

elements and report the pertinent information to the appropriate individual,

group, or process.

The candidate will be expected to know the resources that must be protected,

the privileges that must be restricted, the control mechanisms available, the

potential for abuse of access, the appropriate controls, and the principles of

good practice.

Key Areas of Knowledge

§ Administrative Management

§  Job Requirements/Specifications

§  Background Checking

§  Separation of Duties and Responsibilities

§  Least Privilege

§  Job Rotation

§  Mandatory taking of vacation in one week increments

§  Terminations

§ Concepts

§  Anti-Virus management

§  Backup of Critical information

§  Changes in workstation/location

§  Need-to-Know/Least Privilege

§  Privileged operations functions

§  Standards of Due Care/Due Diligence

§  Privacy and protection

§  Legal requirements

§  Illegal activities (fraud detection, collusion)

§  Record retention

§  Sensitive information and media

§  Marking

§  Handling

§  Storage

§  Destruction

§ Control Types

§  Directive controls

§  Preventive controls

§  Detective controls

§  Corrective controls

§  Recovery controls

§ Operations Controls

§  Resource protection

§  Privileged-entity controls

§  Change Control Management

§  Hardware controls

§  Input/Output controls

§  Media controls

§  Administrative controls (separation of duties and responsibilities,

rotation of duties, least privilege, etc.)

§  Trusted Recovery Process

§ Resource Protection is required for

§  Communications hardware/software

§  Processing equipment

§  Password files

§  Application program libraries

§  Application source code

§  Vendor software

§  Operating system

§  System utilities

§  Directories and address tables

§  Proprietary packages

§  Main storage

§  Sensitive/critical data

§  System logs/audit trails

§  Violation report

§  Backup files

§  Sensitive forms and printouts

§ Auditing

§  Compliance checks

§  Internal and External

§  Frequency of review

§  Standard of Due Care

§ and Reporting                          Contd ….

Click to email me