Management of Threat and Vulnerability
Software and Systems Security
Security Operations and Monitoring
Compliance & Assessment
This blog will focus on the fifth domain of CySA+, Compliance and Assessments.
Three important concepts will be explained in this domain:
Data privacy and protection are vital.
Security concepts to support organizations’ risk mitigation
Critical are policies, frameworks, procedures, controls.
1. Data privacy and protection are important in any organization. There are many pieces of information such as customer data, loyalty programs, transactions, employee records, and data collection that must be protected from unauthorized access. It is important to protect sensitive data as it could contain information about your current staff members, business partners, clients, shareholders, and other stakeholders.
Online users need to be confident that their data is being protected. Data protection practices are used by organizations to show their customers and users that their data can be trusted.
This concept will teach you:
Privacy vs. security: Security and privacy are interrelated. Privacy refers to the control you have over personal information and how it’s used. Consider the privacy terms you will need to agree to when downloading new smartphone apps. Security, on the other hand, refers to how your personal data is protected, such as your data and other facts.
Technical controls: Technical controls employ a variety technologies to reduce vulnerabilities. Firewalls, encryption, IDSs and the principle of least privilege are just a few examples of technical controls.
Non-technical control: These controls are not technical. They include things like procedures, administrative policies and standards for the full range information security, including privacy domains, and assigned responsibilities.
2. Security concepts to support organizations’ risk mitigation
Process of risk identification: This is the process of identifying which risks could harm the project. This process has two main advantages: it documents current risks and provides information to the project team and the ability to predict future events.
Risk prioritization: This is the process of prioritizing which risks to take action on first. This should be based upon the risk of a particular outcome and the likelihood that it will occur. To prioritize risk, you might assess the company’s risks and determine which ones are most likely to occur. A risk prioritization matrix may be used for evaluation.
Business impact analysis: A business analysis (BIA), is a process that identifies the criticality of company activities, and the resources needed to maintain operational resilience and continuity during and after a business disruption.
Training and exercises: This section will teach you about:
Red team: A “red” team is a group that pretends it is an enemy or rival and provides security input from this vantage point. Red teams can be found in many sectors, including security at airports, intelligence agencies, and cybersecurity.
Blue team: A blue group is a group that analyzes information systems to ensure security, uncover security gaps, test the efficacy and ensure that security measures remain effective after installation.
The White team: This team oversees and assesses the cyber defense competition. They also document the ratings of the Blue Teams on usability, security, and supply by the Green and Red Teams. The White Team also examines