Domain 6 Flashcards
Information Security Assesment
Information Security Assesment is the process of determinig how effectively the entity being evaluated meets specific security criteria (assirance).
Examination
Examination (E) is the process of interviewing, reviewing, inspecting, studying, and observing to facilitite understaing comparing to standards or baselines, or to obtain evidence.
Examinations are used to determine if the assessment object is properly documented and to gain operational insight regarding effectiveness, suitability and survivability.
Examination properties
- Examination generally focus the policies, standards, baselines, procedures, plans, programs, configuration, settings, output, and reports.
- Examinations are considered a passive activity with minimal (if any) anticipated operational impact.
Testing
Testing is used to identify vulnerabilities (weakness), substantiate strentghs, and predict the likelihood of exploitation.
- Testing techniques may include vulnerability assessments, penetration testing, password cracking, and social engineering as well as incident response and disaster response/business continuity exercises.
- Testing can be intrusive and can have an opeational impact.
Rules of Engagement (ROE)
Rules of Engagement (ROE) document details the parameters and expected assesor conduct of the assessment (exam-test).
Rules of Engagement (ROE) Components
ROE components include:
- Scope
- Level of expertise / methodology
- Data Handling requirements
- Reporting expectations
- Assesor responsabilities.
- Legal Considerations.
Rules of Engagement (ROE) Component: Scope
Seleccion of assesment objects are influenced by system criticality, information sensitivity, regulatory requirements, and contractual obligations.
- Size of the system being assesed.
- Complexity of the environment.
- Feasibility of sampling.
Rules of Engagement (ROE) Component: Sampling
Sampling is used to infer characteristics about a population based upon the characteristics of a sample.
- Evidence sampling is applying a procedure to less than 100% of the population.
- Sampling risk is where the assessor’s conclusion is based on a sample that might be different if they examined or tested the entire population.
Sampling Techniques.
- Statistical Sampling
- Non-statistical Sampling
- Block Sampling
Statistical Sampling
A objective method for determining sample size and selection criteria.
- Each item should have a equal probability of selection.
Non-statistical Sampling
A subjective method of determinig which items are the most materail, relevant and/or risky.
- Included items are based on professional judgement.
Block Sampling
All Items in a selected time period, numerical sequence, or alphabetical sequence.
Rules of Engagement (ROE) Component: Logistics
Logisitcal considerations include location, timing, and notification.
Rules of Engagement (ROE) Component: Assesor Challanges
Security assessor ofter face technical, operational, and political challanges.
- Resistance from business owners, system, and network administrators, and end users.
- Re-assessment fixes.
- In-the- moment mitigation.
- Restricted time windows.
- Evolving Technology.
- Teisk of operational impact.
Rules of Engagement (ROE) Component: Legal Considerations
Legal conderations include authorization, liability, indemnification, nondisclosure, and privacy.