Chapter 2_summary
Chapter 2_summary
Domain Summary
This domain focused mainly on the availability part of the CIA triad and the importance of
distinct plans that are vital to the survival of any organization facing out of the ordinary
operating conditions. Here are the primary things to remember from this domain:
First, the Incident Response plan responds to abnormal operating conditions to keep the
business operating. The four main components of Incident Response are: Preparation;
Detection and Analysis; Containment, Eradication and Recovery; and Post-Incident Activity.
Incident Response teams are typically a cross-functional group of individuals who represent the
management, technical and functional areas of responsibility most directly impacted by a
security incident. The team is trained on incident response and the organization’s incident
response plan. When an incident occurs, the team is responsible for determining the amount
and scope of damage and whether any confidential information was compromised,
implementing recovery procedures to restore security and recover from incident-related
damage, and supervising implementation of future measures to improve
security and prevent recurrence of the incident.
Second, the Business Continuity plan is designed to keep the organization operating through
the crisis. Components of the Business Continuity plan include details about how and when
to enact the plan and notification systems and call trees for alerting the team members and
organizational associates that the plan has been enacted. In addition, it includes contact
numbers for contacting critical third-party partners, external emergency providers, vendors
and customers. The plan provides the team with immediate response procedures and
Finally, if both the Incident Response and Business Continuity plans fail, the Disaster
Recovery plan is activated to return operations to normal as quickly as possible. The Disaster
Recovery plan may include the following components: executive summary providing a high-
level overview of the plan, department-specific plans, technical guides for IT personnel
responsible for implementing and maintaining critical backup systems, full copies of the plan
for critical disaster recovery team members, and checklists for certain individuals.
• Breach
• Event
• Exploit
• Incident
• Intrusion
• Threat
• Vulnerability
• Zero Day
• Preparation
• Leveraged
• Dedicated
• Hybrid
• List of the BCP team members, including multiple contact methods and backup
members
• Immediate response procedures and checklists (security and safety procedures, fire
• Contact numbers for critical members of the supply chain (vendors, customers,
• Contact numbers for critical members of the supply chain (vendors, customers,
2. Department-specific plans
3. Technical guides for IT personnel responsible for implementing and maintaining critical
backup systems
4. Full copies of the plan for critical disaster recovery team members