DOMAIN 2 : INFORMATION SECURITY CONTROLS &
AUDIT MANAGEMENT
2.1 Security framework
o ISO/IEC 27001/27002
o NIST
Are widely used & preferred by CISOs when it comes to security
framework. Some of the widely known ones which are derived from them
are:
o HITRUST
o ISF
o ITIL
2.1.1 Security controls
2.1.2 Control lifecycle
Controls are assets and needs to be managed based on their lifecycle.
Select
Monitor Validate
Impleme
Catalog
nt
Fig: Control lifecycle management
o SELECT – SELECT the control &
o VALIDATE – to make sure they are adequate
o CATALOG – maintaining an inventory of controls(NIST 800-53)
o IMPLEMENT – IMPLEMENT the controls & then
o MONITOR – to make sure they are effective. As system/threat
landscape changes within the organisation we modify the controls
by adopting a new control or getting rid of ineffective controls.
Control catalogue:
Control catalogs are used to identify the family or category of
controls and the objectives of each control.
Catalogs provides guidance or recommendations for implementing
controls.
Two most widely referred catalogs are:
o ISO 27002
o NIST 800-53
2.1.3 Control Classification
Control classification allows CISOs to select a control for specific purpose.
They serve to protect information & assets or support security tenets:
CIA triad
COSO PDC Defence-in-depth
NIST Security Control Classes They are the baseline of security
control, the
NIST minimum Security Controls minimum controls needs to be
there.
In 2001, NIST 800-26, guide for information Security Program Assessment
and System Reporting Form describes the classes of controls:
o Management
o Operational
o Technical
Fig: NIST classes of controls
Laws, are regulatory requirements mandated by government entities,
they are legally binding and enforceable, often with penalties for non-
compliance :
HIPAA
FISMA
GDPR
Standards, are voluntary guidelines or framework established by industry
organisations:
ISO 2700X family
PCI DSS
SOC2
NIST
ISO family of standards
PCI-DSS
NIST Publication
2.2 Audit Management
Audits are designed to :
Confirm that Information technology is adequately safeguarded to
prevent compromise or interruption affecting an organisation’s
finances and reputation.
Highlights violation of legal and regulatory requirements
The most frequently used and referenced IS audit practice are:
ISO/IEC
NIST
COBIT
There are two types of audits:
Internal audit – Focuses on financial controls, It will have one or
several employees who have experience in information technology
and information security controls.
External audit – Focuses on verifying financial statements and risk
to the organisation and is typically performed by third parties or
regulatory agencies.
Fig: Internal vs External Audit function comparison chart
2.2.1 Audit process
Planning
o Review previous audits.
o Research area of planned audits.
o Schedule audit
o Request documentation.
o Hold pre-audit meeting.
Fieldwork
o Interview Staff
o Review proof of design
o Test design effectiveness.
o Analyse controls compared to standards and practices.
o Identify strengths & weaknesses.
Reporting
o Compile evidence & results.
o Discuss results with auditee.
o Request remediation action plans.
o Create reports for senior management & audit committee.
Follow-up
o Monitor remediation action plan progress.
o Validate remediation actions.
Audit approaches:
Compliance-based Audit (CBA) – whether an organisation
complies with policies, regulation, standards & legal statutes.
Risk-based Audit (RBA) – Focuses on the identification & analysis
of Risk in comparison to how an organisation manages and
mitigates that risk.
Domain 2: Summary
CISO should use IS control catalog when creating their controls list.
Regular audits are necessary to assure security controls are
performing their intended purpose.
Audit exists to evaluate the control compliance & effectiveness.
Auditing can determine a measurement of the level of conformity to
a requirement.
DOMAIN 3: SECURITY PROGRAM MANAGEMENT AND
OPERATION
As a CISO of a portfolio or a program you will need to:
Identify the program requirement to ensure continuously supported
security services and operation.
Identify key stakeholders and Influencers to help establish program
support.
Specify the objectives you wish to accomplish and when they will be
completed.
Define program charter to set the focus and goals of the
organisation.
SECURITY PROGRAM CHARTER
Resource – the personnel who will support, staff, and lead the IS
program.
Guidance – influences that guides the design of the IS program.
Objectives – Planning documents that will shape the foundation of
the IS program.
Constraints – factors that could inhibit program progress and
delivery of services.
SECURITY PROGRAM REQUIREMENTS
Identify assets requiring protection.
Inventory legal, regulatory, & compliance requirements.
Define the attack surface.
Determine the profiles.
Complete Business Impact Analysis (BIA)
3 BASIC APPROACHES TO DEVELOPING STRATEGIC PLAN:
Critical assets: this is the traditional approach that is based on protecting
the most critical assets(crown jewel) of the organisations.
Playbook: this sports-like approach is usually preferred by the organisation
with substantial resources and funding. It executes an Information
security program based on a published playbook.
Attack surface: this approach focuses on identifying and defending against
threat that could successfully breach the organisation.