Domain 1 - Security and Risk Management
DomainDescription
1.1Understand, adhere to, and promote professional ethics (2-4 items)
1.2Understand and apply security concepts
1.3Evaluate, apply, and sustain security governance principles
1.4Understand legal, regulatory, and compliance issues that pertain to information security in a holistic context
1.4.1Cybercrimes and data breaches
1.4.2Licensing and Intellectual Property requirements
1.4.3Import/export controls
1.4.4Transborder data flow
1.4.5Issues related to privacy (e.g., GDPR, California Consumer Privacy Act, Personal Information Protection Law, Protection of Personal Information Act)
1.4.6Contractual, legal, industry standards, and regulatory requirements
1.5Understand requirements for investigation types (i.e., administrative, criminal, civil, regulatory, industry standards)
1.6Develop, document, and implement security policy, standards, procedures, and guidelines
1.7Identify, analyze, assess, prioritize, and implement Business Continuity (BC) requirements
1.7.1Business impact analysis (BIA)
1.7.2External dependencies
1.8Contribute to and enforce personnel security policies and procedures
1.8.1Candidate screening and hiring
1.8.2Employment agreements and policy driven requirements
1.8.3Onboarding, transfers, and termination processes
1.8.4Vendor, consultant, and contractor agreements and controls
1.9Understand and apply risk management concepts
1.9.1Threat and vulnerability identification
1.9.2Risk analysis, assessment, and scope
1.9.3Risk response and treatment (e.g., cybersecurity insurance)
1.9.4Applicable types of controls (e.g., preventive, detection, corrective)
1.9.5Control assessments (e.g., security and privacy)
1.9.6Continuous monitoring and measurement
1.9.7Reporting (e.g., internal, external)
1.9.8Continuous improvement (e.g., risk maturity modeling)
1.9.9Risk frameworks (e.g., ISO, NIST, COBIT, SABSA, PCI)
1.10Understand and apply threat modeling concepts and methodologies
1.11Apply Supply chain risk management (SCRM) concepts
1.11.1Risks associated with the acquisition of products and services from suppliers and providers (e.g., product tampering, counterfeits, implants)
1.11.2Risk mitigations (e.g., third-party assessment and monitoring, minimum security requirements, service level requirements, isolation of root of trust, physically unclonable function, software bill of materials)
1.12Establish and maintain a security awareness, education, and training program
1.12.1Methods and techniques to increase awareness and training (e.g., social engineering, phishing, security champions, gamification)
1.12.2Periodic content reviews to include emerging technologies and trends (e.g., cryptocurrency, AI, blockchain)