All 5 Domains

Cornell Notes — Security+ SY0-701

Interactive drill-down study tool using the Cornell method. Click domains to expand, then objectives, then individual terms to reveal definitions. Use the speaker icon to hear definitions read aloud.

5 Domains
28 Objectives
345+ Terms
Source Lecture Anél Henning — Security+ Chapter 1 (Sped Up)

Exam Weight Breakdown

D1: General Security Concepts
12%
D2: Threats, Vulnerabilities, and Mitigations
22%
D3: Security Architecture
18%
D4: Security Operations
28%
D5: Security Program Management and Oversight
20%
🛡️
Domain 1
General Security Concepts
12%
1.1 Compare and contrast various types of security controls
Categories
Technical

Hardware, software, firmware controls (firewalls, encryption, AV, IDS)

Managerial

Policies, procedures, risk assessment frameworks, governance documents

Operational

Day-to-day processes run by people (monitoring, training, patching, incident response)

Physical

Barriers, locks, cameras, guards, environmental controls, bollards, fencing

Control Types
Preventive

Stops the threat before it happens (e.g., firewall rules, encryption, access controls)

Deterrent

Discourages the threat actor (e.g., security signage, warning banners, security cameras)

Detective

Identifies that a threat is occurring or has occurred (e.g., IDS, logs, security audits)

Corrective

Fixes the issue after detection (e.g., patching, restoring from backup, reimaging)

Compensating

Alternative control when primary isn't feasible (e.g., extra monitoring when MFA unavailable)

Directive

Mandates specific behavior or actions (e.g., policies, acceptable-use agreements, training requirements)

1.2 Summarize fundamental security concepts
CIA Triad
Confidentiality

Only authorized persons can access the data; enforced via encryption, access controls, data classification

Integrity

Data hasn't been tampered with or altered; enforced via hashing, checksums, digital signatures

Availability

Systems and data are accessible when needed; enforced via redundancy, backups, failover, load balancing

Core Concepts
Non-repudiation

Ensures an action cannot be denied by the party who performed it; implemented via digital signatures, audit logs, timestamps

AAA (Authentication, Authorization, Accounting)
Authenticating people

Verifying identity via passwords, biometrics, tokens, certificates

Authenticating systems

Machine certificates, API keys, mutual TLS

Authorization models

RBAC, DAC, MAC, ABAC; determines what authenticated entities can do

Other Concepts
Gap analysis

Assesses the difference between current security posture and desired state; identifies missing or weak controls, drives remediation

Zero Trust
Control Plane

Adaptive identity, Threat scope reduction, Policy-driven access control, Policy Administrator, Policy Engine

Data Plane

Implicit trust zones, Subject/System, Policy Enforcement Point

Physical Security
Physical security controls

Bollards, Access control vestibule, Fencing, Video surveillance, Security guard, Access badge, Lighting, Sensors (Infrared, Pressure, Microwave, Ultrasonic)

Deception and Disruption Technology
Honeypot

Fake system to attract attackers

Honeynet

Network of honeypots

Honeyfile

Fake file to detect unauthorized access

Honeytoken

Fake data/credentials to detect misuse

1.3 Explain the importance of change management processes and the impact to security
Business Processes Impacting Security
Business processes

Approval process, Ownership, Stakeholders, Impact analysis, Test results, Backout plan, Maintenance window, Standard operating procedure

Technical Implications
Technical implications

Allow lists/deny lists, Restricted activities, Downtime, Service restart, Application restart, Legacy applications, Dependencies

Documentation & Version Control
Documentation

Updating diagrams, Updating policies/procedures

Version control

Tracking changes to configurations, code, and documents

1.4 Explain the importance of using appropriate cryptographic solutions
PKI (Public Key Infrastructure)
PKI

Public key, Private key, Key escrow

Encryption
Encryption levels

Full-disk, Partition, File, Volume, Database, Record

Transport/communication encryption

Securing data in transit between systems

Asymmetric encryption

Uses key pairs (public/private); RSA, ECC; slower but enables key exchange

Symmetric encryption

Single shared key; AES, DES; faster for bulk data

Key exchange

Diffie-Hellman, ECDHE

Algorithms

AES-256, RSA, ECC, ChaCha20

Key length

Longer keys = stronger encryption; AES-256, RSA-2048+

Cryptographic Tools
TPM

Trusted Platform Module — hardware-based cryptographic processor

HSM

Hardware Security Module — dedicated hardware for key management

Key management system

Centralized system for managing cryptographic keys

Secure enclave

Isolated hardware environment for sensitive operations

Obfuscation
Steganography

Hiding data in images/audio

Tokenization

Replacing sensitive data with tokens

Data masking

Showing partial data like ****-1234

Hashing & Signatures
Hashing

One-way function producing fixed-length digest; SHA-256, SHA-3; verifies integrity

Salting

Adding random data to input before hashing; prevents rainbow table attacks

Digital signatures

Proves authenticity and integrity; uses sender's private key to sign, public key to verify

Key stretching

Making weak passwords stronger via PBKDF2, bcrypt; adds computational cost

Blockchain & Certificates
Blockchain

Distributed, immutable ledger; each block contains hash of previous block

Open public ledger

Transparent record of all transactions visible to participants

Certificates

Certificate authorities (CA), Certificate revocation lists (CRL), OCSP, Self-signed, Third-party, Root of trust, CSR generation, Wildcard certificates

⚠️
Domain 2
Threats, Vulnerabilities, and Mitigations
22%
2.1 Compare and contrast common threat actors and motivations
Threat Actors
Nation-state

Government-sponsored; highly funded, advanced persistent threats (APTs)

Unskilled attacker

Script kiddies; use pre-built tools without deep understanding

Hacktivist

Motivated by political/social causes; website defacement, DDoS

Insider threat

Employees, contractors with legitimate access; can be intentional or accidental

Organized crime

Financial motivation; ransomware, fraud, data theft at scale

Shadow IT

Unauthorized technology use within organization; creates unknown attack surface

Attributes & Motivations
Attributes of actors

Internal/external, Resources/funding, Level of sophistication/capability

Motivations

Data exfiltration, Espionage, Service disruption, Blackmail, Financial gain, Philosophical/political beliefs, Ethical (white hat), Revenge, Disruption/chaos, War

2.2 Explain common threat vectors and attack surfaces
Message & Media-based Vectors
Message-based

Email phishing, SMS (smishing), Instant messaging (IM)

Image-based

Malicious code embedded in image files; steganography exploits

File-based

Infected documents, PDFs, executables; macro-enabled Office files

Voice call

Vishing (voice phishing); social engineering via phone calls

Removable device

USB drives with malware; rubber ducky attacks; autorun exploits

System & Network Vectors
Vulnerable software

Client-based vs. agentless; unpatched applications

Unsupported systems

End-of-life software with no security patches

Unsecure networks

Wireless (rogue APs, evil twin), Wired (physical tap), Bluetooth (bluejacking, bluesnarfing)

Open service ports

Unnecessary open ports increase attack surface; port scanning reconnaissance

Default credentials

Factory-default usernames/passwords left unchanged on devices

Supply chain

MSPs, Vendors, Suppliers; compromised updates or hardware

Human Vectors / Social Engineering
Social engineering

Phishing, Vishing, Smishing, Misinformation/disinformation, Impersonation, Business email compromise (BEC), Pretexting, Watering hole, Brand impersonation, Typosquatting

2.3 Explain various types of vulnerabilities
Application & OS Vulnerabilities
Application vulnerabilities

Memory injection, Buffer overflow, Race conditions (TOC/TOU), Malicious update

OS-based vulnerabilities

Unpatched OS, privilege escalation flaws, kernel vulnerabilities

Web-based vulnerabilities

SQL injection (SQLi), Cross-site scripting (XSS)

Hardware & Platform Vulnerabilities
Hardware vulnerabilities

Firmware vulnerabilities, End-of-life hardware, Legacy systems

Virtualization

VM escape (breaking out of guest to host), Resource reuse

Cloud-specific

Misconfigured storage buckets, shared responsibility model gaps, insecure APIs

Other Vulnerability Types
Supply chain

Service provider, Hardware provider, Software provider vulnerabilities

Cryptographic

Weak algorithms, short key lengths, improper implementation

Misconfiguration

Default settings, open permissions, unnecessary services enabled

Mobile device

Side loading (installing apps outside store), Jailbreaking (removing OS restrictions)

Zero-day

Unknown vulnerability with no available patch; highest risk

2.4 Given a scenario, analyze indicators of malicious activity
Malware Attacks
Ransomware

Encrypts files for ransom payment

Trojan

Disguised as legitimate software

Worm

Self-replicating malware that spreads without user interaction

Spyware

Monitors user activity and collects data

Bloatware

Unwanted pre-installed software

Virus

Requires host file to execute and spread

Keylogger

Captures keystrokes to steal credentials

Logic bomb

Triggers malicious action on a specific condition or date

Rootkit

Hides deep in OS to maintain persistent, undetected access

Physical & Network Attacks
Physical attacks

Brute force (physical entry), RFID cloning, Environmental (power, flood, fire)

DDoS

Amplified, Reflected distributed denial-of-service attacks

DNS attacks

Poisoning, hijacking DNS records

On-path attack

Man-in-the-middle; intercepting communications between two parties

Credential replay

Reusing captured authentication tokens or credentials

Malicious code injection

Inserting unauthorized code into network traffic

Application & Cryptographic Attacks
Injection attacks

SQL, command, LDAP injection to manipulate applications

Buffer overflow

Overwriting memory to execute arbitrary code

Replay attack

Reusing captured data to impersonate a legitimate user

Privilege escalation

Gaining higher access than authorized

Forgery (CSRF)

Cross-site request forgery; tricking users into executing unwanted actions

Directory traversal

Accessing files outside intended directory structure

Downgrade attack

Forcing use of weaker, vulnerable protocols

Collision attack

Finding two inputs that produce the same hash

Birthday attack

Probability-based collision attack on hash functions

Password Attacks & Indicators
Password spraying

Trying common passwords across many accounts

Brute force

Systematically trying all possible password combinations

Indicators of malicious activity

Account lockout, Concurrent session usage, Blocked content, Impossible travel, Resource consumption, Resource inaccessibility, Out-of-cycle logging, Published/documented vulnerabilities, Missing logs

2.5 Explain the purpose of mitigation techniques used to secure the enterprise
Network & Access Mitigation
Segmentation

Dividing network into zones; limits lateral movement; VLANs, microsegmentation

Access control

ACLs, Permissions; restricting who can access what resources

Application allow list

Only approved software can execute; blocks unauthorized applications

Isolation

Separating compromised or sensitive systems from the network

Operational Mitigation
Patching

Applying updates to fix known vulnerabilities; regular patch management cycle

Encryption

Protecting data confidentiality at rest, in transit, and in use

Monitoring

Continuous observation of network/system activity for anomalies

Least privilege

Users get minimum access needed for their role; reduces blast radius

Configuration enforcement

Ensuring systems maintain approved security configurations

Decommissioning

Properly retiring outdated systems; secure data destruction

Hardening Techniques
Hardening techniques

Encryption, Endpoint protection installation, Host-based firewall, HIPS, Disabling ports/protocols, Default password changes, Removal of unnecessary software

🏗️
Domain 3
Security Architecture
18%
3.1 Compare and contrast security implications of different architecture models
Cloud & Modern Infrastructure
Cloud

Responsibility matrix, Hybrid considerations, Third-party vendors

Infrastructure as Code (IaC)

Automated, version-controlled infrastructure deployment

Serverless

No server management; event-driven functions; shared responsibility shifts

Microservices

Small, independent services communicating via APIs; increases attack surface per service

Network & Physical Infrastructure
Network infrastructure

Physical isolation (Air-gapped), Logical segmentation, SDN (Software-defined networking)

On-premises

Full control but full responsibility for security

Centralized vs. decentralized

Trade-offs in control, resilience, and management

Virtualization & Containers
Containerization

Lightweight isolated environments; Docker, Kubernetes; container escape risks

Virtualization

Multiple OS on one physical host; hypervisor security critical

Specialized Systems
IoT

Internet of Things; limited security features, large attack surface, hard to patch

ICS/SCADA

Industrial control systems; critical infrastructure; air-gapping essential

RTOS

Real-time operating system; embedded, time-critical; limited security options

Embedded systems

Purpose-built hardware; firmware-based; difficult to update

High availability

Redundancy, failover, clustering for continuous operation

Architecture Considerations
Considerations

Availability, Resilience, Cost, Responsiveness, Scalability, Ease of deployment, Risk transference, Ease of recovery, Patch availability, Inability to patch, Power, Compute

3.2 Given a scenario, apply security principles to secure enterprise infrastructure
Infrastructure Considerations
Device placement

Strategic positioning of security devices in the network

Security zones

DMZ, internal, external; segmented trust boundaries

Attack surface

Total exposure points; minimize by removing unnecessary services

Connectivity

Wired, wireless, VPN; each has different security implications

Failure modes

Fail-open (allows traffic when device fails), Fail-closed (blocks traffic when device fails)

Device attributes

Active vs. passive, Inline vs. tap/monitor

Network Appliances
Jump server

Secure admin access point; hardened intermediary for managing critical systems

Proxy server

Intermediary between clients and servers; content filtering, caching

IPS/IDS

Intrusion Prevention/Detection System; monitors and blocks threats

Load balancer

Distributes traffic across multiple servers for availability

Sensors

Network monitoring devices for traffic analysis and threat detection

Port Security & Firewalls
Port security

802.1X (port-based network access control), EAP (Extensible Authentication Protocol)

WAF

Web Application Firewall; protects web apps from common attacks

UTM

Unified Threat Management; all-in-one security appliance

NGFW

Next-Generation Firewall; deep packet inspection, application awareness

Layer 4 / Layer 7

Transport vs. application layer firewall filtering

Secure Communication
VPN

Virtual Private Network; encrypted tunnel for remote access

Tunneling

TLS, IPSec; encapsulating data for secure transmission

SD-WAN

Software-Defined Wide Area Network; intelligent traffic routing

SASE

Secure Access Service Edge; cloud-delivered security and networking

3.3 Compare and contrast concepts and strategies to protect data
Data Types
Data types

Regulated, Trade secret, Intellectual property, Legal information, Financial information, Human- and non-human-readable

Data Classifications
Data classifications

Sensitive, Confidential, Public, Restricted, Private, Critical

Data Considerations
Data states

Data at rest, Data in transit, Data in use

Data sovereignty

Laws requiring data to stay in specific jurisdictions (GDPR)

Geolocation

Physical location of data storage affects legal requirements

Methods to Secure Data
Methods to secure data

Geographic restrictions, Encryption, Hashing, Masking, Tokenization, Obfuscation, Segmentation, Permission restrictions

3.4 Explain the importance of resilience and recovery in security architecture
High Availability & Sites
High availability

Load balancing vs. clustering for continuous operation

Hot site

Fully operational backup facility; fastest recovery

Cold site

Basic facilities only; slowest, cheapest recovery option

Warm site

Partial equipment ready; moderate recovery time and cost

Geographic dispersion

Spreading infrastructure across locations to avoid single-region disasters

Resilience Strategies
Platform diversity

Using different OS/vendors to prevent single-point failures

Multi-cloud systems

Distributing across cloud providers for resilience

Continuity of operations

Maintaining essential functions during disruption

Capacity planning

Planning for People, Technology, Infrastructure needs

Testing & Backups
Testing

Tabletop exercises, Fail over testing, Simulation, Parallel processing

Backups

Onsite/offsite, Frequency, Encryption, Snapshots, Recovery, Replication, Journaling

Power

Generators, UPS (Uninterruptible Power Supply)

⚙️
Domain 4
Security Operations
28%
4.1 Given a scenario, apply common security techniques to computing resources
Secure Baselines
Secure baselines

Establish (define standard configs), Deploy (push to systems), Maintain (audit/update regularly)

Hardening Targets
Hardening targets

Mobile devices, Workstations, Switches, Routers, Cloud infrastructure, Servers, ICS/SCADA, Embedded systems, RTOS, IoT devices

Wireless & Mobile
Wireless devices

Installation considerations: Site surveys, Heat maps

Mobile solutions

MDM (Mobile Device Management), Deployment models (BYOD, COPE, CYOD), Connection methods (Cellular, Wi-Fi, Bluetooth)

Wireless security settings

WPA3, AAA/RADIUS, Cryptographic protocols, Authentication protocols

Application Security
Application security

Input validation, Secure cookies, Static code analysis, Code signing

Sandboxing

Running untrusted code in isolated environment for analysis

Monitoring

Continuous observation of system behavior and network traffic

4.2 Explain the security implications of proper hardware, software, and data asset management
Asset Management Lifecycle
Acquisition/procurement

Security evaluation before purchasing

Assignment/accounting

Ownership, Classification of assets

Monitoring/asset tracking

Inventory management, Enumeration of all assets

Disposal/decommissioning

Sanitization (wiping), Destruction (physical), Certification, Data retention policies

4.3 Explain various activities associated with vulnerability management
Identification Methods
Vulnerability scan

Automated scanning for known vulnerabilities

Application security testing

Static analysis (SAST), Dynamic analysis (DAST), Package monitoring

Threat feeds

OSINT, Proprietary, Info-sharing organizations, Dark web intelligence

Penetration testing

Simulated attacks to find exploitable vulnerabilities

Responsible disclosure / Bug bounty

Programs for reporting vulnerabilities ethically

System/process audit

Review of systems and procedures for security gaps

Analysis
Confirmation

Validating findings; identifying false positives and false negatives

Prioritization

Ranking vulnerabilities by severity and business impact

CVSS

Common Vulnerability Scoring System; standardized severity rating

CVE

Common Vulnerabilities and Exposures; unique vulnerability identifiers

Exposure factor

Percentage of asset loss if vulnerability is exploited

Response & Remediation
Patching

Applying fixes to resolve identified vulnerabilities

Insurance

Transferring risk through cyber insurance policies

Segmentation

Isolating vulnerable systems to limit exposure

Compensating controls

Alternative protections when primary fix isn't possible

Exceptions and exemptions

Documented acceptance of unresolved vulnerabilities

Validation & Reporting
Validation of remediation

Rescanning, Audit, Verification of applied fixes

Reporting

Documenting findings, trends, and remediation status

4.4 Explain security alerting and monitoring concepts and tools
Monitoring Resources
Monitoring computing resources

Systems, Applications, Infrastructure

Activities
Log aggregation

Collecting logs from multiple sources into central repository

Alerting

Automated notifications when thresholds or rules are triggered

Scanning

Regular automated assessment of systems for vulnerabilities

Reporting

Generating summaries of security status and incidents

Archiving

Long-term storage of logs and security data for compliance

Alert response/remediation

Quarantine and Alert tuning to reduce noise

Tools
SCAP

Security Content Automation Protocol; automated compliance checking

Benchmarks

Standard security configuration baselines (CIS, DISA STIGs)

SIEM

Security Information and Event Management; correlates and analyzes security events

Antivirus

Detects and removes known malware via signatures and heuristics

DLP

Data Loss Prevention; prevents unauthorized data exfiltration

SNMP traps

Network device alerts sent to management station

NetFlow

Network traffic flow data for analysis and monitoring

Vulnerability scanners

Tools that identify known vulnerabilities in systems

4.5 Given a scenario, modify enterprise capabilities to enhance security
Firewall & IDS/IPS
Firewall

Rules, Access lists, Ports/protocols, Screened subnets

IDS/IPS

Trends analysis, Signature-based detection

Web & Content Filtering
Web filter

Agent-based, Centralized proxy, URL scanning, Content categorization, Block rules, Reputation

DNS filtering

Blocking malicious domains at DNS resolution level

System & Protocol Security
Operating system security

Group Policy, SELinux for mandatory access control

Secure protocols

Protocol selection, Port selection, Transport method

Email & Data Security
Email security

DMARC, DKIM, SPF authentication; Email gateway filtering

File integrity monitoring

Detecting unauthorized changes to critical files

DLP

Data Loss Prevention; preventing unauthorized data exfiltration

Endpoint & Behavior
NAC

Network Access Control; controlling device access to network based on compliance

EDR/XDR

Endpoint/Extended Detection and Response; advanced threat detection and automated response

User behavior analytics

Detecting anomalous user activity patterns using AI/ML

4.6 Given a scenario, implement and maintain identity and access management
Account Management
Provisioning/de-provisioning

Creating and removing user accounts and access rights

Permission assignments

Role-based permissions following least privilege principle

Identity proofing

Verifying a person's identity before granting access

Federation & SSO
Federation

Sharing identity information across organizations

SSO

Single Sign-On; LDAP, OAuth, SAML for unified authentication

Interoperability

Different IAM systems working together seamlessly

Attestation

Formal verification of identity claims

Access Control Models
MAC

Mandatory Access Control; system-enforced access based on labels

DAC

Discretionary Access Control; owner-controlled permissions

RBAC

Role-Based Access Control; permissions based on job role

ABAC

Attribute-Based Access Control; dynamic policies based on attributes

Rule-based

Access decisions based on predefined rules

Time-of-day restrictions

Limiting access to specific hours

Least privilege

Minimum access needed for job function

Multifactor Authentication
MFA implementations

Biometrics, Hard/soft tokens, Security keys (FIDO2)

MFA factors

Something you know, Something you have, Something you are, Somewhere you are

Password & Privileged Access
Password best practices

Length, Complexity, Reuse prevention, Expiration, Age policies

Password managers

Secure storage and generation of unique passwords

Passwordless authentication

FIDO2, biometrics, magic links; eliminating password-based risk

Just-in-time permissions

Granting elevated access only when needed, automatically revoked

Password vaulting

Secure storage for privileged account credentials

Ephemeral credentials

Temporary credentials that expire after use

4.7 Explain the importance of automation and orchestration related to secure operations
Use Cases
Use cases of automation

User provisioning, Resource provisioning, Guard rails, Security groups, Ticket creation, Escalation, Enabling/disabling services, CI/CD, Integrations and APIs

Benefits
Benefits

Efficiency/time saving, Enforcing baselines, Standard configurations, Secure scaling, Employee retention, Reaction time, Workforce multiplier

Considerations
Considerations

Complexity, Cost, Single point of failure, Technical debt, Ongoing supportability

4.8 Explain appropriate incident response activities
Incident Response Process
IR Process

Preparation, Detection, Analysis, Containment, Eradication, Recovery, Lessons learned

Training

Regular incident response training for all staff

Testing

Tabletop exercise, Simulation for response readiness

Root cause analysis

Determining the fundamental cause of an incident

Threat hunting

Proactively searching for threats before detection alerts

Digital Forensics
Digital forensics

Legal hold, Chain of custody, Acquisition, Reporting, Preservation, E-discovery

4.9 Given a scenario, use data sources to support an investigation
Log Data
Firewall logs

Records of allowed and blocked network traffic

Application logs

Records of application events, errors, and transactions

Endpoint logs

Device-level activity and security events

OS security logs

Operating system authentication and authorization events

IPS/IDS logs

Intrusion detection and prevention alert records

Network logs

Network traffic, connection, and flow records

Metadata

Contextual information about data (timestamps, users, locations)

Data Sources
Vulnerability scans

Results from automated vulnerability assessments

Automated reports

Scheduled security status and compliance reports

Dashboards

Real-time visual displays of security metrics

Packet captures

Full network traffic recordings for deep analysis

📋
Domain 5
Security Program Management and Oversight
20%
5.1 Summarize elements of effective security governance
Governance Documents
Guidelines

Recommended practices; flexible, not mandatory

Policies

AUP (Acceptable Use Policy), Information security policies, Business continuity, Disaster recovery, Incident response, SDLC, Change management

Standards

Password standards, Access control standards, Physical security standards, Encryption standards

Procedures

Change management procedures, Onboarding/offboarding, Playbooks

External & Monitoring
External considerations

Regulatory, Legal, Industry, Local/regional, National, Global requirements

Monitoring and revision

Regular review and update of governance documents

Governance Structures & Roles
Governance structures

Boards, Committees, Government entities, Centralized/decentralized

Roles and responsibilities

Owners, Controllers, Processors, Custodians/stewards

5.2 Explain elements of the risk management process
Risk Identification & Assessment
Risk identification

Finding and documenting potential risks to the organization

Risk assessment

Ad hoc, Recurring, One-time, Continuous assessments

Risk Analysis
Qualitative analysis

High/Medium/Low categorization of risk likelihood and impact

Quantitative analysis

SLE (Single Loss Expectancy), ALE (Annual Loss Expectancy), ARO (Annualized Rate of Occurrence)

Risk register

Key risk indicators, Risk owners, Risk threshold documentation

Risk tolerance

Amount of risk an organization is willing to accept

Risk appetite

Expansionary (high risk), Conservative (low risk), Neutral stance

Risk Strategies & BIA
Transfer

Shifting risk to another party (e.g., insurance)

Accept

Acknowledging risk; Exemption, Exception

Avoid

Eliminating the risk source entirely

Mitigate

Reducing likelihood or impact of the risk

Risk reporting

Communicating risk status to stakeholders

RTO

Recovery Time Objective — maximum acceptable downtime

RPO

Recovery Point Objective — maximum acceptable data loss in time

MTTR

Mean Time to Repair — average time to fix a failure

MTBF

Mean Time Between Failures — average time between system failures

5.3 Explain the processes associated with third-party risk assessment and management
Vendor Assessment
Vendor assessment

Penetration testing, Right-to-audit clause, Evidence of internal audits, Independent assessments, Supply chain analysis

Vendor selection

Due diligence, Conflict of interest evaluation

Agreement Types
SLA

Service Level Agreement — defines expected service performance

MOA / MOU

Memorandum of Agreement/Understanding — outlines mutual intentions

MSA

Master Service Agreement — overarching contract terms

WO / SOW

Work Order / Statement of Work — specific project deliverables

NDA

Non-Disclosure Agreement — protects confidential information

BPA

Business Partners Agreement — defines partner responsibilities

Vendor Monitoring
Vendor monitoring

Ongoing assessment of vendor security posture

Questionnaires

Security questionnaires for vendor evaluation

Rules of engagement

Defining boundaries for vendor interactions

5.4 Summarize elements of effective security compliance
Compliance Reporting & Consequences
Compliance reporting

Internal and External reporting of compliance status

Consequences of non-compliance

Fines, Sanctions, Reputational damage, Loss of license, Contractual impacts

Compliance Monitoring
Due diligence/care

Ongoing obligation to maintain reasonable security practices

Attestation/acknowledgement

Formal confirmation of compliance with policies

Internal/external monitoring

Ongoing checks from within and outside the organization

Automation

Using tools to continuously monitor compliance status

Privacy
Privacy legal implications

Local/regional, National, Global privacy laws

Data subject

Individual whose personal data is being processed

Controller vs. processor

Data controller determines purpose; processor handles data on behalf

Ownership

Who owns and is responsible for the data

Data inventory/retention

Cataloging data assets and defining how long data is kept

Right to be forgotten

Individual's right to have personal data deleted (GDPR Art. 17)

5.5 Explain types and purposes of audits and assessments
Audit Types
Attestation

Formal verification and certification of compliance

Internal audits

Compliance audits, Audit committee, Self-assessments

External audits

Regulatory examinations, Assessment, Independent third-party audit

Penetration Testing
Physical penetration testing

Testing physical security controls and access

Offensive testing

Red team; simulating real-world attacks

Defensive testing

Blue team; testing detection and response capabilities

Integrated testing

Purple team; combining offensive and defensive approaches

Known environment

Tester has full knowledge of the target (white box)

Partially known environment

Tester has limited knowledge (gray box)

Unknown environment

Tester has no prior knowledge (black box)

Reconnaissance

Passive (no direct contact) and Active (direct interaction) information gathering

5.6 Given a scenario, implement security awareness practices
Phishing Awareness
Phishing campaigns

Simulated phishing exercises to test employee awareness

Recognizing phishing

Identifying suspicious emails, links, and attachments

Responding to phishing

Reporting suspicious messages through proper channels

Behavior Recognition
Anomalous behavior

Risky behavior, Unexpected behavior, Unintentional behavior recognition

User Guidance & Training
Policy/handbooks

Documentation of security policies for all employees

Situational awareness

Being alert to security threats in daily activities

Insider threat awareness

Recognizing signs of insider threats

Password management

Training on strong password practices and tools

Removable media/cables

Risks of unknown USB devices and cables

Social engineering

Training to recognize and resist manipulation attempts

Operational security

Protecting sensitive information in daily operations

Hybrid/remote work

Security considerations for non-office environments

Program Management
Reporting and monitoring

Initial training and Recurring training schedules

Development

Creating comprehensive security awareness programs

Execution

Delivering and managing awareness programs effectively