Introduction to the eight CISSP security domains - part 2

 

  1. Identity and Access Management:

    • Focuses on controlling and managing physical and logical assets, ensuring users follow established policies for access.
    • Examples include setting up keycard access for employees and documenting access roles.
  2. Security Assessment and Testing:

    • Involves conducting security control testing, analyzing data, and performing security audits to monitor risks, threats, and vulnerabilities.
    • Tasks include auditing user permissions to ensure correct access levels, such as limiting access to payroll information.
  3. Security Operations:

    • Concentrates on conducting investigations and implementing preventative measures to address security incidents.
    • Responsibilities may include responding to alerts about potential threats and following organization policies and procedures to mitigate risks.
  4. Software Development Security:

    • Focuses on using secure coding practices to create secure applications and services.
    • Security analysts collaborate with software development teams to incorporate security practices into the software development life-cycle, such as advising on password policies and ensuring proper management of user data.

Understanding these security domains is essential for navigating the complex world of security and preparing for job interviews and roles within a security team. While these domains may seem unclear at this early stage, they will be discussed in greater detail in subsequent courses.

Comments

Popular posts from this blog

Common cybersecurity terminology

Introduction to security frameworks and controls

syllabus