Menu

Compliance and Assessment

  1. Understand the importance of data privacy and protection.

    • Privacy vs. security

    • Non-technical controls

      • Classification
      • Ownership
      • Retention
      • Data types
      • Retention standards
      • Confidentiality
      • Legal requirements
      • Data sovereignty
      • Data minimization
      • Purpose limitation
      • Non-disclosure agreement (NDA)
    • Technical controls

      • Encryption
      • Data loss prevention (DLP)
      • Data masking
      • Deidentification
      • Tokenization
      • Digital rights management (DRM)
        • Watermarking
      • Geographic access requirements
      • Access controls
  2. Given a scenario, apply security concepts in support of organizational risk mitigation.

    • Business impact analysis

    • Risk identification process

    • Risk calculation

      • Probability
      • Magnitude
    • Communication of risk factors

    • Risk prioritization

      • Security controls
      • Engineering tradeoffs
    • Systems assessment

    • Documented compensating controls

    • Training and exercises

      • Red team
      • Blue team
      • White team
      • Tabletop exercise
    • Supply chain assessment

      • Vendor due diligence
      • Hardware source authenticity
  3. Explain the importance of frameworks, policies, procedures, and controls.

    • Frameworks

      • Risk-based
      • Prescriptive
    • Policies and procedures

      • Code of conduct/ethics
      • Acceptable use policy (AUP)
      • Password policy
      • Data ownership
      • Data retention
      • Account management
      • Continuous monitoring
      • Work product retention
    • Control types

      • Managerial
      • Operational
      • Technical
      • Preventative
      • Detective
      • Responsive
      • Corrective
    • Audits and assessments

      • Regulatory
      • Compliance