1.2 Evaluate and apply security governance principles
- Alignment of security function to business strategy, goals, mission, and objectives
 - Organizational processes (e.g., acquisitions, divestitures, governance committees)
 - Organizational Roles and responsibilities
 - Security control frameworks
 - Due care/due diligence
 
1.3 Determine compliance requirements
- Contractual, legal, industry standards, and regulatory requirements
 - Privacy requirements
 
- Cybercrimes and data breaches
 - Licensing and intellectual property requirements
 - Import/export controls
 - Trans-border data flow
 - Privacy
 
1.5 Understand, adhere to, and promote professional ethics
- (ISC)² Code of Professional Ethics
 - Organizational code of ethics
 
1.6 Develop, document, and implement security policy, standards, procedures, and guidelines
1.7 Identify, analyze, and prioritize Business Continuity (BC) requirements
- Develop and document scope and plan
 - Business Impact Analysis (BIA)
 
1.8 Contribute to and enforce personnel security policies and procedures
- Candidate screening and hiring
 - Employment agreements and policies
 - Onboarding and termination processes
 - Vendor, consultant, and contractor agreements
 - and controls
 - Compliance policy requirements
 - Privacy policy requirements
 
1.9 Understand and apply risk management concepts
- Identify threats and vulnerabilities
 - Risk assessment/analysis
 - Risk response
 - Countermeasure selection and implementation
 - Applicable types of controls (e.g., preventive, detective, corrective)
 - Security Control Assessment (SCA)
 - Monitoring and measurement
 - Asset valuation
 - Reporting
 - Continuous improvement
 - Risk frameworks
 
1.10 Understand and apply threat modeling concepts and methodologies
- Threat modeling methodologies
 - Threat modeling concepts
 
1.11 Apply risk-based management concepts to the supply chain
- Risks associated with hardware, software, and
 - services
 - Third-party assessment and monitoring
 - Minimum security requirements
 - Service-level requirements
 
1.12 Establish and maintain a security awareness, education, and training program
- Methods and techniques to present awareness and training
 - Periodic content reviews
 - Program effectiveness evaluation
 

No comments:
Post a Comment