1.1- Understand, Adhere To, And Promote Professional Ethics
- ISC2 Code of Professional Ethics
- Organizational code of ethics
1.2 - Understand And Apply Security Concepts
- Confidentiality, integrity, and availability, authenticity, and nonrepudiation (5 Pillars of Information Security)
1.3 - Evaluate And Apply Security Governance Principles
- Alignment of the security function to business strategy, goals, mission, and objectives
- Organizational processes (e.g., acquisitions, divestitures, governance committees)
- Organizational roles and responsibilities
- Security control frameworks (e.g., International Organization for Standardization (ISO), National Institute of Standards and Technology (NIST), Control Objectives for Information and Related Technology (COBIT), Sherwood Applied Business Security Architecture (SABSA), Payment Card Industry (PCI), Federal Risk and Authorization Management Program (FedRAMP))
- Due care/due diligence
1.4 - Understand Legal, Regulatory, And Compliance Issues That Pertain To Information Security In A Holistic Context
- Cybercrimes and data breaches
- Licensing and Intellectual Property requirements
- Import/export controls
- Transborder data flow
- Issues related to privacy (e.g., General Data Protection Regulation (GDPR), California Consumer Privacy Act, Personal Information Protection Law, Protection of Personal Information Act)
- Contractual, legal, industry standards, and regulatory requirements
1.5 - Understand Requirements For Investigation Types (I.E., Administrative, Criminal, Civil, Regulatory, Industry Standards)
1.6 - Develop, Document, And Implement Security Policy, Standards, Procedures, And Guidelines
1.7 - Identify, Analyze, Assess, Prioritize, And Implement Business Continuity (BC) Requirements
- Business impact analysis (BIA)
- External dependencies
1.8 - Contribute To And Enforce Personnel Security Policies And Procedures
- Candidate screening and hiring
- Employment agreements and policy driven requirements
- Onboarding, transfers, and termination processes
- Vendor, consultant, and contractor agreements and controls
1.9 - Understand And Apply Risk Management Concepts
- Threat and vulnerability identification
- Risk analysis, assessment, and scope
- Risk response and treatment (e.g., cybersecurity insurance)
- Applicable types of controls (e.g., preventive, detection, corrective)
- Control assessments (e.g., security and privacy)
- Continuous monitoring and measurement
- Reporting (e.g., internal, external)
- Continuous improvement (e.g., risk maturity modeling)
- Risk frameworks (e.g., International Organization for Standardization (ISO), National Institute of Standards and Technology (NIST), Control Objectives for Information and Related Technology (COBIT), Sherwood Applied Business Security Architecture (SABSA), Payment Card Industry (PCI))
1.10 - Understand And Apply Threat Modeling Concepts And Methodologies
1.11 - Apply Supply Chain Risk Management (SCRM) Concepts
- Risks associated with the acquisition of products and services from suppliers and providers (e.g., product tampering, counterfeits, implants)
- Risk mitigations (e.g., third-party assessment and monitoring, minimum security requirements, service level requirements, silicon root of trust, physically unclonable function, software bill of materials)
1.12 - Establish And Maintain A Security Awareness, Education, And Training Program
- Methods and techniques to increase awareness and training (e.g., social engineering, phishing, security champions, gamification)
- Periodic content reviews to include emerging technologies and trends (e.g., cryptocurrency, artificial intelligence (AI), blockchain)
- Program effectiveness evaluation