Title: CRISC Domain 3 Management
1learntorise
2DATA PROTECTION
- Paper printouts
- Magnetic media Optical drive media
- Formats
- Audio/Video Photos/Screensavers
- Discarded material
CRISC DOMAIN 3
Range checks Format checks Special character
checks
Data Validation
Size checks
Likelihood checks Whitelist vs Blacklist Canonical
ization issues
www.infosectrain.com
3DATA PROTECTION
- Data checks and balances
- Anti-malware
- Data Integrity
- SoD
- Transaction approval
- Least privilege
CRISC DOMAIN 3
User Permissions
Regular review
Revocation of permissions Isolation Network
segmentation
Data in Storage
Role-based access control
Physical access controls Encryption
www.infosectrain.com
4IDENTITY MANAGEMENT
Least privilege
Access misuse
Regular review
CRISC DOMAIN 3
Disable unused accounts
Mutual exclusivity to prevent fraud and
errors Review and approval Implementation Dual
control
Segregation of Duties (SoD)
Limitation
Collusion risk
Reduce reliance on key staff Benefits
Detect collusion Broader skill sets attract other
employers
Cross-training and Job Rotation
Risc Transition inefficiencies
www.infosectrain.com
5ACCESS CONTROL
IAAA Identification, Authentication,
Authorization, Accountability User ID
Unique identifiers
Account number Account number, Employee ID
Identification
CRISC DOMAIN 3
Knowledge Ownership Methods
Characteristic Node authentication
Authentication
Strong Authentication
Multifactor authentication
Least privilege Authorization Temporal
Isolation Logging activity Accountability/Auditi
ng Preserving logs
www.infosectrain.com
6CRYPTOGRAPHY
Confidentiality Integrity
Nonrepudiation Access control
Benefits
Authentication Example AES Advantages
CRISC DOMAIN 3
Less complex Less processing power Key
delivery Message origin verification
Symmetric Algorithms
Encryption
Disadvantages
Example Diffie-Hellman
Public key distribution Message
origin verification Multifactor authentication
Asymmetric Algorithms
Advantages
Hashing Digital Signatures
Message Integrity
Disadvantages
Link public key with specific owner Certificate
Authority (CA) Standard X.509 Implementation of
public key cryptography Certificates CAs
Certificates
Public Key Infrastructure (PKI)
www.infosectrain.com
7BUSINESS CONTINUITY AND DISASTER RECOVERY
MANAGEMENT
Affect accuracy and appropriateness of resiliency
plans.
Previously accepted risks may require mitigation.
Risk Environment Changes
CRISC DOMAIN 3
Advise BCP/DRP teams of risk environment changes.
Identify impact of an incident.
Business Impact Assessments (BIAs)
Understand and prioritize prevention or response
steps. Learn lessons regarding control
placement. Likelihood checks Improve incident
handling procedures.
www.infosectrain.com
8FOUND THIS USEFUL?
To Get More Insights
Through Our FREE
Courses Workshops eBooks Checklists Mock
Tests
LIKE
FOLLOW
SHARE