CISSP Domain 7: Security Operations – Comprehensive Review
CISSP Domain 7: Security Operations – Comprehensive Review
1. Overview of Security Operations
Security operations focus on implementing, managing, and assessing security controls to protect information assets, detect and respond to security incidents, and ensure business continuity. This domain covers incident management, disaster recovery, investigations, physical security, and resource protection.
2. Investigations and Forensics
Security professionals must understand the different types of investigations and how to collect, preserve, and analyze evidence.
2.1 Types of Investigations
  • Administrative – Internal policy violations (e.g., HR issues, insider threats).
  • Criminal – Law enforcement involvement, legal admissibility of evidence required.
  • Civil – Contractual disputes, lower burden of proof than criminal cases.
  • Regulatory – Compliance with industry regulations (e.g., HIPAA, GDPR).
  • eDiscovery – Electronic discovery for legal proceedings.
2.2 Forensic Procedures
  • Order of Volatility – Collect evidence from the most volatile sources first (e.g., RAM, cache, network data).
  • Chain of Custody – Ensuring evidence integrity by documenting handling.
  • Legal Considerations – Following legal procedures to ensure evidence admissibility.
  • Anti-Forensics – Techniques attackers use to obscure evidence (e.g., encryption, data wiping).
3. Logging, Monitoring, and Detection
Monitoring is essential for detecting security incidents and responding promptly.
3.1 Logging and Monitoring Strategies
  • SIEM (Security Information and Event Management) – Aggregates logs for real-time monitoring.
  • Log Retention – Compliance with legal and business requirements.
  • Audit Trails – Logs should be protected from tampering.
  • Time Synchronization – Using NTP (Network Time Protocol) to ensure timestamps are accurate.
3.2 Intrusion Detection and Prevention
  • IDS (Intrusion Detection System) – Monitors and alerts on potential attacks.
  • IPS (Intrusion Prevention System) – Blocks suspicious traffic.
  • HIDS vs. NIDS – Host-based (HIDS) vs. Network-based (NIDS) detection.
4. Incident Response and Management
Incident response is crucial for minimizing damage and recovering from security breaches.
4.1 Incident Response Process (NIST SP 800-61)
  1. Preparation – Develop policies, train staff, and create an incident response plan.
  2. Detection & Analysis – Identify indicators of compromise (IOCs), analyze logs, and classify incidents.
  3. Containment, Eradication, and Recovery Containment – Limit the scope of the incident (e.g., isolate systems). Eradication – Remove the threat (e.g., patching, removing malware). Recovery – Restore normal operations and monitor for reoccurrence.
  4. Post-Incident Activity – Conduct lessons learned and update security measures.
4.2 Attack Classification
  • DoS/DDoS Attacks – Overloading systems.
  • Malware Infections – Ransomware, rootkits, worms, etc.
  • Insider Threats – Employees misusing privileges.
  • Advanced Persistent Threats (APT) – Nation-state or highly organized cybercriminal groups.
5. Disaster Recovery (DR) and Business Continuity (BC)
Ensuring the organization can continue operations after a disruption.
5.1 Business Continuity Planning (BCP)
  • Business Impact Analysis (BIA) – Identifies critical assets and recovery objectives.
  • Recovery Time Objective (RTO) – Maximum downtime allowed before recovery.
  • Recovery Point Objective (RPO) – Maximum data loss tolerable.
5.2 Disaster Recovery Strategies
  • Hot Site – Fully operational backup site (expensive).
  • Warm Site – Partially equipped backup site.
  • Cold Site – Empty space requiring setup (cheaper but slower to activate).
  • Backup Methods – Full, incremental, differential backups.
  • Tabletop Exercises – Walkthroughs of DR plans to ensure readiness.
6. Resource Protection and Security Controls
Protecting assets, including hardware, software, and personnel.
6.1 Data Security Controls
  • Data Classification – Public, confidential, top secret, etc.
  • Data Loss Prevention (DLP) – Prevents data leaks through policies and monitoring.
6.2 System Hardening
  • Patch Management – Keeping systems updated.
  • Least Privilege – Restricting user access.
  • Baseline Configuration – Standardized security settings.
7. Physical Security
Protecting physical assets from unauthorized access, theft, and natural disasters.
7.1 Physical Security Layers
  • Deterrence – Fences, security cameras, warning signs.
  • Prevention – Locks, access controls, guards.
  • Detection – Motion sensors, alarms, CCTV.
  • Response – Law enforcement, security teams.
7.2 Environmental Controls
  • Fire Suppression – Halon, CO₂, dry-pipe sprinklers.
  • HVAC – Proper cooling and humidity controls.
  • EMI Shielding – Protection against electromagnetic interference.
8. Secure Asset Management
Managing hardware, software, and data assets securely.
8.1 Asset Lifecycle Management
  1. Procurement – Ensuring security requirements are met.
  2. Deployment – Secure configuration before use.
  3. Operations – Regular updates and monitoring.
  4. Decommissioning – Secure disposal of assets.
8.2 Secure Media Handling
  • Data Remanence – Residual data left after deletion.
  • Secure Disposal – Degaussing, shredding, or incineration.
9. Supply Chain Security
Ensuring security across the supply chain.
9.1 Risks in the Supply Chain
  • Third-Party Risks – Vendors handling sensitive data.
  • Hardware Tampering – Malicious implants in physical components.
  • Software Risks – Supply chain attacks (e.g., SolarWinds incident).
9.2 Vendor Risk Management
  • Contractual Security Requirements – SLAs for security standards.
  • Audits & Assessments – Regular evaluation of third-party security.
10. Security Operations in Cloud and Virtualized Environments
Adapting security operations for modern infrastructures.
10.1 Cloud Security Considerations
  • Shared Responsibility Model – Who secures what in SaaS, PaaS, IaaS.
  • Data Governance – Ensuring compliance with regulations.
  • Cloud Forensics – Challenges with evidence collection in cloud environments.
10.2 Virtualization Security
  • Hypervisor Security – Protecting VM hosts from escape attacks.
  • Container Security – Ensuring isolation between workloads.
Final Tips for Exam Success
Understand incident response thoroughly.
Know forensic procedures and evidence handling.
Be familiar with disaster recovery and BCP concepts.
Master SIEM, logging, and monitoring principles.
Review cloud security implications and supply chain risks.
Remember physical security and secure asset management best practices.
0
0 comments
Fouad Ahmed
6
CISSP Domain 7: Security Operations – Comprehensive Review
CISSP Study Group
skool.com/cybersecurity-study-group
Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!
Leaderboard (30-day)
Powered by