2 cissp ® Official Study Guide Eighth Edition


Countermeasure Selection and Implementation



Download 19,3 Mb.
Pdf ko'rish
bet90/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   86   87   88   89   90   91   92   93   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Countermeasure Selection and Implementation
Selecting a countermeasure or control (short for 
security control
) within the realm of risk 
management relies heavily on the cost/benefit analysis results. However, you should con-
sider several other factors when assessing the value or pertinence of a security control:

The cost of the countermeasure should be less than the value of the asset.

The cost of the countermeasure should be less than the benefit of the countermeasure.


78
Chapter 2 

Personnel Security and Risk Management Concepts

The result of the applied countermeasure should make the cost of an attack greater for 
the perpetrator than the derived benefit from an attack.

The countermeasure should provide a solution to a real and identified problem. (Don’t 
install countermeasures just because they are available, are advertised, or sound cool.)

The benefit of the countermeasure should not be dependent on its secrecy. This means 
that “security through obscurity” is not a viable countermeasure and that any viable 
countermeasure can withstand public disclosure and scrutiny.

The benefit of the countermeasure should be testable and verifiable.

The countermeasure should provide consistent and uniform protection across all users, 
systems, protocols, and so on.

The countermeasure should have few or no dependencies to reduce cascade failures.

The countermeasure should require minimal human intervention after initial deploy-
ment and configuration.

The countermeasure should be tamperproof.

The countermeasure should have overrides accessible to privileged operators only.

The countermeasure should provide fail-safe and/or fail-secure options.
Keep in mind that security should be designed to support and enable business tasks and 
functions. Thus, countermeasures and safeguards need to be evaluated in the context of a 
business task.
Security controls, countermeasures, and safeguards can be implemented administra-
tively, logically/technically, or physically. These three categories of security mechanisms 
should be implemented in a defense-in-depth manner in order to provide maximum benefit 
(Figure 2.6).
F I g u R e 2 . 6
The categories of security controls in a defense-in-depth implementation
Physical Controls
Logical/Technical Controls
Administrative Controls
ASSETS


Understand and Apply Risk Management Concepts 

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   86   87   88   89   90   91   92   93   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish