Скачать книгу
6.5.2
|
External
|
15
|
6.5.3
|
Third-party
|
15
|
Domain 7
|
Security Operations
|
|
7.1
|
Understand and comply with investigations
|
19
|
7.1.1
|
Evidence collection and handling
|
19
|
7.1.2
|
Reporting and documentation
|
19
|
7.1.3
|
Investigative techniques
|
19
|
7.1.4
|
Digital forensics tools, tactics, and procedures
|
19
|
7.1.5
|
Artifacts (e.g., computer, network, mobile device)
|
19
|
7.2
|
Conduct logging and monitoring activities
|
17, 21
|
7.2.1
|
Intrusion detection and prevention
|
17
|
7.2.2
|
Security Information and Event Management (SIEM)
|
17
|
7.2.3
|
Continuous monitoring
|
17
|
7.2.4
|
Egress monitoring
|
17
|
7.2.5
|
Log management
|
17
|
7.2.6
|
Threat intelligence (e.g., threat feeds, threat hunting)
|
17
|
7.2.7
|
User and Entity Behavior Analytics (UEBA)
|
21
|
7.3
|
Perform Configuration Management (CM) (e.g., provisioning, baselining, automation)
|
16
|
7.4
|
Apply foundational security operations concepts
|
16
|
7.4.1
|
Need-to-know/least privilege
|
16
|
7.4.2
|
Separation of Duties (SoD) and responsibilities
|
16
|
7.4.3
|
Privileged account management
|
16
|
7.4.4
|
Job rotation
|
16
|
7.4.5
|
Service Level Agreements (SLA)
|
16
|
7.5
|
Apply resource protection
|
16
|
7.5.1
|
Media management
|
16
|
7.5.2
|
Media protection techniques
|
16
|
7.6
|
Conduct incident management
|
17
|
7.6.1
|
Detection
|
17
|
7.6.2
|
Response
|
17
|
7.6.3
|
Mitigation
|
17
|
7.6.4
|
Reporting
|
17
|
7.6.5
|
Recovery
|
Скачать книгу