Always Learning

Security-X Risk Management

CompTIA SecurityX

Risk management Obj 1.0

Risk Assesment

Risk management lifecycle


Risk assesment frameworks


Impact Analysis


Third party risk management


Compliance Obj 1.2

Industry compliance

Requires organizations meet established laws, regulations, guidelines, and specifications to protect sensitive data, maintain customer trust, and avoid regulatory pentalties.

Compliance requirements (Frameworks)


Industry standards Obj 1.3

Established guidelines and practices that organizations within a specific industry are expected to follow.

PCI-DSS payment card industry, keep CC data safe.

ISO-IEC 27K series NOT LEGALLY ENFORCED - 27001: Focuses on establishing, implementing, maintaining and continual improving and organizations information security management system (ISMS) - 27002: Focuses on security controls defined in 27001 - 27005: Information security risk management offering guidance on identifying and assessing risks to better protect sensitive information. - 27017: Cloud security - 27018: Protecting personal data in the cloud

DMA controls for "Gatekeepers" Regulating large tech companies Companies that control key digital services like online search engines, social networking, and app stories - FANG companies (Facebook/Meta, Amazon, Google, TikTok, Apple) - prevents companies to hold a monopoly - Anti-monopoly laws


Security Frameworks


SOC2 (Security Or# CompTIA SecurityX

Risk management Obj 1.0

Risk Assesment

Risk management lifecycle


Risk assesment frameworks


Impact Analysis


Third party risk management


Compliance Obj 1.2

Industry compliance

Requires organizations meet established laws, regulations, guidelines, and specifications to protect sensitive data, maintain customer trust, and avoid regulatory pentalties.

Compliance requirements (Frameworks)


Industry standards Obj 1.3

Established guidelines and practices that organizations within a specific industry are expected to follow.

PCI-DSS payment card industry, keep CC data safe.

ISO-IEC 27K series NOT LEGALLY ENFORCED - 27001: Focuses on establishing, implementing, maintaining and continual improving and organizations information security management system (ISMS) - 27002: Focuses on security controls defined in 27001 - 27005: Information security risk management offering guidance on identifying and assessing risks to better protect sensitive information. - 27017: Cloud security - 27018: Protecting personal data in the cloud

DMA controls for "Gatekeepers" Regulating large tech companies Companies that control key digital services like online search engines, social networking, and app stories - FANG companies (Facebook/Meta, Amazon, Google, TikTok, Apple) - prevents companies to hold a monopoly - Anti-monopoly laws


Security Frameworks


SOC2 (Security Organization Control Type 2)

Designed to ensure that companies, especially those offering cloud-based services handle customer data securely Created by CFA (Accountants) Audit in process that evaluates an organization's ability to manage and protect data across five key areas. Based on 5 principles 1. Availability 2. confidentiality 3. Process Integrity 4. Privacy 5. Security

SOC3 report is the public facing SOC2 report

TYPES: SOC2 TYPE 1: Assesses the design of an organization's controls for managing sensitive customer data at a specific point in time.

SOC2 TYPE 2: Evaluates not only design of the controls but also their operational effectiveness over a period of time, usually 6 to 12 months.

SOC3 Reports: Simplified public version of the more detailed SOC 2 report, designed for organizations that want to show that they have a strong security and data protection practices in place.


NIST (CSF) cyber security framework

Designed to be flexible across diffrent industries Five core functions 1. Identify: Asset management software such as , SolarWinds or Lansweeper is used to map out critical systems, hardware, and data. 2. Protect: Organization's rely on firewalls, encryption and access management solutions to control access and safeguard sensitive data. 3. Detect: Intrusion detection systems and security information and event management (SIEM) solutions to continuously monitor their networks for suspicious activity or potential threats. (splunk, snort) 4. Respond: IBM resilient , crowdstrike are used to contain security incidents, investigate root causes and notify the right personnel to handle the situation effectively. 5. Recover: Organizations rely on backup and recovery tools such as Veeam or Acronis to restore lost data and services after a security incident.


CSA (Cloud Security Alliance) framework

Set of guidelines and best practices designed to help organizations secure cloud computing environments Provides a way to manage and mitigate risks associated with cloud services. CSA STAR (Security, Trust , Assurance, and Risk) provides various certifications. Areas: Certificate for cloud service providers. 1. Data protection 2. Security management 3. Compliance

Two levels or certification: 1. Self Audit 2. Requires third-party audior


Privacy regulations

SOC3 report is the public facing SOC2 report

TYPES: SOC2 TYPE 1: Assesses the design of an organization's controls for managing sensitive customer data at a specific point in time.

SOC2 TYPE 2: Evaluates not only design of the controls but also their operational effectiveness over a period of time, usually 6 to 12 months.

SOC3 Reports: Simplified public version of the more detailed SOC 2 report, designed for organizations that want to show that they have a strong security and data protection practices in place.


NIST (CSF) cyber security framework

Designed to be flexible across diffrent industries Five core functions 1. Identify: Asset management software such as , SolarWinds or Lansweeper is used to map out critical systems, hardware, and data. 2. Protect: Organization's rely on firewalls, encryption and access management solutions to control access and safeguard sensitive data. 3. Detect: Intrusion detection systems and security information and event management (SIEM) solutions to continuously monitor their networks for suspicious activity or potential threats. (splunk, snort) 4. Respond: IBM resilient , crowdstrike are used to contain security incidents, investigate root causes and notify the right personnel to handle the situation effectively. 5. Recover: Organizations rely on backup and recovery tools such as Veeam or Acronis to restore lost data and services after a security incident.


CSA (Cloud Security Alliance) framework

Set of guidelines and best practices designed to help organizations secure cloud computing environments Provides a way to manage and mitigate risks associated with cloud services. CSA STAR (Security, Trust , Assurance, and Risk) provides various certifications. Areas: Certificate for cloud service providers. 1. Data protection 2. Security management 3. Compliance

Two levels or certification: 1. Self Audit 2. Requires third-party audior


Privacy regulations