Module Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
5 hours 58 minutes
Difficulty
Intermediate
CEU/CPE
6
Video Transcription
00:00
>> Welcome back to Cybrary,
00:00
this is your course, I'm your instructor, Brad Rhodes.
00:00
Let's jump into our Module summary 4,
00:00
Lesson 6, Domain 5,
00:00
the last domain in ISSEP.
00:00
Here's we're going to cover in this lesson,
00:00
we're going to review the module,
00:00
so we're going to look at all the secure operations
00:00
disposal decommissioning stuff that we've talked about.
00:00
Then we're going to do a real quick wrap-up
00:00
of the entirety of the ISSEP Domains
00:00
because we're at the end of
00:00
our run through the ISSEP Domains, the five of them.
00:00
In this Module, we reviewed secure operations,
00:00
we've talked about what that ISSEP
00:00
people process technology.
00:00
We talked about Kahneman.
00:00
Continuous monitoring is where you got to
00:00
monitor all of the controls,
00:00
whether they're technical, non-technical,
00:00
preventive, detective, whatever.
00:00
All of that is something that we
00:00
do frequently all the time.
00:00
We talked about secure maintenance and the supply chain.
00:00
In supply chain we realized that,
00:00
if we can't see very far down the supply chain,
00:00
we at risk, we got to remember that.
00:00
Talked about incident response and
00:00
how ISSEP is performed there.
00:00
We talked about change management
00:00
and highlighted the fact
00:00
that you got to have a baseline no matter what it is,
00:00
technical and non-technical,
00:00
a system, a component, whatever.
00:00
If you're going to configuration control,
00:00
it can change management,
00:00
you've got to have that baseline.
00:00
Then we talked about decom disposal.
00:00
Remember, decommissioning is all about reuse,
00:00
disposal is about destruction
00:00
and we're just walking away from
00:00
whatever thing that is we're not going to use anymore.
00:00
Let's wrap up the ISSEP domains,
00:00
we covered a lot in the last five lessons, a lot.
00:00
We talked about security engineering foundations.
00:00
We looked at the basics,
00:00
what is systems engineering?
00:00
What a system security engineering?
00:00
How does that fit? We talked about
00:00
risk management and the levels.
00:00
We talked about, the organization level,
00:00
we talked about the mission business process level.
00:00
We talked about the system owner level,
00:00
which drives all of this to enterprise risk.
00:00
We talked about sturdy security planning and design and
00:00
the absolute requirement that
00:00
you've got to track things from beginning to end.
00:00
You have to do requirements
00:00
traceability from the component level
00:00
all the way up through to
00:00
the top-level systems that is being engineered.
00:00
We talked about implementation,
00:00
verification and validation, those technical processes.
00:00
Remember with their verification,
00:00
you can say you met the requirement,
00:00
but validation is did
00:00
you meet the mission or business need?
00:00
If you didn't, you might verify but never validate.
00:00
Then we talked about secure ops management and
00:00
disposal and that's where we're running the systems,
00:00
we're doing all of that continuous monitoring
00:00
, and then ultimately,
00:00
following the fact that we should have
00:00
a life cycle process in place to
00:00
get rid of systems that are old and are no longer
00:00
effective and potentially could
00:00
cause a security vulnerabilities,
00:00
and that's the sub domains.
00:00
We're going to now head off to Module 7,
00:00
which is our ISSEP process.
00:00
We're hopefully going to put
00:00
all of that together, get you that flow.
00:00
All of these domains and help
00:00
you wrap your head around what it looks
00:00
to be an ISSE and run
00:00
through that entirety of the process.
00:00
In this lesson, we wrapped up all of Module 6,
00:00
that's Domain 5 and ISSEP,
00:00
we reviewed the ISSEP Domains because we have reached
00:00
the end of our tour through the ISSEP Domains,
00:00
we're about to jump into Module 7,
00:00
the ISSEP process,
00:00
to help you understand the flow and
00:00
the work that is ISSEPs do on a regular basis.
00:00
We'll see you next time.
Up Next