πŸ“˜Study Focus | Domain 6: Security Assessment and Testing

πŸ“˜ Domain 6: Security Assessment and Testing

CISSP loves to test your ability to distinguish between similar-sounding concepts (e.g., vulnerability scan vs penetration test, audit vs assessment, etc.).

πŸ”‘ Flashcard Topics (Terms, Tools, and Roles That Cause Confusion)


πŸ” Assessment Types

🧱 Vulnerability Assessment vs Penetration Test

  • Vulnerability Assessment = Automated scan for known issues; non-intrusive, broad scope.

  • Penetration Test = Simulates real attack to exploit vulnerabilities; goal = prove exploitation.

πŸ”Ž Security Audit vs Security Assessment

  • Audit = Formal, external, checklist-based, often for compliance.

  • Assessment = Broader review, internal, focuses on improving posture.

⚙️ Types of Testing

  • Static Testing (SAST) = Analyze code without running it (e.g., source code review).

  • Dynamic Testing (DAST) = Test running application (e.g., web app fuzzing).

  • Interactive Testing (IAST) = Combines static + dynamic in real time.

  • Fuzz Testing = Send malformed/random input to trigger crashes or bugs.


πŸ‘¨‍πŸ’» Testing Roles

  • Testers = Execute test plan

  • Developers = Fix findings

  • Auditors = Independent, verify controls

  • Security Analysts = Review logs, analyze results


πŸ§ͺ Testing Types for Systems

πŸ”² White-box Testing

  • Full internal knowledge (source code, architecture).

Black-box Testing

  • No internal knowledge; tests system like an external attacker.

Gray-box Testing

  • Partial knowledge; often simulates insider threat.


πŸ“Š Security Metrics and Reporting

  • Qualitative vs Quantitative Risk
    Qualitative = subjective (e.g., High/Med/Low); Quantitative = numeric (e.g., ALE).

  • Code Coverage Metrics
    Measures % of code executed by tests (e.g., branch, statement, condition).

  • Test Coverage
    Extent to which testing checks requirements and functionality.


🧾 Log and Monitoring Concepts

  • SIEM = Central log analysis and correlation (Splunk, QRadar)

  • Log Retention Policy = Dictates how long logs are kept (based on legal/regulatory needs)


πŸ›  Common Tools

  • Scanner = Nessus, Qualys (automated VA)

  • Exploitation = Metasploit (used in pen testing)

  • Code Review = SonarQube, Fortify (SAST tools)


πŸ“ Test Data Management

  • Synthetic Data = Fake but realistic data created for testing

  • Sanitized Data = Real data stripped of sensitive content


Domain 6 is deceptively short — but CISSP will grill you with subtle scenario-based questions. Flashcards + case studies = your best friends here.


Comments

Popular posts from this blog

🧭 CISSP Study Note: Guidelines

πŸ’Έ CISSP Study Note: Risk Transference

πŸ“ CISSP Study Note: Standards