πStudy Focus | Domain 6: Security Assessment and Testing
π Domain 6: Security Assessment and Testing
CISSP loves to test your ability to distinguish between similar-sounding concepts (e.g., vulnerability scan vs penetration test, audit vs assessment, etc.).
π Flashcard Topics (Terms, Tools, and Roles That Cause Confusion)
π Assessment Types
π§± Vulnerability Assessment vs Penetration Test
-
Vulnerability Assessment = Automated scan for known issues; non-intrusive, broad scope.
-
Penetration Test = Simulates real attack to exploit vulnerabilities; goal = prove exploitation.
π Security Audit vs Security Assessment
-
Audit = Formal, external, checklist-based, often for compliance.
-
Assessment = Broader review, internal, focuses on improving posture.
⚙️ Types of Testing
-
Static Testing (SAST) = Analyze code without running it (e.g., source code review).
-
Dynamic Testing (DAST) = Test running application (e.g., web app fuzzing).
-
Interactive Testing (IAST) = Combines static + dynamic in real time.
-
Fuzz Testing = Send malformed/random input to trigger crashes or bugs.
π¨π» Testing Roles
-
Testers = Execute test plan
-
Developers = Fix findings
-
Auditors = Independent, verify controls
-
Security Analysts = Review logs, analyze results
π§ͺ Testing Types for Systems
π² White-box Testing
-
Full internal knowledge (source code, architecture).
⚫ Black-box Testing
-
No internal knowledge; tests system like an external attacker.
⚪ Gray-box Testing
-
Partial knowledge; often simulates insider threat.
π Security Metrics and Reporting
-
Qualitative vs Quantitative Risk
Qualitative = subjective (e.g., High/Med/Low); Quantitative = numeric (e.g., ALE). -
Code Coverage Metrics
Measures % of code executed by tests (e.g., branch, statement, condition). -
Test Coverage
Extent to which testing checks requirements and functionality.
π§Ύ Log and Monitoring Concepts
-
SIEM = Central log analysis and correlation (Splunk, QRadar)
-
Log Retention Policy = Dictates how long logs are kept (based on legal/regulatory needs)
π Common Tools
-
Scanner = Nessus, Qualys (automated VA)
-
Exploitation = Metasploit (used in pen testing)
-
Code Review = SonarQube, Fortify (SAST tools)
π Test Data Management
-
Synthetic Data = Fake but realistic data created for testing
-
Sanitized Data = Real data stripped of sensitive content
Domain 6 is deceptively short — but CISSP will grill you with subtle scenario-based questions. Flashcards + case studies = your best friends here.
Comments
Post a Comment