Title: CompTIA Security+ Domain 5 Overview
1learntorise
25.1 SUMMARIZE ELEMENTS OF EFFECTIVE SECURITY
GOVERNANCE Operational guidance for policy
implementation Guidelines Example Firewall
con?guration, access controls, encryption De?ne
security expectations and rules for
employees Acceptable Use Policy (AUP)
Permissible actions, behavior Information
Security Covers data protection and incident
response Business Continuity Ensures minimal
COMPTIA SECURITY DOMAIN 5
Policies
during disasters
Disaster Recovery Focuses on quick data
recovery Incident Response Outlines response to
breaches
Types
SDLC Integrates security in software
development Change Management Controls
modi?cations to systems Set mandatory controls
for consistent security
Password Complexity, reuse restrictions Access
Control Authentication, authorization
Standards
Types
Physical Security Protects facilities and
assets Encryption Data con?dentiality, key
management
www.infosectrain.com
35.1 SUMMARIZE ELEMENTS OF EFFECTIVE SECURITY
GOVERNANCE
Step-by-step security implementation Change
Management Request, assessment, deployment
COMPTIA SECURITY DOMAIN 5
Procedures
Onboarding/Offboarding Access provisioning and
revocation Playbooks Incident handling protocols
Types
Regulatory Compliance GDPR, HIPAA, PCI DSS Legal
Obligations Data privacy laws
External Considerations
Industry Standards ISO 27001, NIST
Local/Regional Considerations Cultural,
geopolitical risks National/Global Initiatives
Cybersecurity collaboration Boards High-level
oversight Committees Focused security initiatives
Governance Structures
Government Entities Regulatory
compliance Centralized/Decentralized Authority
distribution Owners Accountable for system
security and compliance Controllers Implement
technical controls
Roles and Responsibilities for System Data
Processors Handle data, following security
protocols Custodians Manage and protect datasets
www.infosectrain.com
45.2 KEY ELEMENTS OF THE RISK MANAGEMENT PROCESS
Internal Assessment Review internal processes
COMPTIA SECURITY DOMAIN 5
Risk Identi?cation
External Assessment Use third parties for
external risks Environmental Scanning Monitor
for emerging external threats Ad hoc As
needed Recurring Regular intervals
Risk Assessment
One-Time Speci?c events Continuous Ongoing
updates
Qualitative Subjective severity ratings SLE
(Single Loss Expectancy) Expected loss per
event ALE (Annualized Loss Expectancy)
Risk Analysis
Expected annual loss
Quantitative Calculated impacts, e.g.
ARO (Annualized Rate of Occurrence) Frequency
of risk EF (Exposure Factor) Asset
loss percentage
KRIs Key Risk Indicators
Risk Register
Risk Owners Assigned managers
Risk Threshold Acceptable risk level
www.infosectrain.com
55.2 KEY ELEMENTS OF THE RISK MANAGEMENT PROCESS
Tolerance Acceptable risk level based on capacity
COMPTIA SECURITY DOMAIN 5
Risk Tolerance and Appetite
Expansionary Higher risk, higher reward Conservat
ive Low risk, stable returns
Appetite Preferred risk level, may be
Neutral Balanced approach
Transfer Shift risk (e.g., insurance) Accept
Take risks without change
Risk Management Strategies
Exemption Allow unaddressed risk Avoid Prevent
the risk
Mitigate Reduce impact or likelihood Clarity
Clear metrics
Risk Reporting
Frequency Regular updates
Relevance Audience-focused content RTO Max
recovery time
RPO Max data loss time
Business Impact Analysis (BIA)
MTTR Average repair time MTBF Average time
between failures
www.infosectrain.com
65.3 THIRD-PARTY RISK ASSESSMENT AND MANAGEMENT
PROCESSES Penetration Testing Identify
vulnerabilities Internal Audits Ensure
compliance with standards
COMPTIA SECURITY DOMAIN 5
Vendor Assessment
Right-to-Audit Contract clause for auditing
vendors Independent Assessments Unbiased
security reviews
Supply Chain Analysis Assess external
dependencies
Due Diligence Check ?nancials, reputation, and
compliance Con?ict of Interest Ensure impartial
performance SLA De?nes expected service level,
uptime, and performance MOA/MOU Outlines terms
and aligns objectives in early partnerships MSA
Comprehensive contract governing all vendor
agreements
Vendor Selection
Agreement Types
WO/SOW Speci?es work details, timelines, and
deliverables NDA Ensures con?dentiality during
negotiations BPA Governs security practices with
business partners Regular Interval Scheduled
checks (e.g., quarterly) Event-Driven Triggered
by incidents or vendor changes
Vendor Monitoring
Questionnaires
Gather vendor compliance and practice data
Rules of Engagement
De?ne roles and responsibilities with vendors
www.infosectrain.com
75.4 TYPES AND PURPOSES OF AUDITS AND ASSESSMENTS
Attestation
Formal report, independent audit, demonstrates
compliance Compliance Adherence to regulations
and standards
COMPTIA SECURITY DOMAIN 5
Internal Audits
Audit Committee Oversees process and
resources Self-Assessments Internal security
reviews Regulatory Exams Verify legal and
regulatory compliance
External Audits Independent Third-Party
Unbiased cybersecurity assessment Purpose
Simulate attacks to identify vulnerabilities Physi
cal Check facility security Offensive Exploit
vulnerabilities actively Defensive Test defense
response
Penetration Testing
Types of Pen Testing
Integrated Combine offense and defense Known
Environment Insider attack simulation Partially
Known Environment Partially informed outsider
Unknown Environment Blind external
attack Reconnaissance Information
gathering Active Testing Direct interaction with
systems Passive Testing Observe without
affecting operations
Testing Approaches
www.infosectrain.com
85.5 IMPLEMENT SECURITY AWARENESS PRACTICES
Recognizing Phishing Spot unsolicited requests,
urgent
language, poor grammar, mismatched URLs
COMPTIA SECURITY DOMAIN 5
Phishing Campaigns
Response to Suspicious Messages Avoid clicking,
report to IT, verify sender Malicious
Deliberate harmful actions (e.g., data
ex?ltration) Unexpected Unusual behavior
Anomalous Behavior Recognition
- (e.g., out-of-office messages)
- Unintentional Accidental security risks (e.g.,
misdirected emails) - Policies/Handbooks Update on expected behaviors
- Situational Awareness Recognize social
engineering - Insider Threats Identify unusual access patterns
User Guidance and Training
Password Management Unique, strong
passwords Removable Media Warn against
unauthorized media Social Engineering Regular
training
Hybrid/Remote Security Secure home networks,
VPN use Incident Reporting Process for initial
and recurring incidents Continuous Monitoring
Detect and respond to threats in real-time
Reporting and Monitoring
Security Awareness Execution
Regular training, updates on threats, vigilance
to reduce data breaches
www.infosectrain.com
9FOUND THIS USEFUL?
To Get More Insights
Through Our FREE
Courses Workshops eBooks Checklists Mock
Tests
LIKE
FOLLOW
SHARE