IT Examiner School - Oct 2025
Internal Use Only
5
Information Security Principles: Additional Concepts
Least Privilege Principle: Users and systems should only have the minimum access necessary to perform their tasks.
Monitoring and Auditing: Continuous monitoring, Compliance checks, and Real-time alerts.
Separation of Duties: Critical tasks are divided among multiple individuals to prevent fraud and errors.
Zero Trust Architecture: Continuous verification of user identities and device trustworthiness. No implicit trust, even for users inside the network perimeter.
Defense in Depth: Multiple layers of security controls (physical, technical, administrative)
Internal Use Only
Examples of Information Security Frameworks • NIST Cybersecurity Framework (CSF): A risk-based approach to managing cybersecurity risks. A voluntary commercial framework. (IPDR2) • ISO/IEC 27001: Standard for an Information Security
Management System (ISMS). Along with 27002 code of practice, 27701 Privacy Management System, ISO1000 Risk Management. Very detailed and broad. • Center for Internet Security (CIS) Controls: A set of 18 prioritized set of actions to defend against cyber threats. • COBIT (Control Objectives for Information and Related Technologies): Framework for managing and governing enterprise IT. • PCI-DSS (Payment Card Industry Data Security Standard): Standards for securing credit card transactions. • AICPA for SSAE18: SOC2 Trust Services Criteria • Type 1 audit: Test controls at a particular point in time. • Type2 audit: Test controls of at least 6 consecutive month period.
Made with FlippingBook Learn more on our blog