3.4 - Operate and monitor security platforms (e.g., continuous monitoring)
Source systems (e.g., applications, security appliances, network devices, and hosts)
Events of interest (e.g., anomalies, intrusions, unauthorized changes, compliance monitoring)
Log management
Event aggregation and correlation
3.5 - Analyze monitoring results
Security baselines and anomalies
Visualizations, metrics, and trends (e.g., notifications, dashboards, timelines)
Event data analysis
Document and communicate findings (e.g., escalation)
Domain 4: Incident Response and Recovery
4.1 - Support incident lifecycle e.g., National Institute of Standards and Technology (NIST), International Organization for Standardization (ISO)
Preparation
Detection, analysis and escalation
Containment
Eradication
Recovery
Lessons learned/implementation of new countermeasure
4.2 - Understand and support forensic investigations
Legal (e.g., civil, criminal, administrative) and ethical principles
Evidence handling (e.g., first responder, triage, chain of custody, preservation of scene)
Reporting of analysis
4.3 - Understand and support business continuity plan (BCP) and disaster recovery plan (DRP)
Emergency response plans and procedures (e.g., information system contingency, pandemic, natural disaster, crisis management)
Interim or alternate processing strategies
Restoration planning
Backup and redundancy implementation
Testing and drills
5.1 - Understand cryptography
Confidentiality
Integrity and authenticity
Data sensitivity (e.g., personally identifiable information (PII), intellectual property (IP), protected health information (PHI))
Regulatory and industry best practice (e.g., Payment Card Industry Data Security Standards (PCI-DSS), International Organization for Standardization (ISO))
6.2 - Understand network attacks (e.g., distributed denial of service (DDoS), man-in-the-middle (MITM), Domain Name System (DNS) poisoning) and countermeasures (e.g., content delivery networks (CDN))
6.3 - Manage network access controls
Network access controls, standards and protocols (e.g., Institute of Electrical and Electronics Engineers (IEEE) 802.1X, Remote Authentication Dial-In User Service (RADIUS), Terminal Access Controller Access-Control System Plus (TACACS+))
Logical and physical placement of network devices (e.g., inline, passive, virtual)
Segmentation (e.g., physical/logical, data/control plane, virtual local area network (VLAN), access control list (ACL), firewall zones, micro-segmentation)
Secure device management
6.5 - Operate and configure network-based security devices
Firewalls and proxies (e.g., filtering methods, web application firewalls (WAF)) Intrusion detection systems (IDS) and intrusion prevention systems (IPS)
Network intrusion detection/prevention systems
Routers and switches
Traffic-shaping devices (e.g., wide area network (WAN) optimization, load balancing)
6.6 - Secure wireless communications
Technologies (e.g., cellular network, Wi-Fi, Bluetooth, Near-Field Communication (NFC))