<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Cyber Leader - Balanced Security]]></title><description><![CDATA[At The Cyber Leader, I explore how cybersecurity, certification, and leadership intersect — helping you make confident, balanced decisions in a complex digital world.]]></description><link>https://blog.balancedsec.com</link><image><url>https://substackcdn.com/image/fetch/$s_!56XD!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8e16040-647f-431e-9c78-fd59e9817d23_500x500.png</url><title>The Cyber Leader - Balanced Security</title><link>https://blog.balancedsec.com</link></image><generator>Substack</generator><lastBuildDate>Mon, 18 May 2026 03:50:47 GMT</lastBuildDate><atom:link href="https://blog.balancedsec.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Jeffery Moore]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[jefferymoore@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[jefferymoore@substack.com]]></itunes:email><itunes:name><![CDATA[Jeffery Moore]]></itunes:name></itunes:owner><itunes:author><![CDATA[Jeffery Moore]]></itunes:author><googleplay:owner><![CDATA[jefferymoore@substack.com]]></googleplay:owner><googleplay:email><![CDATA[jefferymoore@substack.com]]></googleplay:email><googleplay:author><![CDATA[Jeffery Moore]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Six Things Adversaries Are Doing With AI]]></title><description><![CDATA[Inside Google's Q2 threat report. What MITRE ATLAS covers, and where it doesn't]]></description><link>https://blog.balancedsec.com/p/six-things-adversaries-are-doing</link><guid isPermaLink="false">https://blog.balancedsec.com/p/six-things-adversaries-are-doing</guid><dc:creator><![CDATA[Jeffery Moore]]></dc:creator><pubDate>Fri, 15 May 2026 13:01:28 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/dc847c36-be7c-46fb-8034-e1828c5fa048_2400x1350.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>For the first time, Google&#8217;s Threat Intelligence Group (GTIG) has identified a threat actor using a zero-day exploit they believe was developed with AI. A criminal group used a large language model to write a working exploit script that bypassed two-factor authentication in a popular open-source admin tool. The group was preparing to use the exploit in a mass-attack campaign when Google identified it and worked with the vendor to disclose and patch the flaw.</p><p>The structural signatures that gave GTIG confidence in the assessment are telling: the exploit script contained a hallucinated CVSS score in its docstrings (the in-code comments left by the developer), a textbook Python format characteristic of AI-generated code, down to extra code that prints the terminal output in color. These are small stylistic tells that a human exploit developer wouldn&#8217;t bother with.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.balancedsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Leader - Balanced Security is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>That&#8217;s the headline finding from GTIG&#8217;s <a href="https://cloud.google.com/blog/topics/threat-intelligence/ai-vulnerability-exploitation-initial-access">Q2 2026 AI Threat Tracker</a>, published May 11. The TLDR version: adversaries have moved beyond basic experimentation to industrial-scale use of generative AI, and they&#8217;re doing several different things with it. Google is calling out specific groups by name, including state-sponsored clusters from China and North Korea, financially motivated cybercrime crews like TeamPCP, and Russia-linked operators targeting Ukraine. Each one uses AI at a specific phase of the attack lifecycle. </p><p>Below, I walk through what they&#8217;re doing and where it lands, mapping each use to the part of the kill chain a CISSP holder already operates against.</p><p>Here&#8217;s a quick tour.</p><h2>Researching their targets</h2><p>Before the attack comes the homework. Adversaries are using large language models to map out their victims. They generate detailed organizational hierarchies for departments such as finance and HR, identify which third-party vendors a target enterprise relies on, and even fingerprint the specific make and model of the computer a high-value executive uses. In one documented case, a threat actor asked an AI model to identify a target&#8217;s laptop from photographs.</p><p>Two China-linked actors stand out. The cluster GTIG tracks as UNC2814 prompts Google&#8217;s Gemini to act as a &#8220;senior security auditor&#8221; or &#8220;C/C++ binary security expert&#8221; before asking it to analyze the firmware of embedded devices like TP-Link routers. A separate China-linked group used a <a href="https://github.com/0x4m4/hexstrike-ai/">public agentic framework called Hexstrike</a>, combined with a knowledge-graph memory system, to maintain persistent state on a target&#8217;s attack surface and pivot autonomously between reconnaissance tools.</p><p>The shared pattern: AI as a research force multiplier. Tasks that used to take a human analyst hours of OSINT can now happen at machine speed.</p><h2>Developing new exploits</h2><p>The identified zero-day matters for what it reveals about how AI changes vulnerability research. The 2FA bypass came from a hardcoded trust assumption in the developer&#8217;s authentication logic. It&#8217;s a high-level semantic flaw that fuzzers and static analyzers routinely miss. AI models, reading the developer&#8217;s intent across the codebase, increasingly find them.</p><h2>Writing stealthier malware</h2><p>AI also appears inside the malware itself. Sometimes it&#8217;s used to hide the malicious code. Sometimes it&#8217;s used to operate it in real time.</p><p>Two Russia-linked malware families, CANFAIL and LONGSTREAM, target Ukrainian organizations and contain LLM-generated decoy code. LONGSTREAM checks the system&#8217;s daylight saving status 32 times in a row, for no operational reason except to make the malicious file look like routine administrative work.</p><p>And then there is PROMPTSPY. The Android backdoor sends the device&#8217;s current screen layout to Google&#8217;s Gemini API and asks the model where to tap next. The model returns coordinates. The malware taps. ESET first identified the malware. GTIG extended the analysis to describe what they call the first widely-reported example of an AI service driving real-time malware behavior in the wild.</p><h2>Industrializing account abuse</h2><p>AI providers cap usage. Attackers don&#8217;t want to be capped. So they industrialized account abuse.</p><p>Two China-linked clusters, UNC6201 and UNC5673, run automated registration pipelines that bypass CAPTCHA and SMS verification to create premium accounts at scale. Middleware aggregators such as Claude-Relay-Service and CLIProxyAPI allow attackers to pool API keys from Gemini, Claude, and OpenAI accounts via a single OpenAI-compatible interface. Anti-detect browsers mask the fingerprints. The whole ecosystem looks professionalized. GTIG documents five tool categories with named examples for each.</p><h2>Manufacturing scale</h2><p>The same scaling impulse shows up in influence operations. The pro-Russia campaign Operation Overload used suspected AI voice cloning to make real journalists appear to say things they never said, splicing the synthetic audio into manipulated video to lend credibility to false narratives. Russia, Iran, China, and Saudi Arabia are all using AI to produce political content at volume, though most of the breakthrough capability claims for these campaigns have not yet appeared in observed operations.</p><h2>Going after the AI supply chain</h2><p>The frontier models themselves are well-defended. So attackers are going after the connecting layers: the libraries, the package managers, the skill marketplaces, and the API gateways that AI systems depend on.</p><p>A cybercrime cluster known as TeamPCP (also tracked as UNC6780) compromised the GitHub repositories of LiteLLM, BerriAI, Trivy, and Checkmarx in late March 2026. They embedded a credential stealer called SANDCLOCK that extracted AWS keys and GitHub tokens from affected build environments. The stolen credentials were sold to ransomware and data-theft-extortion groups, turning a single supply chain compromise into multiple downstream payloads.</p><p>A parallel pattern hit the OpenClaw skill marketplace. Researchers found malicious packages distributed as legitimate skills, containing hidden routines that abused OpenClaw&#8217;s elevated system access to run unauthorized code. Both incidents are supply chain attacks specifically targeting the AI dependency layer.</p><h2>How does MITRE ATLAS help?</h2><p>All six behaviors above need names. Once a threat has a technique ID, you can record it in a risk register, assign an owner, select a control, and audit the result. MITRE ATLAS is the canonical vocabulary for AI-specific adversary tactics, the AI extension of MITRE ATT&amp;CK. <a href="https://blog.balancedsec.com/p/mitre-atlas-the-ai-threat-framework">I previously wrote a longer piece on ATLAS</a> for readers who want the deeper context.</p><p>A question worth asking follows: how well does ATLAS cover what GTIG just documented?</p><p>The answer is partial. Some of GTIG&#8217;s findings map cleanly to pre-existing ATLAS techniques. Several map to techniques MITRE added or updated in their early May  (v5.6.0) release. A handful have no direct ATLAS coverage, but the framework is responsive, and it&#8217;s still catching up.</p><h3>Already in the catalog</h3><p>Four of GTIG&#8217;s findings map to ATLAS techniques that predate the May update:</p><ul><li><p><strong>PROMPTSPY&#8217;s autonomous orchestration</strong> is fully covered. <a href="https://atlas.mitre.org/techniques/AML.T0040">AML.T0040</a> (AI Model Inference API Access), <a href="https://atlas.mitre.org/techniques/AML.T0103">AML.T0103</a> (Deploy AI Agent), <a href="https://atlas.mitre.org/techniques/AML.T0102">AML.T0102</a> (Generate Malicious Commands), and <a href="https://atlas.mitre.org/techniques/AML.T0053">AML.T0053</a> (AI Agent Tool Invocation) describe the architecture pattern PROMPTSPY uses.</p></li><li><p><strong>LLM account abuse and middleware proxies</strong> map to <a href="https://atlas.mitre.org/techniques/AML.T0008.005">AML.T0008.005</a> (AI Service Proxies), <a href="https://atlas.mitre.org/techniques/AML.T0021">AML.T0021</a> (Establish Accounts), and <a href="https://atlas.mitre.org/techniques/AML.T0016.002">AML.T0016.002</a> (Obtain Capabilities: Generative AI). These were added in earlier ATLAS releases.</p></li><li><p><strong>TeamPCP&#8217;s AI supply chain compromise</strong> maps to <a href="https://atlas.mitre.org/techniques/AML.T0010.001">AML.T0010.001</a> (AI Supply Chain Compromise: AI Software).</p></li><li><p><strong>Operation Overload&#8217;s voice-cloning campaign</strong> maps to <a href="https://atlas.mitre.org/techniques/AML.T0088">AML.T0088</a> (Generate Deepfakes), the technique GTIG used in their own appendix to attribute this finding. T0088 covers the synthesis of high-fidelity audio and video to impersonate authoritative figures.</p></li></ul><p>These map straight into a register today without waiting for anything new. </p><h3>Just added</h3><p>ATLAS Data v5.6.0 (<a href="https://atlas.mitre.org">atlas.mitre.org</a>, <a href="https://github.com/mitre-atlas/atlas-data/compare/v5.5.0...v5.6.0">view the diff</a>) added or updated four entries relevant to the behaviors above:</p><ul><li><p><strong>Deepfake-assisted phishing</strong> (<a href="https://atlas.mitre.org/techniques/AML.T0052.001">AML.T0052.001</a>, new) is a phishing-specific subtechnique that extends the pre-existing T0088 Generate Deepfakes. GTIG didn&#8217;t document a deepfake-phishing-specific incident in this report, but ATLAS's addition of this subtechnique signals the framework&#8217;s anticipation of voice cloning moving from influence operations into phishing pretexts (CEO fraud, executive impersonation).</p></li><li><p><strong>Code repository reconnaissance</strong> (<a href="https://atlas.mitre.org/techniques/AML.T0095.000">AML.T0095.000</a>, new subtechnique under the new parent <a href="https://atlas.mitre.org/techniques/AML.T0095">AML.T0095</a> Search Open Websites/Domains) covers the GTIG-documented use of public code repos for AI-related secrets and configuration discovery.</p></li><li><p><strong>LLM Jailbreak</strong> (<a href="https://atlas.mitre.org/techniques/AML.T0054">AML.T0054</a>, updated) now reflects persona-driven prompting patterns, including acting as a &#8220;senior security researcher&#8221; jailbreak that GTIG attributed to UNC2814.</p></li><li><p><strong>OpenClaw command-and-control case study</strong> (<a href="https://atlas.mitre.org/studies/AML.CS0051">AML.CS0051</a>, updated) formalizes the OpenClaw skill marketplace compromise pattern.</p></li></ul><p>The release timing: MITRE published v5.6.0 on May 4. GTIG published their threat report on May 11. The framework was updated in close parallel with the threat intelligence cycle. </p><h3>Not yet in the catalog</h3><p>Three GTIG findings have no dedicated ATLAS technique:</p><ul><li><p><strong>AI-developed zero-day exploits.</strong> The lead finding from the GTIG report, the criminal-actor 2FA bypass developed with AI assistance, doesn&#8217;t have a specific ATLAS technique. The closest is <a href="https://atlas.mitre.org/techniques/AML.T0017">AML.T0017</a> (Develop Capabilities), which is generic. There&#8217;s no &#8220;adversary uses AI to discover vulnerabilities in target systems&#8221; entry.</p></li><li><p><strong>AI-generated polymorphic malware code.</strong> The LLM-generated decoy code in CANFAIL and LONGSTREAM, including LONGSTREAM&#8217;s 32 daylight-saving checks, has no dedicated technique. ATLAS covers prompt-side obfuscation under <a href="https://atlas.mitre.org/techniques/AML.T0068">AML.T0068</a>, but adversary use of AI to generate malware code with camouflage logic isn&#8217;t named.</p></li><li><p><strong>Agentic frameworks as offensive tools.</strong> The PRC-nexus actor using Hexstrike with the Graphiti memory system for autonomous reconnaissance has no matching ATLAS entry. The framework covers adversaries' use of AI inference APIs and includes&nbsp;<a href="https://atlas.mitre.org/techniques/AML.T0103">AML.T0103</a>&nbsp;for deploying defender- or victim-owned agents, but offensive use of full agentic frameworks against victims remains a gap.</p></li></ul><p>The gap is ATLAS-specific. GTIG&#8217;s own appendix maps these findings to conventional <a href="https://attack.mitre.org/">MITRE ATT&amp;CK</a> techniques: <a href="https://attack.mitre.org/techniques/T1587/001/">T1587.001</a> (Develop Capabilities: Malware) for CANFAIL and LONGSTREAM, <a href="https://attack.mitre.org/techniques/T1587/004/">T1587.004</a> (Develop Capabilities: Exploits) for the AI-developed zero-day, <a href="https://attack.mitre.org/techniques/T1027/014/">T1027.014</a> (Polymorphic Code) for PROMPTFLUX, and <a href="https://attack.mitre.org/techniques/T1027/016/">T1027.016</a> (Junk Code Insertion) for the decoy code patterns. Traditional ATT&amp;CK covers the underlying behaviors. ATLAS hasn&#8217;t yet named them in AI-specific form.</p><p>The gap is informative. The biggest single GTIG finding (AI used to develop a real zero-day exploit) sits in the no-direct-mapping bucket. Frameworks update on incident-disclosure timelines, and it makes sense that the threat intelligence is ahead of the vocabulary.</p><h2>How to harness ATLAS</h2><p>Four things a CISSP-led security program can do this quarter with what&#8217;s in front of us:</p><p><strong>1. Map ATLAS technique IDs into your existing risk register.</strong><em> The directly-mapped findings are the easy lift. </em>Risk: AI dependency supply chain compromise. Threat: <a href="https://atlas.mitre.org/techniques/AML.T0010.001">AML.T0010.001</a>. Mitigation: <a href="https://atlas.mitre.org/mitigations/AML.M0023">AML.M0023</a> AI Bill of Materials and <a href="https://atlas.mitre.org/mitigations/AML.M0014">AML.M0014</a> Verify AI Artifacts. Owner: AppSec team. Same structural pattern your ATT&amp;CK-anchored entries already use, with ATLAS-formal mitigation IDs rather than generic supply chain practices.</p><p><strong>2. Add the v5.6.0 techniques where they apply.</strong> Deepfake-assisted phishing belongs in your security awareness training program now, not next year. The technique has a corresponding mitigation (<a href="https://atlas.mitre.org/mitigations/AML.M0034">AML.M0034</a> Deepfake Detection), and your tabletop exercises can use it as a scenario starter. Code repository reconnaissance fits into your secrets management and source control hygiene program.</p><p><strong>3. Document the gaps as monitoring needs.</strong> This is the part most risk registers will miss. For each GTIG finding that doesn&#8217;t have an ATLAS technique (AI-developed zero-days, AI-generated polymorphic malware, offensive agentic frameworks), the register entry should explicitly say <em>&#8220;no standard taxonomy entry; monitor framework releases for coverage.&#8221;</em> A risk register that names where the framework has gaps is stronger than one that pretends the gaps don&#8217;t exist.</p><p><strong>4. Track ATLAS releases.</strong> The framework moved from &#8220;no v5.6.0&#8221; to &#8220;four directly-relevant new entries&#8221; in less than a month after the underlying incidents became publicly known. Release tags live at <a href="https://github.com/mitre-atlas/atlas-data/releases">github.com/mitre-atlas/atlas-data/releases</a>. The canonical user-facing technique pages are at <a href="https://atlas.mitre.org">atlas.mitre.org</a>. Subscribing to release notifications is a one-time setup with ongoing value.</p><p>Six attacker behaviors, named groups behind each, and a framework that&#8217;s partially there. Your risk register needs both the techniques the framework has named and the gaps it hasn&#8217;t.</p><div><hr></div><p><em>Are you seeing any of these six behaviors already in your environment? Reply or drop it in the comments.</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fbUt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4077ac30-2184-4ce8-b044-4624f780c63e_1760x5322.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fbUt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4077ac30-2184-4ce8-b044-4624f780c63e_1760x5322.png 424w, https://substackcdn.com/image/fetch/$s_!fbUt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4077ac30-2184-4ce8-b044-4624f780c63e_1760x5322.png 848w, https://substackcdn.com/image/fetch/$s_!fbUt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4077ac30-2184-4ce8-b044-4624f780c63e_1760x5322.png 1272w, https://substackcdn.com/image/fetch/$s_!fbUt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4077ac30-2184-4ce8-b044-4624f780c63e_1760x5322.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fbUt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4077ac30-2184-4ce8-b044-4624f780c63e_1760x5322.png" width="1456" height="4403" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4077ac30-2184-4ce8-b044-4624f780c63e_1760x5322.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:4403,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:810674,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.balancedsec.com/i/197567165?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4077ac30-2184-4ce8-b044-4624f780c63e_1760x5322.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fbUt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4077ac30-2184-4ce8-b044-4624f780c63e_1760x5322.png 424w, https://substackcdn.com/image/fetch/$s_!fbUt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4077ac30-2184-4ce8-b044-4624f780c63e_1760x5322.png 848w, https://substackcdn.com/image/fetch/$s_!fbUt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4077ac30-2184-4ce8-b044-4624f780c63e_1760x5322.png 1272w, https://substackcdn.com/image/fetch/$s_!fbUt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4077ac30-2184-4ce8-b044-4624f780c63e_1760x5322.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.balancedsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Leader - Balanced Security is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[NIST AI RMF or ISO 42001?]]></title><description><![CDATA[A CISSP-Holder's Guide to Choosing (or Sequencing)]]></description><link>https://blog.balancedsec.com/p/nist-ai-rmf-or-iso-42001</link><guid isPermaLink="false">https://blog.balancedsec.com/p/nist-ai-rmf-or-iso-42001</guid><dc:creator><![CDATA[Jeffery Moore]]></dc:creator><pubDate>Fri, 08 May 2026 13:03:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!K59B!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f8a90d2-61ac-49b8-92bd-33b9eefec2f9_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!K59B!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f8a90d2-61ac-49b8-92bd-33b9eefec2f9_1200x630.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!K59B!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f8a90d2-61ac-49b8-92bd-33b9eefec2f9_1200x630.png 424w, https://substackcdn.com/image/fetch/$s_!K59B!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f8a90d2-61ac-49b8-92bd-33b9eefec2f9_1200x630.png 848w, https://substackcdn.com/image/fetch/$s_!K59B!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f8a90d2-61ac-49b8-92bd-33b9eefec2f9_1200x630.png 1272w, https://substackcdn.com/image/fetch/$s_!K59B!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f8a90d2-61ac-49b8-92bd-33b9eefec2f9_1200x630.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!K59B!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f8a90d2-61ac-49b8-92bd-33b9eefec2f9_1200x630.png" width="1200" height="630" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7f8a90d2-61ac-49b8-92bd-33b9eefec2f9_1200x630.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:630,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69178,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.balancedsec.com/i/196720788?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f8a90d2-61ac-49b8-92bd-33b9eefec2f9_1200x630.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!K59B!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f8a90d2-61ac-49b8-92bd-33b9eefec2f9_1200x630.png 424w, https://substackcdn.com/image/fetch/$s_!K59B!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f8a90d2-61ac-49b8-92bd-33b9eefec2f9_1200x630.png 848w, https://substackcdn.com/image/fetch/$s_!K59B!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f8a90d2-61ac-49b8-92bd-33b9eefec2f9_1200x630.png 1272w, https://substackcdn.com/image/fetch/$s_!K59B!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f8a90d2-61ac-49b8-92bd-33b9eefec2f9_1200x630.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>AI governance has moved from voluntary guidance to enforceable obligation in less than two years. The <a href="https://artificialintelligenceact.eu/">EU AI Act</a> came into force on 1 August 2024. NIST released its AI Risk Management Framework (AI 100-1) in January 2023. ISO/IEC 42001, the first ISO standard for an AI management system, was published in December 2023.</p><p>For CISSP holders, the practical questions are how they fit together and what existing ISO 27001 work actually transfers. In this article, we dive into a comparison of NIST AI RMF and ISO/IEC 42001: how they differ, where they overlap, and which fits which use case.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.balancedsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Leader - Balanced Security is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>The two frameworks at a glance</h2><p><strong>NIST AI RMF (AI 100-1).</strong> Published January 2023 by the U.S. National Institute of Standards and Technology (NIST). Four core functions: <a href="https://blog.balancedsec.com/p/original-inside-the-nist-ai-risk">Govern, Map, Measure, and Manage</a>. Seven trustworthiness characteristics. Four implementation Tiers. The Playbook companion document elaborates on 72 subcategories with suggested actions. <a href="https://nvlpubs.nist.gov/nistpubs/ai/NIST.AI.600-1.pdf">NIST AI 600-1</a> (July 2024) introduces a Generative AI Profile that includes 12 GAI-specific risks. Voluntary, non-certifiable, free to download.</p><p><strong><a href="https://www.iso.org/standard/42001">ISO/IEC 42001:2023</a>.</strong> The AI version of ISO 27001. Published December 2023, it follows the same management system pattern that any 27001-certified organization already operates: leadership commitment, risk assessment, controls, internal audit, management review, and continual improvement. Clauses 4 through 10 are identical in structure to those in ISO 27001 and use the standard ISO management system template (i.e., &#8220;Annex SL-conformant&#8221;) as do other ISO management system standards. What&#8217;s new is the AI-specific control catalog in Annex A: 38 reference controls covering AI policy, roles, resources, system impact assessment, lifecycle management, data, transparency, intended use, and third-party relationships. As with 27001, you produce a Statement of Applicability (SoA) that lists every control and provides a written justification for its inclusion or exclusion. Unlike NIST AI RMF, you can earn a certificate through an accredited third-party audit. Note that reading the standard requires purchasing a license from ISO.</p><p>The two were designed to be readable together. ISO 42001 clause 4.1 NOTE 1 explicitly cross-references NIST AI RMF for AI role types and lifecycle stages.</p><h2>What transfers from existing ISO 27001 work</h2><p>If you have experience with ISO 27001, that muscle memory does most of the work. The <a href="https://www.iso.org/the-iso-survey.html">ISO Survey 2024</a>, published by ISO/IAF CASCO in September 2025, reports 96,709 ISO 27001 certificates and 179,877 sites globally. ISO 27001 ranks fourth among all ISO management system standards by certificate volume, behind only ISO 9001, ISO 14001, and ISO 45001. At a 179,877-to-96,709 ratio of sites to certificates, the average certified organization runs 1.86 sites under one certificate scope.</p><p>What that engagement gives you:</p><ol><li><p><strong>The audit cadence is identical.</strong> Stage 1 documentation review, Stage 2 on-site assessment, annual surveillance audits in years one and two, full recertification in year three. ISO 27001 audit capability (internal audits per clause 9.2, certification body relationships, surveillance preparation) transfers the management-system half of ISO 42001. The AI-specific half (model risk, AI System Impact Assessment, and the new control catalog) is a separate competency that typically requires AI domain expertise, which can be sourced internally or from specialists.</p></li><li><p><strong>The Statement of Applicability is the document that gets audited.</strong> Both standards require it in the same form: a list of every Annex A control, justification for inclusion or exclusion, and management sign-off. ISO 42001 trades 27001&#8217;s 93 information security controls for 38 AI-specific ones. The document discipline transfers.</p></li><li><p><strong>CISSP Domain 1 already covers both.</strong> <a href="https://blog.balancedsec.com/p/ai-security-for-the-cissp-whats-changed">ISC2&#8217;s Exam Guidance for AI (April 2026)</a> cites NIST AI RMF and ISO 42001 as required compliance-tracking frameworks for AI governance professionals.</p></li><li><p><strong>Top management commitment, internal audit, management review, and corrective action.</strong> Same wording in 27001, 42001, and other ISO management system standards. If you&#8217;ve run any of them, you already know these clauses.</p></li><li><p><strong>A crosswalk already exists.</strong> NIST&#8217;s AI Resource Center hosts a <a href="https://airc.nist.gov/docs/NIST_AI_RMF_to_ISO_IEC_42001_Crosswalk.pdf">community-submitted 72-row crosswalk</a> pairing every NIST AI RMF subcategory with the relevant parts of ISO 42001. GOVERN maps to leadership and policy areas. MAP to context-setting and impact-assessment processes. MEASURE maps to monitoring and verification. MANAGE to management review and continual improvement. NIST hosts the crosswalk but doesn&#8217;t endorse it (the <a href="https://airc.nist.gov/airmf-resources/crosswalks/">crosswalk&#8217;s page</a> notes that inclusion doesn&#8217;t imply NIST endorsement of either framework&#8217;s coverage). Use it as a starting reference for your own verification work.</p></li></ol><p>That covers maybe 60% of the work. Here&#8217;s where the muscle memory breaks.</p><h2>What doesn&#8217;t transfer</h2><p><strong>NIST AI RMF asks for use-case-specific Profiles.</strong> An organization deploying both a recommendation engine and a clinical decision support system needs two different Profiles, not one. ISO 27001&#8217;s Statement of Applicability operates at the organizational level rather than on a per-use-case basis, so this is new ground for practitioners coming from ISO 27001.</p><p><strong>ISO 42001 has an outward-facing AI System Impact Assessment (clause 6.1.4) with no clean 27001 analog.</strong> Internal risk assessment looks at consequences for the organization. Impact assessment looks at consequences for individuals, groups, and societies external to it. The closest 27001 analog is supplier risk, but it isn&#8217;t the same shape.</p><p><strong>Annex A is leaner than 27001&#8217;s.</strong> 38 controls across 9 categories versus 27001&#8217;s 93. Lean by design, but it places more weight on the auditor's and implementer's judgment in the SoA. Two 42001-conformant organizations with identical risk profiles can end up with materially different control sets.</p><p><strong>A climate change clause.</strong> ISO 42001 clause 4.1 requires the organization to determine whether climate change is a relevant issue. Inherited from a harmonized update that flowed through 27001, 9001, and other ISO management system standards in 2023 and 2024. The energy footprint of large-model training and inference makes this a real audit-interpretation question, not a paper one.</p><p><strong>NIST has a dedicated Generative AI Profile (AI 600-1).</strong> ISO 42001 is a general-purpose standard. If your AI estate is mostly GenAI, AI 600-1&#8217;s 12 GAI-specific risks give you a more specific risk taxonomy than Annex A does.</p><h2>Which to lead with</h2><p><strong>Lead with NIST AI RMF when</strong> your audience is the engineering organization, your regulatory exposure is U.S.-centric, or you want internal risk discipline before external proof. NIST is free, easy to adopt as a taxonomy, and doesn&#8217;t require a relationship with an audit body.</p><p><strong>Lead with ISO 42001 when</strong> your audience includes procurement, customers, or regulators seeking third-party assurance. When your exposure is EU AI Act-adjacent. When you already have ISO 27001, 9001, or 14001 certified, the harmonized structure makes 42001 a meaningfully smaller delta than going greenfield. ISO 42001 is the path to a certificate. NIST AI RMF is the path to a self-attestation document.</p><p>The pattern teams might settle into is to implement NIST first to establish the taxonomy and lifecycle discipline, then layer ISO 42001 certification on top once the documentation work is complete. According to a Modulos vendor blog (April 2026), teams that go in this order find 42001 certification work substantially easier to land. Caveat worth flagging: Modulos sells an AI governance platform that supports both frameworks, so the framing is shaped by their product, but the structural claim still holds.</p><h2>What doesn&#8217;t map cleanly?</h2><p><strong>NIST AI RMF cannot be audited.</strong> Self-attestation only. If a customer asks for proof, you have your documentation, not a certificate, and of course, ISO 42001 is the path to that certificate.</p><p><strong>Both frameworks predate widespread agentic AI deployment, but their structure was built to flex.</strong> NIST AI 100-1 is January 2023. ISO 42001 is December 2023. Neither directly names the agent stack (multi-agent systems, persistent memory, tool-using agents). In practice, organizations map agentic behaviors onto existing requirements rather than waiting for explicit agent text. ISO 42001&#8217;s risk assessment (clause 6.1.2) and AI system impact assessment (clause 6.1.4) evaluate the degree of autonomy and identify agent-specific risks like prompt injection. Annex A.9 (Use of AI systems) covers responsible-use processes, including human-oversight controls for high-risk agentic workflows. A.6.2.8 (AI system recording of event logs) becomes the audit trail for agent reasoning. A.6.2.6 (AI system operation and monitoring) becomes the drift-detection discipline. Extension frameworks like CSA MAESTRO and the OWASP Agentic Top 10 add technical depth on agent-specific threats, but the management system architecture for governing them is already in 42001.</p><p><strong>The decommissioning gap is the clearest difference.</strong> NIST AI RMF treats the safe retirement of AI systems as a separate step. ISO 42001 doesn&#8217;t have a dedicated decommissioning control. End-of-life gets folded into broader operation and monitoring work. If you run AI systems where retirement has real consequences (regulated industries, customer-facing deployments, and expensive trained models), you&#8217;ll need to build your own decommissioning process beyond what Annex A asks for.</p><p><strong>BS ISO/IEC 42006:2025 is the AI audit qualification standard.</strong> Published by BSI in July 2025. When selecting a certification body for ISO 42001, ask whether their auditors are qualified under 42006. For CISSPs considering an AI audit as a career path, this is the named qualification track.</p><h2>Monday morning</h2><p>If you have an existing ISO 27001 SoA template, pull it. Sit down with the ISO 42001 Annex A controls list. For each of the 38 controls, note &#8220;we do this already / we partially do this / we don&#8217;t do this.&#8221; That 30-minute paper exercise becomes the foundation for an eventual real SoA.</p><p>If you don&#8217;t have a 27001 SoA in your toolkit, start with NIST AI RMF. Read the four functions. Run a one-page self-assessment of where your organization sits on the four Tiers. Two hours of work that helps create a defensible baseline.</p><p>A common implementation failure is starting both frameworks at once and finishing neither. Pick one to lead with, document the decision, and revisit in six months.</p><p>Your CISSP doesn&#8217;t make you an AI governance expert. It makes you the person whose existing risk discipline transfers fastest to the new problem. The frameworks are different. The job is the same.</p><div><hr></div><h2>Sources</h2><p><strong>Primary standards and frameworks</strong></p><ul><li><p>ISO/IEC 42001:2023, <em>Information technology, Artificial intelligence, Management system</em>. ISO/IEC JTC 1 / SC 42, December 2023. <a href="https://www.iso.org/standard/42001">https://www.iso.org/standard/42001</a></p></li><li><p>ISO/IEC 27001:2022, <em>Information security, cybersecurity and privacy protection, Information security management systems, Requirements</em>. ISO/IEC JTC 1 / SC 27, October 2022. <a href="https://www.iso.org/standard/27001">https://www.iso.org/standard/27001</a></p></li><li><p>ISO/IEC 27006:2015 (and revisions), <em>Requirements for bodies providing audit and certification of information security management systems</em>. ISO/IEC JTC 1 / SC 27. <a href="https://www.iso.org/standard/27006">https://www.iso.org/standard/27006</a></p></li><li><p>ISO/IEC 42006:2025, <em>Information technology, Artificial intelligence, Requirements for bodies providing audit and certification of artificial intelligence management systems</em>. ISO/IEC JTC 1 / SC 42, published September 4, 2025. <a href="https://www.iso.org/standard/42006">https://www.iso.org/standard/42006</a>. National adoption available as BS ISO/IEC 42006:2025 via BSI: <a href="https://knowledge.bsigroup.com/products/information-technology-artificial-intelligence-requirements-for-bodies-providing-audit-and-certification-of-artificial-intelligence-management-systems">https://knowledge.bsigroup.com/products/information-technology-artificial-intelligence-requirements-for-bodies-providing-audit-and-certification-of-artificial-intelligence-management-systems</a></p></li><li><p>NIST AI 100-1, <em>Artificial Intelligence Risk Management Framework (AI RMF 1.0)</em>. National Institute of Standards and Technology, January 26, 2023. <a href="https://nvlpubs.nist.gov/nistpubs/ai/NIST.AI.100-1.pdf">https://nvlpubs.nist.gov/nistpubs/ai/NIST.AI.100-1.pdf</a></p></li><li><p>NIST AI RMF Playbook (companion to AI 100-1, 72 subcategories with suggested actions). <a href="https://airc.nist.gov/AI_RMF_Knowledge_Base/Playbook">https://airc.nist.gov/AI_RMF_Knowledge_Base/Playbook</a></p></li><li><p>NIST AI 600-1, <em>Generative AI Profile</em>. NIST, July 2024. <a href="https://nvlpubs.nist.gov/nistpubs/ai/NIST.AI.600-1.pdf">https://nvlpubs.nist.gov/nistpubs/ai/NIST.AI.600-1.pdf</a></p></li><li><p>EU AI Act, Regulation (EU) 2024/1689. Entered into force 1 August 2024. </p></li></ul><p>https://artificialintelligenceact.eu/</p><p><strong>Survey and reference data</strong></p><ul><li><p>ISO/IAF CASCO, <em>The ISO Survey of Management System Standard Certifications, 2024, Explanatory Note</em>. September 2025. <a href="https://iafcertsearch.org/services/iso-survey">https://iafcertsearch.org/services/iso-survey</a></p></li><li><p>ISC2 Cybersecurity Workforce Study (2025) and Exam Guidance for AI (April 2, 2026), via ISC2 Insights. <a href="https://www.isc2.org/research">https://www.isc2.org/research</a></p></li></ul><p><strong>Secondary commentary (with vendor caveats)</strong></p><ul><li><p>Modulos, <em>NIST AI Risk Management Framework: the engineering spec for AI risk</em>. Vendor blog, April 17, 2026. (Modulos sells an AI governance platform supporting both frameworks, and the framing reflects that.)</p></li><li><p><em>NIST AI RMF to ISO/IEC FDIS 42001 AI Management system Crosswalk</em>. Community-submitted, hosted on NIST AI Resource Center. PDF: <a href="https://airc.nist.gov/docs/NIST_AI_RMF_to_ISO_IEC_42001_Crosswalk.pdf">https://airc.nist.gov/docs/NIST_AI_RMF_to_ISO_IEC_42001_Crosswalk.pdf</a>. Listed on the AIRC crosswalks page: <a href="https://airc.nist.gov/airmf-resources/crosswalks/">https://airc.nist.gov/airmf-resources/crosswalks/</a>. NIST hosts but does not endorse the crosswalk. FDIS-stage clause references predate the December 2023 ISO/IEC 42001:2023 publication.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.balancedsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Leader - Balanced Security is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Inside the NIST AI Risk Management Framework]]></title><description><![CDATA[The NIST AI Risk Management Framework is the US government's recommendation for organizations seeking a structured approach to AI risk.]]></description><link>https://blog.balancedsec.com/p/original-inside-the-nist-ai-risk</link><guid isPermaLink="false">https://blog.balancedsec.com/p/original-inside-the-nist-ai-risk</guid><dc:creator><![CDATA[Jeffery Moore]]></dc:creator><pubDate>Fri, 01 May 2026 13:03:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!9Oyr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2e12c36-edab-4989-baf1-34cba19e2dd1_2752x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The <a href="https://nvlpubs.nist.gov/nistpubs/ai/NIST.AI.100-1.pdf">NIST AI Risk Management Framework</a> is the US government's recommendation for organizations seeking a structured approach to AI risk. It was published in January 2023, mandated by the National AI Initiative Act of 2020, and developed through a public consultation process that ran through early 2023.</p><p>The framework is voluntary and non-certifiable. Nobody can audit you against it, and you can self-claim alignment, which is where&nbsp;<a href="http://iso.org/standard/81230.html">ISO 42001</a>&nbsp;comes in as the certifiable counterpart. What RMF gives you is a shared vocabulary. </p><p>NIST also publishes a companion document called the <a href="https://airc.nist.gov/airmf-resources/playbook/">AI RMF Playbook</a>. The framework itself is about 40 pages of principles. The Playbook runs over 140 pages of suggested actions, transparency questions, and reference resources for each piece of the framework. If you only read the framework, you get the abstractions, while most of the operational guidance is in the Playbook.</p><p>This article walks through the four functions at the heart of the framework, using Playbook content to sharpen what each function actually requires.</p><p></p><h2>The four functions at a glance</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9Oyr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2e12c36-edab-4989-baf1-34cba19e2dd1_2752x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9Oyr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2e12c36-edab-4989-baf1-34cba19e2dd1_2752x1536.png 424w, https://substackcdn.com/image/fetch/$s_!9Oyr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2e12c36-edab-4989-baf1-34cba19e2dd1_2752x1536.png 848w, https://substackcdn.com/image/fetch/$s_!9Oyr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2e12c36-edab-4989-baf1-34cba19e2dd1_2752x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!9Oyr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2e12c36-edab-4989-baf1-34cba19e2dd1_2752x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9Oyr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2e12c36-edab-4989-baf1-34cba19e2dd1_2752x1536.png" width="1456" height="813" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a2e12c36-edab-4989-baf1-34cba19e2dd1_2752x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:813,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:5183828,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.balancedsec.com/i/196022341?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2e12c36-edab-4989-baf1-34cba19e2dd1_2752x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9Oyr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2e12c36-edab-4989-baf1-34cba19e2dd1_2752x1536.png 424w, https://substackcdn.com/image/fetch/$s_!9Oyr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2e12c36-edab-4989-baf1-34cba19e2dd1_2752x1536.png 848w, https://substackcdn.com/image/fetch/$s_!9Oyr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2e12c36-edab-4989-baf1-34cba19e2dd1_2752x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!9Oyr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2e12c36-edab-4989-baf1-34cba19e2dd1_2752x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>NIST AI RMF organizes everything around four functions: GOVERN, MAP, MEASURE, and MANAGE. They aren&#8217;t sequential steps. They&#8217;re roles in a system that runs continuously.</p><p>GOVERN sits across the whole framework. It&#8217;s the organizational substrate: policies, accountability, culture, and oversight that make the other three functions possible. MAP, MEASURE, and MANAGE, then run in a loop. MAP establishes the context for understanding a specific AI system. MEASURE tests it against the trustworthiness characteristics NIST defines. MANAGE turns those measurements into prioritization decisions, kill-switch procedures, and disclosures to affected parties. The outputs of all three feed back into GOVERN, which uses them to update policies, roles, and culture over time. The framework is iterative, not linear.</p><h2>GOVERN</h2><p>GOVERN is where the framework starts and where most organizations underinvest. It&#8217;s the function that establishes who&#8217;s responsible for what, what risks the organization is willing to take, how AI work fits into existing accountability structures, and how culture supports raising concerns rather than burying them.</p>
      <p>
          <a href="https://blog.balancedsec.com/p/original-inside-the-nist-ai-risk">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[AI Security for the CISSP: What’s Changed and How to Prepare]]></title><description><![CDATA[On April 2, 2026, ISC2 published the Exam Guidance for Artificial Intelligence, a 25-page document that maps how AI security concepts are woven into each of its nine certification exams.]]></description><link>https://blog.balancedsec.com/p/ai-security-for-the-cissp-whats-changed</link><guid isPermaLink="false">https://blog.balancedsec.com/p/ai-security-for-the-cissp-whats-changed</guid><dc:creator><![CDATA[Jeffery Moore]]></dc:creator><pubDate>Fri, 24 Apr 2026 13:03:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!nkqm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ef76cfb-329a-4cbd-83c9-69a2df8fdb49_816x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>On April 2, 2026, ISC2 published the <em><a href="https://www.isc2.org/Insights/2026/04/ISC2-Publishes-Exam-Guidance-AI">Exam Guidance for Artificial Intelligence</a></em>, a 25-page document that maps how AI security concepts are woven into each of its nine certification exams. If you&#8217;re studying for the CISSP (or maintaining your certification through CPEs), this document provides some insights into the way AI security is incorporated into the CISSP.</p><p>The <a href="https://www.isc2.org/certifications/cissp/cissp-certification-exam-outline">CISSP exam outline,</a>&nbsp;which has been in effect since April 15, 2024, already includes some AI-specific references in several domain objectives. ISC2 didn&#8217;t bolt on a new &#8220;AI Security&#8221; domain. Instead, they distributed AI concepts throughout the existing structure, as they&#8217;ve always handled emerging technology. The difference this time is scale because AI touches every domain, and the Exam Guidance makes that explicit.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.balancedsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Leader - Balanced Security is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Here&#8217;s my take on what changed, and what you need to know.</p><h2>The Dual Pattern</h2><p>Across all eight CISSP domains, AI shows up in two ways:</p><ol><li><p><strong>AI as a system that needs to be secured.</strong> Protecting models, training data, and AI infrastructure from attack: think data poisoning, prompt injection, adversarial inputs, and model theft.</p></li><li><p><strong>AI as a tool you use for defense.</strong> SIEM/SOAR automation, behavioral analytics, anomaly detection, and AI-powered vulnerability scanning.</p></li></ol><p>Understanding which one is being asked will help you reason through unfamiliar scenarios on the exam.</p><h2>What&#8217;s New in Each Domain</h2><p>Here are some AI-related concepts from each domain that I think are the most likely to feel new or foreign to CISSP candidates.</p><h3>Domain 1: Security and Risk Management</h3><p><strong>The new concept: AI supply chain risk.</strong></p><p>You already know third-party risk management. The AI version asks the same governance questions, but about different things. Where does the training data come from? What model is your vendor using, and who trained it? What happens when the model is updated and its behavior changes? CISSPs are now expected to assess AI service providers with the same rigor applied to any critical vendor. The questions are different (data provenance, bias documentation, model transparency), but the framework is the one you already know from Domain 1.</p><h3>Domain 2: Asset Security</h3><p><strong>The new concept: AI-specific asset classification.</strong></p><p>Training datasets, pre-trained models, and model weights are now assets that need to be classified and protected. A pre-trained model is intellectual property. A training dataset may contain PII that triggers privacy mandates. Model weights are a theft target. If your organization&#8217;s data classification scheme doesn&#8217;t account for these asset types, it has a gap.</p><h3>Domain 3: Security Architecture and Engineering</h3><p><strong>The new concept: Prompt injection as an architectural concern.</strong></p><p>This is the domain where the technical specifics of AI attacks intersect with traditional security architecture. Prompt injection is the AI equivalent of SQL injection: untrusted input that manipulates the system&#8217;s behavior. But the defense isn&#8217;t just input validation. It includes architectural decisions about model isolation, output verification, and Explainable AI (XAI), which is the ability to audit why a model produced a specific output. ISC2 frames XAI as a security architecture requirement, not just a nice-to-have.</p><h3>Domain 4: Communication and Network Security</h3><p><strong>The new concept: Network segmentation for AI workloads.</strong></p><p>AI training clusters generate traffic patterns distinct from those of standard enterprise applications and pose unique lateral movement risks. The exam outline now expects CISSPs to understand micro-segmentation and Zero Trust Architecture as applied to AI environments. The goal is the same as always (prevent lateral movement from a compromised interface), but the specific architecture for isolating AI training environments from production networks is new territory.</p><h3>Domain 5: Identity and Access Management</h3><p><strong>The new concept: Non-Human Identity (NHI) governance.</strong></p><p>This one is significant. The CISSP now covers managing identities for AI agents and automated service accounts. That means understanding how to apply the Principle of Least Privilege to a system that might try to escalate its own permissions during learning or execution. It also means understanding the dual problem: you&#8217;re securing the AI&#8217;s identity (what credentials it has, who owns them, and whether it can escalate) while also using AI to make IAM more resilient (behavioral biometrics, adaptive authentication, anomaly detection in login patterns).</p><p>But credential controls alone don&#8217;t solve the problem. As <a href="https://www.linkedin.com/posts/resilientcyber_theres-a-dangerous-assumption-gaining-traction-ugcPost-7452329750947246080-DF78?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAA5wDgBdpFuaomSU0ve-kF8UXFlJvShH8E">Chris Hughes points out</a>, agents don&#8217;t just exist as identities. They use identities to take action. An agent manipulated at runtime through prompt injection or a poisoned tool response will request access through valid paths, receive a properly scoped token, and act exactly as policy allows. Every identity control passes. The breach still happens. The threat model has shifted from &#8220;who holds the key&#8221; to &#8220;who is influencing the decision,&#8221; and static permission models weren&#8217;t designed to answer the latter.</p><p>For context on why this matters: a <a href="https://cloudsecurityalliance.org/press-releases/2026/01/27/79-of-it-pros-feel-ill-equipped-to-prevent-attacks-via-nhi-csa-oasis-survey-finds">2025 CSA survey</a> of 383 security professionals found that only 8% were highly confident their legacy IAM tools could handle AI and NHI risks. Only 22% had formal policies for creating or removing AI identities. Making this more than a hypothetical gap.</p><h3>Domain 6: Security Assessment and Testing</h3><p><strong>The new concept: Red teaming for AI systems.</strong></p><p>Traditional penetration testing looks for software bugs and misconfigurations. AI red teaming tests different things: model robustness against evasion attacks, susceptibility to training data extraction, and &#8220;logic flaws&#8221; in the model&#8217;s output that an adversary could exploit. The Exam Guidance makes clear that CISSPs should understand these as distinct assessment methodologies, not just variations of traditional pen testing.</p><h3>Domain 7: Security Operations</h3><p><strong>The new concept: Model drift as a security operations concern.</strong></p><p>Model drift is what happens when an AI model&#8217;s performance degrades over time. Data scientists have always cared about this. What&#8217;s new is ISC2 framing it as a security operations problem. A model that&#8217;s drifting might be degrading naturally or under adversarial influence. SOC teams need to monitor AI systems as production assets, watching for drift as a potential indicator of compromise rather than just a performance issue.</p><h3>Domain 8: Software Development Security</h3><p><strong>The new concept: AI-generated code risks.</strong></p><p>As organizations adopt AI-generated code to an ever-larger degree, the CISSP is emphasizing the role of security in understanding specific risks. Hallucinated dependencies, where AI references packages that don&#8217;t exist (and an attacker creates a malicious package with that name). Insecure defaults in generated code. Leaked training data in code suggestions. And the AI/ML supply chain: the security of the ML libraries and frameworks your software depends on.</p><h2>How to Prepare</h2><p>If you&#8217;re studying for the CISSP right now, here&#8217;s some practical advice.</p><p><strong>Don&#8217;t panic about depth.</strong> The CISSP is a management-level certification. You don&#8217;t need to know how to build a prompt injection defense, but you need to understand that prompt injection exists, that it&#8217;s an architectural concern, and that the defense involves input validation, model isolation, and output verification. As with other topics, you need to know <em>what</em> and <em>why</em>, not <em>how to implement</em>.</p><p><strong>Distinguish the guidance from the outline.</strong> The Exam Guidance doesn&#8217;t always separate &#8220;the exam outline says this&#8221; from &#8220;here&#8217;s how to think about this in an AI context.&#8221; When it claims the outline integrates AI into shared responsibility models for cloud-based AI services, it&#8217;s most likely reading an AI lens onto an existing objective that already covers shared responsibility generally. The exam outline is the authoritative source for what&#8217;s explicitly tested. Read the Exam Guidance as an interpretive layer. It shows you how existing CISSP concepts apply to AI scenarios, rather than a guarantee that every domain now has standalone AI questions. To know what&#8217;s on the exam, check the outline. To understand how to think about it, read the guidance.</p><p><strong>Learn the vocabulary.</strong> Several AI concepts show up across multiple domains. If you understand these terms, you can reason through scenarios even if the specific question is unfamiliar:</p><ul><li><p><strong>Data poisoning:</strong> Corrupting training data to manipulate model behavior</p></li><li><p><strong>Model drift:</strong> Degradation of model performance over time (natural or adversarial)</p></li><li><p><strong>Prompt injection:</strong> Untrusted input that changes an AI system&#8217;s intended behavior</p></li><li><p><strong>Adversarial attacks:</strong> Inputs specifically crafted to cause model misclassification</p></li><li><p><strong>Non-Human Identity (NHI):</strong> Credentials used by AI agents and automated systems</p></li><li><p><strong>Explainable AI (XAI):</strong> The ability to understand and audit AI decision-making</p></li><li><p><strong>Shadow AI:</strong> Unauthorized use of public AI tools by employees</p></li></ul><p><strong>Map AI to frameworks you already know.</strong> The ISC2 Exam Guidance references several frameworks that connect AI security to traditional CISSP material:</p><ul><li><p><strong>NIST AI RMF (AI 100-1):</strong> The voluntary US framework for AI risk management. Four functions: Govern, Map, Measure, and Manage. This maps directly to Domain 1&#8217;s risk management concepts. If you understand NIST RMF, the structure is familiar.</p></li><li><p><strong>ISO/IEC 42001:</strong> The certifiable AI management system standard. Think of it as ISO 27001 for AI. If you understand the ISO 27001 PDCA cycle, you understand the structure of 42001.</p></li><li><p><strong>OWASP Top 10 for LLMs:</strong> The authoritative vulnerability taxonomy for LLM applications. Prompt injection is #1. If you know the traditional OWASP Top 10, this is the AI equivalent.</p></li></ul><p><strong>Use the dual pattern as a study filter.</strong> When you encounter an AI topic, ask yourself: Is this about securing an AI system or about using AI for defense? That distinction will help you orient quickly to exam questions.</p><p><strong>Read the Exam Guidance itself.</strong> It&#8217;s 25 pages, free, and directly from ISC2. The CISSP section is pages 8 through 10. It won&#8217;t tell you exactly what the exam will ask, but it tells you what ISC2 considers testable. That&#8217;s as close to a study guide as you&#8217;ll get from the source.</p><h2>The Bigger Picture</h2><p>ISC2 folded AI into every existing credential because that&#8217;s how AI works in practice. It isn&#8217;t a separate discipline. It changes how you manage risk, classify assets, design architecture, manage identities, test systems, run a SOC, and secure software.</p><p>The CISSP has always been about breadth. Knowing enough about every domain to make good security decisions. AI extends that expectation.</p><p>If you&#8217;re a current CISSP holder, <a href="https://blog.balancedsec.com/p/you-passed-the-cissp-heres-how-to">this is CPE territory</a>. Pick a framework (NIST AI RMF is a good starting point), learn the vocabulary, and start mapping AI risks to the domains you already understand. While the assets and threats may be different, the governance structure you&#8217;ve learned still applies.</p><p>ISC2 has built out a dedicated learning track for CISSP holders who want to go deeper. The <strong><a href="https://www.isc2.org/professional-development/certificates/build-ai-strategy">ISC2 AI Security Certificate</a></strong> is <a href="https://blog.balancedsec.com/i/190555750/the-credential-options">a standalone credential</a> covering AI attack recognition and mitigation, AI security framework comparisons, and strategies for balancing AI tools with human decision-making (essentially the layer above what the base CISSP AI integration requires). For something more targeted, the&nbsp;<strong><a href="https://www.isc2.org/landing/ai-security-skills#AI%20Express%20Courses">AI Security Express Courses</a></strong>&nbsp;cover specific topics like Generative AI, Secure Development, and AI Integration and Monitoring in a shorter format. If you have five or more years of experience and want to work through the strategic picture with peers, ISC2 also runs in-person and virtual <strong><a href="https://www.isc2.org/landing/ai-security-skills#AI%20Workshops">Securing AI Workshops</a></strong> designed for mid- and senior-level practitioners. The data support doing something: according to ISC2&#8217;s 2025 Cybersecurity Workforce Study, <a href="https://www.isc2.org/Insights/2026/03/how-can-cissps-learn-ai-security-skills">70% of CISSPs are already pursuing additional AI qualifications</a>. The professionals who close this gap now will be the ones asked to lead the governance conversations in their organizations.</p><p>If you&#8217;re a candidate, the governance frameworks you&#8217;re studying are the foundation for AI security. The risk management processes, classification schemes, access control principles, and assessment methodologies all apply. What&#8217;s new is the threat surface inside each one: the poisoning vectors, the non-deterministic outputs, the identity challenges that come with autonomous agents. The Exam Guidance information gives you a map of what to learn.</p><p>The structure you&#8217;ve studied is the starting point.</p><div><hr></div><p><em>CISSP relevance: All 8 domains. Domain 1 (AI governance, supply chain risk), Domain 2 (AI asset classification), Domain 3 (prompt injection, XAI), Domain 4 (AI network segmentation), Domain 5 (NHI governance), Domain 6 (AI red teaming), Domain 7 (model drift monitoring), Domain 8 (AI-generated code risks).</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nkqm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ef76cfb-329a-4cbd-83c9-69a2df8fdb49_816x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nkqm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ef76cfb-329a-4cbd-83c9-69a2df8fdb49_816x1024.png 424w, https://substackcdn.com/image/fetch/$s_!nkqm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ef76cfb-329a-4cbd-83c9-69a2df8fdb49_816x1024.png 848w, https://substackcdn.com/image/fetch/$s_!nkqm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ef76cfb-329a-4cbd-83c9-69a2df8fdb49_816x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!nkqm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ef76cfb-329a-4cbd-83c9-69a2df8fdb49_816x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nkqm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ef76cfb-329a-4cbd-83c9-69a2df8fdb49_816x1024.png" width="816" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0ef76cfb-329a-4cbd-83c9-69a2df8fdb49_816x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:816,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:113007,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.balancedsec.com/i/194949102?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ef76cfb-329a-4cbd-83c9-69a2df8fdb49_816x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nkqm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ef76cfb-329a-4cbd-83c9-69a2df8fdb49_816x1024.png 424w, https://substackcdn.com/image/fetch/$s_!nkqm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ef76cfb-329a-4cbd-83c9-69a2df8fdb49_816x1024.png 848w, https://substackcdn.com/image/fetch/$s_!nkqm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ef76cfb-329a-4cbd-83c9-69a2df8fdb49_816x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!nkqm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ef76cfb-329a-4cbd-83c9-69a2df8fdb49_816x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.balancedsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Leader - Balanced Security is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[A Security Guide for Building Agentic AI Applications]]></title><description><![CDATA[I&#8217;ve recently been spending time reading about agentic AI security frameworks such as MITRE ATLAS, MAESTRO, and the OWASP Agentic Top 10 to better understand how to build agentic systems more securely.]]></description><link>https://blog.balancedsec.com/p/a-security-guide-for-building-agentic</link><guid isPermaLink="false">https://blog.balancedsec.com/p/a-security-guide-for-building-agentic</guid><dc:creator><![CDATA[Jeffery Moore]]></dc:creator><pubDate>Fri, 17 Apr 2026 13:03:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!l_vj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6195d141-fbf4-433e-b86a-9b05860f1276_1938x1245.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I&#8217;ve recently been spending time reading about agentic AI security frameworks such as MITRE ATLAS, MAESTRO, and the OWASP Agentic Top 10 to better understand how to build agentic systems more securely.</p><p>There are two specific guides that help answer that question more directly. The first is the <a href="https://genai.owasp.org">OWASP Securing Agentic Applications Guide</a> (80 pages, July 2025), an engineering manual from the same team behind the Agentic Top 10. The second is Casaba Security&#8217;s <a href="https://www.casaba.com/agentic-ai-security-guide/">Agentic AI Security Guide</a> (v1.2, April 2026), written by a penetration testing firm based on findings from actual engagements.</p><p>Between the two, you get both the framework and the field report. Here&#8217;s what I think matters, organized around the risks that show up in practice and the architectural decisions that address them.</p><h3>A useful starting point</h3><p>Before getting into specifics, one concept from the OWASP guide is worth mentioning first. The guide decomposes &#8220;an agent&#8221; into six Key Components (KC1 through KC6): the language model (KC1), orchestration and control flow (KC2), reasoning and planning (KC3), memory (KC4), tool integration (KC5), and the operational environment (KC6). Each has its own attack surface, and the risks below target specific components. This matters because you can&#8217;t secure a system you haven&#8217;t decomposed. I&#8217;m betting that teams mapping their agent to these six components will find gaps in KC4 (memory) and KC6 (operational environment), the components that existing threat models don&#8217;t cover well.</p><h2>Untrusted Data Reaching the Control Plane</h2><p>The risk that underlies almost everything else in agentic security is indirect prompt injection, what the research community calls XPIA. Most people think of prompt injection as a user typing something malicious into a chat box. The indirect version is harder to spot. The injection comes from the data the agent processes, not from the user: documents in RAG indices, tool outputs, emails, web pages, API responses, CRM records. Anywhere the agent reads untrusted data, an attacker can plant instructions.</p><p>Casaba breaks XPIA into four attack surfaces. Perception-layer injection hides instructions in content the agent ingests, but humans can&#8217;t see (e.g., CSS display: none, HTML comments, aria-label attributes). Research shows these alter agent outputs in <a href="https://arxiv.org/abs/2509.05831">15-29% of tested cases</a>. Instead of injecting explicit commands, the attacker fills the source content with confident, authoritative language that leans in a particular direction. The agent isn&#8217;t being told what to say. But when most of what it reads carries the same framing, its synthesis reflects that framing. There&#8217;s no payload to detect because the attack is in the aggregate rather than in any single document. </p><p>Memory and learning attacks corrupt stored context, so the compromise persists across sessions. Action-layer attacks embed explicit instruction sequences in external resources that, when ingested, override safety alignment.</p><p><strong>The architectural response: separate the data plane from the control plane.</strong> This is the single most important design decision. The OWASP guide highlights <a href="https://arxiv.org/abs/2503.18813">Google&#8217;s CaMeL</a> as the cleanest conceptual model. A privileged LLM receives only trusted inputs and generates control flow (which tools to call, in what order). A quarantined LLM processes untrusted data (web content, email bodies, retrieved documents) and has no access to tools. Prompt injection in a retrieved document hits the quarantined LLM, which can&#8217;t invoke tools. The injection has nowhere to go. CaMeL also isolates memory: the quarantined LLM&#8217;s context doesn&#8217;t leak into the privileged LLM&#8217;s memory, which prevents poisoned data from influencing future control flow decisions.</p><p>CaMeL remains a research architecture. A <a href="https://arxiv.org/abs/2505.22852">follow-up paper</a> (May 2025) adds prompt screening, tiered-risk access, and output auditing, but no production deployments have been published. What is shipping in production is the underlying principle: external enforcement layers that sit between the agent and its tools. <a href="https://www.globenewswire.com/news-release/2026/03/23/3260474/0/en/Check-Point-Launches-AI-Defense-Plane-to-Secure-the-Agentic-Enterprise-at-Scale.html">Check Points</a>, <a href="https://zenity.io/platform/ai-observability">Zenity&#8217;s runtime agent monitor</a>, <a href="https://github.com/lasso-security/mcp-gateway">Lasso Security&#8217;s MCP Gateway</a>, and <a href="https://airia.com/managing-ai-risk-first-third-party-agents/">Airia&#8217;s model-agnostic control plane </a>all enforce the same boundary: untrusted content can&#8217;t directly trigger tool invocations. They do it through runtime policy engines and gateways rather than a second LLM, but the design principle is identical.</p><p><strong>What to watch for:</strong> Any workflow where an agent retrieves or processes content from sources outside your direct control. Email summarizers, web research agents, document analyzers, RAG-based assistants. All are at high risk for XPIA.</p>
      <p>
          <a href="https://blog.balancedsec.com/p/a-security-guide-for-building-agentic">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Combining MAESTRO and ATLAS For AI Threat Modeling]]></title><description><![CDATA[My previous article covered MITRE ATLAS at some depth: what it is, why it matters, and how the maturity filter (Feasible, Demonstrated, Realized) makes it a practical prioritization tool rather than just a theoretical catalog.]]></description><link>https://blog.balancedsec.com/p/after-atlas-why-maestro-is-the-threat</link><guid isPermaLink="false">https://blog.balancedsec.com/p/after-atlas-why-maestro-is-the-threat</guid><dc:creator><![CDATA[Jeffery Moore]]></dc:creator><pubDate>Fri, 10 Apr 2026 13:03:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!UMXh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98405223-634b-4704-a225-02054a0206f2_3064x3354.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>My <a href="https://blog.balancedsec.com/p/mitre-atlas-the-ai-threat-framework">previous article</a> covered <a href="https://atlas.mitre.org/">MITRE ATLAS</a> at some depth: what it is, why it matters, and how the maturity filter (Feasible, Demonstrated, Realized) makes it a practical prioritization tool rather than just a theoretical catalog. If you haven&#8217;t read it, the short version is that ATLAS gives security teams a structured vocabulary for AI-targeted attacks, grounded in what adversaries have actually done. Fifty of its 167 techniques have been confirmed or &#8220;Realized&#8221; (another 121 are rated but unconfirmed; 46 remain unrated). That&#8217;s the part worth holding onto with this article.</p><p>Because here&#8217;s what ATLAS doesn&#8217;t cover: it can&#8217;t tell you how an attack might unfold in a system you&#8217;re building or defending right now, especially if that system involves autonomous agents with persistent memory, tool access, and the ability to spawn sub-agents. For a traditional web application, a retrospective TTP catalog is usually enough. The architecture is stable, and past patterns predict future ones with reasonable accuracy. Agentic AI doesn&#8217;t behave that way. An autonomous agent that can browse the web, call external APIs, write files, and delegate tasks to other agents creates an attack surface that&#8217;s still generating its first wave of documented incidents. The ATLAS case study record hasn&#8217;t caught up with what&#8217;s already in production.</p><p>That&#8217;s where MAESTRO comes in.</p><h2>What MAESTRO Is and What Problem It&#8217;s Actually Solving</h2><p>MAESTRO (Multi-Agent Environment, Security, Threat, Risk, and Outcome) was <a href="https://cloudsecurityalliance.org/blog/2025/02/06/agentic-ai-threat-modeling-framework-maestro">published in February 2025 by Ken Huang</a>, co-chair of the CSA AI Safety Working Group. The framework&#8217;s central premise is that traditional threat modeling approaches weren&#8217;t designed for systems that make autonomous decisions, adapt behavior over time, and coordinate with other agents across trust boundaries.</p><p>That&#8217;s not a provocative claim. STRIDE models systems as static data flows between defined components (relying on Data Flow Diagrams to visualize a system at a specific point in time). PASTA&#8217;s attack simulation model assumes the system being analyzed has deterministic, bounded behavior, with no mechanism to represent a system that autonomously modifies its own goals or behavior at runtime. </p><p>Neither has a mechanism to address threats arising from goal misalignment, autonomous decision-making, or multi-agent collusion. A <a href="https://arxiv.org/abs/2508.10043">peer-reviewed 2025 study</a> (Zambare, Thanikella, and Liu at Texas Tech University) reviewed existing frameworks and directly confirmed the gap, noting that STRIDE &#8220;does not model emergent behavior, cognitive reasoning of AI agents very well.&#8221; The OWASP Agentic Security Initiative <a href="https://genai.owasp.org/resource/agentic-ai-threats-and-mitigations/">reached the same conclusion</a>, ultimately endorsing MAESTRO as a comprehensive extension of STRIDE for handling Agentic AI.</p><p>MAESTRO&#8217;s answer is a seven-layer reference architecture, each with its own mapped threat categories: Foundation Models (L1), Data Operations (L2), Agent Frameworks (L3), Deployment and Infrastructure (L4), Evaluation and Observability (L5), Security and Compliance as a vertical layer that cuts across all others (L6), and Agent Ecosystem (L7).</p><p>What that structure forces, and what classical frameworks don&#8217;t, is cross-layer analysis. Take a <a href="https://docs.langchain.com/oss/python/langchain/rag">LangChain-based agent with RAG</a> access. STRIDE treats it as a system with data flows. MAESTRO requires you to analyze it at L2 (the vector database is a poisoning surface), L3 (the framework itself is a supply chain risk), and L7 (the agent faces tool manipulation and identity attacks in the ecosystem it operates in). In other words, STRIDE asks, &#8220;Can someone tamper with the data moving through this system?&#8221; MAESTRO asks, &#8220;Can someone corrupt what the AI knows, compromise the tools it was built with, and manipulate who it trusts in the world it operates in,&#8221; and treats each of those as a separate, distinct problem requiring separate analysis.</p><p>Each layer carries its own threat categories, and a compromise in one doesn&#8217;t stay contained. <a href="https://arxiv.org/abs/2508.10043">Researchers at Texas Tech confirmed this empirically</a>: poisoning a single memory file in L2 caused measurable performance degradation in L4 and L5 without altering any system logic. In essence, someone edited a JSON file, inserting fake high-severity attack entries that the agent reads. The agent didn&#8217;t break, but it degraded silently. The attack entered at L2 (data operations &#8212; the memory file). It affected L3 (the tuning module changed its behavior). That caused resource exhaustion at L4 (infrastructure) and degraded observability at L5 (the monitoring system itself became less responsive). One layer&#8217;s compromise propagated through three others without directly touching any of them. STRIDE would model the JSON file as a data integrity issue at one point in the system. It wouldn&#8217;t predict that corrupting the file would degrade the monitoring infrastructure two layers away. </p><p>The striking fact is that a single JSON file with no code access caused an autonomous security agent to silently misjudge its environment and waste resources defending against nonexistent threats, while potentially missing those that did exist. </p><p>That&#8217;s the kind of threat STRIDE doesn&#8217;t surface. MAESTRO does.</p><h2>Where the Real Threats Live</h2><p>Not all seven layers carry equal risk. Three of them deserve immediate attention.</p><p>L2 (Data Operations) is where the most operationally mature threat activity currently resides. <a href="https://atlas.mitre.org/tactics/AML.TA0003">ATLAS&#8217;s Resource Development tactic</a> shows 9 of 13 rated techniques are &#8220;Realized&#8221;, meaning adversaries have already industrialized data poisoning against retrieval systems. Any organization running a production RAG pipeline should treat L2 threat modeling as urgent, and the Texas Tech cascade described above began here, with a single poisoned file.</p><p>L7 (Agent Ecosystem) is where agentic AI diverges most sharply from everything that came before. Agent impersonation, tool squatting, rug pull attacks against MCP integrations, and compromised discovery registries, none of which have classical equivalents. SesameOp (<a href="https://atlas.mitre.org/studies/AML.CS0042">ATLAS case study AML.CS0042</a>) confirmed adversaries are already using legitimate AI service APIs as covert C2 channels. That&#8217;s a fully &#8220;Realized&#8221; L7 attack chain. What makes L7 defense especially difficult is the governance baseline organizations are actually starting from. A <a href="https://cloudsecurityalliance.org/press-releases/2026/01/27/79-of-it-pros-feel-ill-equipped-to-prevent-attacks-via-nhi-csa-oasis-survey-finds">2025 CSA survey</a> of 383 IT and security professionals found that 51% have no clear ownership of AI identities, and over 16% don&#8217;t track when new AI credentials are created. MAESTRO&#8217;s L7 threat categories assume someone is watching the identity layer. Most organizations aren&#8217;t.</p><p>L1 (Foundation Models) receives less operational attention, but two threat classes are particularly relevant for compliance-sensitive environments. Backdoor attacks embed hidden triggers in fine-tuned models that remain dormant until a specific input activates them. Membership inference attacks let an adversary determine whether specific records were used in training. That&#8217;s a direct HIPAA or GDPR exposure for any organization fine-tuning on sensitive data.</p><h2>Using ATLAS and MAESTRO Together</h2><p>The two frameworks solve different parts of the same problem. MAESTRO generates a systematic threat list from the architecture up. ATLAS tells you which items on that list adversaries have confirmed in the wild. </p><p>The workflow that combines them is straightforward. Take each layer of your system and ask: what could go wrong here? That&#8217;s the MAESTRO step. Then check ATLAS for each threat you&#8217;ve identified: has anyone actually done this? If a technique is tagged &#8220;Realized,&#8221; it moves to the top of your risk register. If it&#8217;s &#8220;Demonstrated&#8221; or &#8220;Feasible,&#8221; it still matters, but it&#8217;s not yet confirmed in the wild. The <a href="https://cloudsecurityalliance.org/artifacts/agentic-ai-red-teaming-guide">CSA Agentic Red Teaming Guide</a> then provides concrete test procedures you can run against each layer to validate whether your system is actually exposed.</p><p>The Texas Tech study is the clearest argument for why you need both. The L2-to-L4/L5 cascade, the researchers confirmed, had no corresponding &#8220;Realized&#8221; ATLAS technique at the time of publication. MAESTRO predicted the attack class. ATLAS didn&#8217;t have the incident. That&#8217;s exactly where the combined methodology earns its keep.</p><p>One honest caveat: <a href="https://blog.balancedsec.com/i/192897012/the-maturity-slider-a-practical-prioritization-tool">46 of ATLAS&#8217;s 167 native techniques are unrated</a> (as of this writing), and most are newer agentic additions. The &#8220;Realized&#8221; filter works well for L2 and L4 threats. For L7, it&#8217;s less discriminating. Treat more L7 items as &#8220;Demonstrated&#8221; rather than &#8220;Realized&#8221; until the incident record catches up.</p><h2>What This Pairing Doesn&#8217;t Solve</h2><p>MAESTRO doesn&#8217;t yet have a formal specification. No versioning, no conformance testing, no defined scoring methodology that I could find. <a href="https://arxiv.org/abs/2603.23801">The AgentRFC framework from Dartmouth and Palo Alto Networks</a> produced companion security principles with formal conformance language. MAESTRO doesn&#8217;t operate at that level of rigor, and practitioners building repeatable assessment processes will hit that ceiling.</p><p>Both frameworks share a documented scope gap. <a href="https://atlas.mitre.org/resources/ai-security-101">ATLAS explicitly excludes malicious use of AI against non-AI targets</a>, and MAESTRO follows the same boundary. AI-enhanced phishing, AI-automated vulnerability discovery, and deepfake-assisted social engineering aren&#8217;t covered. If your threat model needs to include those vectors, you&#8217;re working outside both frameworks.</p><p>There&#8217;s also no native scoring engine. <a href="https://aivss.owasp.org/">OWASP&#8217;s Agentic Vulnerability Scoring System</a> needs to be applied separately for quantitative prioritization.</p><p>And the constraint that no framework resolves: the CSA NHI survey found only 8% of organizations are highly confident their legacy IAM can handle AI and NHI risks, and 24% take more than 24 hours to revoke a compromised credential after an exposure event. A rigorous threat model is only as useful as the organization&#8217;s ability to act on it. Closing that operational gap is a separate, harder problem.</p><h2>Where to Start</h2><p>The combined methodology reduces to three questions applied to any AI system your organization operates.</p><p>1. What does your AI system actually touch? Map your system against MAESTRO&#8217;s seven layers. In practice, this means listing: which foundation model you use (L1), what data sources feed it and where they&#8217;re stored (L2), which framework or platform it&#8217;s built on (L3), where it runs and who manages that infrastructure (L4), how you monitor its behavior and measure its performance (L5), and what external tools, APIs, or other agents it can access (L7). Many teams will discover layers they haven&#8217;t thought about as attack surfaces, particularly L2 (the data the AI trusts) and L7 (the tools and services it connects to).</p><p> 2. Which of those layers have confirmed attacks in the wild? Cross-reference your layer map against ATLAS. Start with L2: nine of thirteen techniques in ATLAS&#8217;s Resource Development tactic are &#8220;Realized,&#8221; meaning adversaries have demonstrated them in real incidents. If your AI system ingests external data &#8212; retrieval-augmented generation, fine-tuning on user data, or any pipeline that feeds information to the model &#8212; that&#8217;s your most evidence-backed risk. Any layer where ATLAS shows &#8220;Realized&#8221; techniques goes to the top of your risk register.</p><p> 3. Can you actually detect and respond if something goes wrong? This is where most organizations hit the real gap. MAESTRO&#8217;s L5 (Evaluation and Observability) asks whether your monitoring can detect a compromised AI agent, not just whether the system is up, but whether it&#8217;s making trustworthy decisions. And the governance question is unavoidable: the CSA NHI survey found 51% of organizations have no clear ownership of AI identities. If no one owns the AI identity layer, your threat model describes a problem that nobody is accountable for fixing. </p><p>For CISSP holders, questions 1 and 2 fall under Domain 1 (Security and Risk Management). Question 3 spans Domain 8 (Software Development Security) for the monitoring and testing controls, and Domain 1 again for the governance structure. The CSA Agentic Red Teaming Guide provides executable test procedures for each MAESTRO layer once you&#8217;ve completed the mapping.</p><p>Assign ownership first. Then model the threats.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UMXh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98405223-634b-4704-a225-02054a0206f2_3064x3354.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UMXh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98405223-634b-4704-a225-02054a0206f2_3064x3354.png 424w, https://substackcdn.com/image/fetch/$s_!UMXh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98405223-634b-4704-a225-02054a0206f2_3064x3354.png 848w, https://substackcdn.com/image/fetch/$s_!UMXh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98405223-634b-4704-a225-02054a0206f2_3064x3354.png 1272w, https://substackcdn.com/image/fetch/$s_!UMXh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98405223-634b-4704-a225-02054a0206f2_3064x3354.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UMXh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98405223-634b-4704-a225-02054a0206f2_3064x3354.png" width="1456" height="1594" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/98405223-634b-4704-a225-02054a0206f2_3064x3354.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1594,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:611092,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.balancedsec.com/i/193506702?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98405223-634b-4704-a225-02054a0206f2_3064x3354.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UMXh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98405223-634b-4704-a225-02054a0206f2_3064x3354.png 424w, https://substackcdn.com/image/fetch/$s_!UMXh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98405223-634b-4704-a225-02054a0206f2_3064x3354.png 848w, https://substackcdn.com/image/fetch/$s_!UMXh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98405223-634b-4704-a225-02054a0206f2_3064x3354.png 1272w, https://substackcdn.com/image/fetch/$s_!UMXh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98405223-634b-4704-a225-02054a0206f2_3064x3354.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[MITRE ATLAS: The AI Threat Framework Every Security Leader Needs to Know ]]></title><description><![CDATA[In March 2016, Microsoft launched Tay, a Twitter-based chatbot designed to learn from conversations with users and respond in kind.]]></description><link>https://blog.balancedsec.com/p/mitre-atlas-the-ai-threat-framework</link><guid isPermaLink="false">https://blog.balancedsec.com/p/mitre-atlas-the-ai-threat-framework</guid><dc:creator><![CDATA[Jeffery Moore]]></dc:creator><pubDate>Fri, 03 Apr 2026 13:03:57 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!AHMS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F304bd7b2-33f4-4cd3-bd2b-d5764eb5288b_3364x1256.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In March 2016, Microsoft launched Tay, a Twitter-based chatbot designed to learn from conversations with users and respond in kind. Within 24 hours, some Twitter users began trolling it, tweeting, among other things, politically incorrect phrases and sending it inflammatory messages until it began producing them on its own. Microsoft pulled the plug the next day.</p><p>The attack wasn&#8217;t sophisticated in any traditional sense. No CVE was exploited. No credentials were stolen. No network was breached. It was simply provided inputs through the interface the system was designed to accept, and the model&#8217;s own learning mechanism turned those inputs into a weapon against itself. If you tried to map that attack to MITRE ATT&amp;CK at the time, you&#8217;d come up empty. The attack surface wasn&#8217;t an endpoint or a network. It was the model&#8217;s relationship with its training data.</p><p>That gap, the space between what ATT&amp;CK covers and what AI systems actually expose, is exactly what <a href="http://atlas.mitre.org">MITRE ATLAS</a> was built to fill.</p><p>ATLAS stands for Adversarial Threat Landscape for Artificial-Intelligence Systems. It&#8217;s a structured knowledge base of adversary tactics, techniques, and real-world case studies specifically targeting AI and machine learning systems. Think of it as ATT&amp;CK&#8217;s purpose-built extension into territory that traditional threat frameworks never modeled: data pipelines, model architectures, inference APIs, and training processes. As of today, ATLAS documents 16 tactics and 167 techniques across 57 case studies, with 35 mapped mitigations, and the framework is actively growing.</p>
      <p>
          <a href="https://blog.balancedsec.com/p/mitre-atlas-the-ai-threat-framework">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[ISACA’s AAISM: The First AI Security Management Certification, Examined]]></title><description><![CDATA[By The Cyber Leader | balancedsec.com]]></description><link>https://blog.balancedsec.com/p/isacas-aaism-the-first-ai-security</link><guid isPermaLink="false">https://blog.balancedsec.com/p/isacas-aaism-the-first-ai-security</guid><dc:creator><![CDATA[Jeffery Moore]]></dc:creator><pubDate>Fri, 20 Mar 2026 13:03:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!XNfj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9b6c243-7dfe-41c1-b394-72e687d6eb73_1080x1276.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><p><em>By The Cyber Leader | balancedsec.com</em></p><p>In August 2025, ISACA did something long overdue. They launched a certification built specifically for security managers who need to deal with AI. Not data scientists. Not ML engineers. Security managers.</p><p>The timing wasn&#8217;t subtle. Organizations were already deploying AI systems across their operations, and most had no one formally responsible for securing those deployments. ISC2&#8217;s <a href="https://www.isc2.org/Insights/2025/07/ISC2-Launches-AI-Certificate">2025 AI Adoption Survey</a> found that over one-third of surveyed cybersecurity professionals cited AI as the biggest skills shortfall on their teams, and 42% said they&#8217;re actively exploring or testing AI-focused security tools. ISACA&#8217;s response was the <a href="https://www.isaca.org/credentialing/aaism">Advanced in AI Security Management (AAISM)</a>: a credential designed to sit atop existing security management expertise and extend it into AI governance, risk, and technical controls.</p><p>I believe it&#8217;s the first certification that treats AI security as a management and leadership discipline rather than as a demonstration of technical knowledge. For CISSP or CISM holders, it&#8217;s the most directly relevant option on the market right now. But &#8220;first&#8221; doesn&#8217;t automatically mean &#8220;complete,&#8221; and the certification has limitations worth understanding before you charge the card.</p>
      <p>
          <a href="https://blog.balancedsec.com/p/isacas-aaism-the-first-ai-security">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The CISSP Holder's Guide to AI Security Credentials]]></title><description><![CDATA[As part of my ongoing search for ways to stay current while earning CISSP CPE credits, I decided to take a closer look at AI-related certifications.]]></description><link>https://blog.balancedsec.com/p/the-cissp-holders-guide-to-ai-security</link><guid isPermaLink="false">https://blog.balancedsec.com/p/the-cissp-holders-guide-to-ai-security</guid><dc:creator><![CDATA[Jeffery Moore]]></dc:creator><pubDate>Fri, 13 Mar 2026 13:00:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zt7a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd462303a-0995-4724-bc63-73cbee216e92_1200x840.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>As part of my ongoing search for ways to stay current while earning CISSP CPE credits, I decided to take a closer look at AI-related certifications. The certification market for securing AI blew up in 2024 and 2025. ISC2, ISACA, CompTIA, IAPP, and a growing roster of smaller vendors all rushed to plant their flags. </p><p>And for good reason &#8212; we&#8217;re all feeling it. In the face of an increasing rate of change and a plethora of new tools, securing what is already in adoption can feel overwhelming. <a href="https://www.isc2.org/Insights/2025/07/ISC2-Launches-AI-Certificate">ISC2&#8217;s 2025 AI Adoption Survey</a> found that over one-third of surveyed cybersecurity professionals cited AI as the biggest skills shortfall on their teams, and 42% said they&#8217;re actively exploring or testing AI-focused security tools. But the good news is that you don&#8217;t need to start from scratch. Your CISSP already covers substantial ground in organizational security, risk management, and governance, which is exactly the foundation you need to develop real expertise in securing AI. The work is to figure out which gaps your next credential should fill and avoid paying for knowledge you already have.</p>
      <p>
          <a href="https://blog.balancedsec.com/p/the-cissp-holders-guide-to-ai-security">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[You Passed the CISSP. Here’s How to Keep It (Without Losing Your Mind)]]></title><description><![CDATA[I passed the CISSP last April.]]></description><link>https://blog.balancedsec.com/p/you-passed-the-cissp-heres-how-to</link><guid isPermaLink="false">https://blog.balancedsec.com/p/you-passed-the-cissp-heres-how-to</guid><dc:creator><![CDATA[Jeffery Moore]]></dc:creator><pubDate>Fri, 06 Mar 2026 14:03:24 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/f78bd14e-ea83-4724-9eb3-32d4a6492ca0_1080x1665.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I passed the CISSP last April. Got officially credentialed in June. And as of right now, I haven&#8217;t registered a single CPE credit. True story.</p><p>So I just went down the rabbit hole of ISC2&#8217;s documentation to figure out what I&#8217;m up against. The CPE maintenance system is more flexible, more forgiving, and more useful than I expected. It just takes a little effort up front to understand. This is the guide I wish I&#8217;d had the day after the exam.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.balancedsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Leader - Balanced Security is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>When ISC2 activates your certification, a three-year clock starts. On it: 120 CPE credits, a $135 annual maintenance fee, and enough administrative detail to trip up people who aren&#8217;t paying attention.</p><h2>The Numbers (And the One Everyone Gets Wrong)</h2><p>The CISSP requires 120 CPE credits over a three-year cycle, split between two groups:</p><ul><li><p><strong>Group A credits:</strong> 90 over three years (domain-related activities)</p></li><li><p><strong>Group A or B credits:</strong> 30 over three years (can be either type)</p></li></ul><p>You&#8217;ll see &#8220;40 credits per year&#8221; repeated everywhere. Here&#8217;s what most guides don&#8217;t tell you: that number is <em>suggested</em>, not mandatory. ISC2&#8217;s Certification Maintenance Handbook is explicit. There is no annual minimum for CISSP holders. Associates have a hard annual requirement, but full CISSP holders could technically earn 0 in year one, 0 in year two, and 120 in year three. I wouldn&#8217;t recommend it (this is a &#8220;don&#8217;t do as I do&#8221; statement), but the flexibility exists.</p><p>One more mechanic that flies under the radar: rollover credits. If you overshoot during the final six months of your cycle, up to 40 Group A credits automatically carry into your next cycle. Only Group A, only from the last six months. But it&#8217;s a free head start that most people leave on the table because they don&#8217;t know it exists.</p><p>The Annual Maintenance Fee is $135, due on the anniversary of your certification date (not January 1, which catches some people who set calendar reminders on the wrong date). If you hold multiple ISC2 certifications, one AMF covers all of them.</p><h2>Group A, Group B, and the Category Nobody Mentions</h2><p><strong>Group A</strong> includes activities related to the eight CISSP CBK domains, such as conferences, courses, webinars, writing articles, teaching security topics, attending ISC2 chapter meetings, participating in standards development, and volunteering in security-related roles. One firm rule: normal paid job duties don&#8217;t count, no matter how security-focused. CPEs capture learning <em>beyond</em> the day job.</p><p><strong>Group B</strong> covers professional development outside security domains, such as leadership training, project management, and non-security conferences. The cap is 30 credits, and it arrives faster than you&#8217;d expect. A PMP course plus a leadership program plus a couple of conferences, and you&#8217;re at the ceiling. Group B doesn&#8217;t apply to Associates or CC-only holders.</p><p>Then there&#8217;s Unique Work Experience, a Group A subcategory that barely gets discussed. It covers one-time projects during working hours that fall outside your normal responsibilities. A network admin leading a tabletop exercise for executives, or a security analyst pulled into a special zero-trust evaluation. Each entry caps at 10 credits and requires a 250-word description if audited. The test: Is this genuinely different from what you do every day?</p><h2>Activity Caps: The Reference Table You&#8217;ll Want to Bookmark</h2><p>Not all credits are created equal. These caps matter because it&#8217;s easy to assume that five blog posts earn as much as five journal articles. They don&#8217;t.</p><h3>Authoring &amp; Content Creation</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TOa0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8cde224-7cbd-451c-bc22-927278446513_720x365.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TOa0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8cde224-7cbd-451c-bc22-927278446513_720x365.png 424w, https://substackcdn.com/image/fetch/$s_!TOa0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8cde224-7cbd-451c-bc22-927278446513_720x365.png 848w, https://substackcdn.com/image/fetch/$s_!TOa0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8cde224-7cbd-451c-bc22-927278446513_720x365.png 1272w, https://substackcdn.com/image/fetch/$s_!TOa0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8cde224-7cbd-451c-bc22-927278446513_720x365.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TOa0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8cde224-7cbd-451c-bc22-927278446513_720x365.png" width="720" height="365" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c8cde224-7cbd-451c-bc22-927278446513_720x365.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:365,&quot;width&quot;:720,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:18715,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.balancedsec.com/i/189823068?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8cde224-7cbd-451c-bc22-927278446513_720x365.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TOa0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8cde224-7cbd-451c-bc22-927278446513_720x365.png 424w, https://substackcdn.com/image/fetch/$s_!TOa0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8cde224-7cbd-451c-bc22-927278446513_720x365.png 848w, https://substackcdn.com/image/fetch/$s_!TOa0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8cde224-7cbd-451c-bc22-927278446513_720x365.png 1272w, https://substackcdn.com/image/fetch/$s_!TOa0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8cde224-7cbd-451c-bc22-927278446513_720x365.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Tip: writing five blog posts doesn&#8217;t earn the same as five journal articles. Check the caps before planning your strategy.</p><h3>Self-Study (Reading)</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!57JE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69a974b4-30a2-4036-a946-7f98f402340d_720x267.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!57JE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69a974b4-30a2-4036-a946-7f98f402340d_720x267.png 424w, https://substackcdn.com/image/fetch/$s_!57JE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69a974b4-30a2-4036-a946-7f98f402340d_720x267.png 848w, https://substackcdn.com/image/fetch/$s_!57JE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69a974b4-30a2-4036-a946-7f98f402340d_720x267.png 1272w, https://substackcdn.com/image/fetch/$s_!57JE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69a974b4-30a2-4036-a946-7f98f402340d_720x267.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!57JE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69a974b4-30a2-4036-a946-7f98f402340d_720x267.png" width="720" height="267" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/69a974b4-30a2-4036-a946-7f98f402340d_720x267.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:267,&quot;width&quot;:720,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:18818,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.balancedsec.com/i/189823068?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69a974b4-30a2-4036-a946-7f98f402340d_720x267.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!57JE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69a974b4-30a2-4036-a946-7f98f402340d_720x267.png 424w, https://substackcdn.com/image/fetch/$s_!57JE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69a974b4-30a2-4036-a946-7f98f402340d_720x267.png 848w, https://substackcdn.com/image/fetch/$s_!57JE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69a974b4-30a2-4036-a946-7f98f402340d_720x267.png 1272w, https://substackcdn.com/image/fetch/$s_!57JE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69a974b4-30a2-4036-a946-7f98f402340d_720x267.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Note:</strong> A 500-page textbook earns the same 5 CPE credits as a 200-page book. Self-study is valuable, but it&#8217;s not the most efficient way to reach 120 credits.</p><h3>Education &amp; Teaching</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZFOY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4e5dcbb-d3d6-4b30-afa5-a3066d836c1c_720x414.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZFOY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4e5dcbb-d3d6-4b30-afa5-a3066d836c1c_720x414.png 424w, https://substackcdn.com/image/fetch/$s_!ZFOY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4e5dcbb-d3d6-4b30-afa5-a3066d836c1c_720x414.png 848w, https://substackcdn.com/image/fetch/$s_!ZFOY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4e5dcbb-d3d6-4b30-afa5-a3066d836c1c_720x414.png 1272w, https://substackcdn.com/image/fetch/$s_!ZFOY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4e5dcbb-d3d6-4b30-afa5-a3066d836c1c_720x414.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZFOY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4e5dcbb-d3d6-4b30-afa5-a3066d836c1c_720x414.png" width="720" height="414" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a4e5dcbb-d3d6-4b30-afa5-a3066d836c1c_720x414.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:414,&quot;width&quot;:720,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:31917,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.balancedsec.com/i/189823068?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4e5dcbb-d3d6-4b30-afa5-a3066d836c1c_720x414.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZFOY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4e5dcbb-d3d6-4b30-afa5-a3066d836c1c_720x414.png 424w, https://substackcdn.com/image/fetch/$s_!ZFOY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4e5dcbb-d3d6-4b30-afa5-a3066d836c1c_720x414.png 848w, https://substackcdn.com/image/fetch/$s_!ZFOY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4e5dcbb-d3d6-4b30-afa5-a3066d836c1c_720x414.png 1272w, https://substackcdn.com/image/fetch/$s_!ZFOY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4e5dcbb-d3d6-4b30-afa5-a3066d836c1c_720x414.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Note: Education has a no-category cap. You could technically earn all 120 credits through courses alone (although you&#8217;d need at least 3 separate entries, with a 40-max per entry).</p><h2>The Free Credit Strategy (Start Here)</h2><p>A significant chunk of your requirement can be earned free through ISC2&#8217;s own programs, and many auto-submit to your account with audit-exempt status.</p><p>ISC2 webinars on BrightTALK are free, auto-submitted, and pre-cleared for audits. But auto-submission only works if your ISC2 member ID was entered when you first registered for the BrightTALK channel. If you signed up before you were a member, or skipped that field, credits won&#8217;t post. Fix this now. Discovering the problem at the end of year two is unpleasant. Either delete your BrightTALK account and recreate it with your member ID, or download viewing certificates and submit them manually.</p><p>Beyond webinars, ISC2 offers several other ways to earn credits, including Skill-Builders and Express Courses (free), Insights quizzes (2 CPEs each), Security Congress (28+ CPEs from a single event), and credit for participating in JTA surveys or exam development workshops. Using these programs strategically can build a strong CPE foundation without spending beyond your AMF.</p><h2>The Traps Worth Knowing About Early</h2><p>These catch smart, busy professionals who don&#8217;t know the nuance.</p><p><strong>Backloading is legal but risky.</strong> The flexibility to skip years one and two is real, but the endpoint is fixed, and the 90-day grace period isn&#8217;t designed for people who haven&#8217;t started.</p><p><strong>The Group B ceiling sneaks up.</strong> A single project management certification and a couple of leadership workshops can eat most of it.</p><p><strong>Regular job duties don&#8217;t count.</strong> Even after a year deep into security operations, it doesn&#8217;t generate CPE credits.</p><p><strong>Upload documentation at submission time.</strong> Two minutes now versus a headache 18 months later when an audit notification arrives.</p><p><strong>Know your AMF anniversary date.</strong> It&#8217;s the anniversary of your certification, not the calendar year. A lapsed AMF suspension is treated the same as a CPE shortfall.</p><h2>When Things Go Wrong (And the Rungs on the Way Down)</h2><p>The system has more built-in recovery than most people realize. When a cycle ends without 120 credits, there&#8217;s a 90-day grace period to earn and submit. Three months is enough to close most gaps.</p><p>Miss that, and suspension kicks in. You can&#8217;t claim the designation, your badge is disabled, and your name disappears from ISC2&#8217;s Member Verification tool. That last one stings professionally. Clients and employers check it.</p><p>The suspension lasts up to&nbsp;two years, and after&nbsp;that, the certification is terminated. Reinstatement requires 5 CPE credits in each of the eight domains, plus 40 in your primary domain, for a total of 120 credits within 12 months. Or you retake the exam. Associates only get the exam option.</p><p>The point isn&#8217;t to scare you. The system has rungs on the way down, and each one provides a chance to climb back.</p><h2>Making It Actually Worth Your Time</h2><p>Here&#8217;s the honest framing. The CPE system is self-reported and honor-based. A motivated person can game it. But a motivated person can use it as well. </p><p>Start by reviewing your certification anniversary date in the ISC2 member dashboard. This date determines your renewal timeline, including when CPE submissions and AMF payments are due. Pay the $135 annual fee on your certification anniversary. Even if you hold multiple ISC2 certifications, you only pay it once per year. Keeping a steady rhythm with CPE credits makes renewal much easier (something I&#8217;m reminding myself of as well).</p><p>Cybersecurity moves fast, and the CPE structure helps keep you current in ways many professionals might otherwise overlook. ISC2&#8217;s chapter network can be genuinely useful as a peer community. The free webinars often feature current topics from practitioners rather than vendor pitches. The Skill-Builders also give you a reason to dig into topics many of us might otherwise skip.</p><p>Whether CPEs become real professional development or administrative overhead depends on the person holding the certification. The structure is there, and it&#8217;s more forgiving than it looks from the outside. Use it well.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pMRS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e691cfc-4bea-4c6a-b59d-dd68f41041bf_1080x1665.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pMRS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e691cfc-4bea-4c6a-b59d-dd68f41041bf_1080x1665.png 424w, https://substackcdn.com/image/fetch/$s_!pMRS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e691cfc-4bea-4c6a-b59d-dd68f41041bf_1080x1665.png 848w, https://substackcdn.com/image/fetch/$s_!pMRS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e691cfc-4bea-4c6a-b59d-dd68f41041bf_1080x1665.png 1272w, https://substackcdn.com/image/fetch/$s_!pMRS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e691cfc-4bea-4c6a-b59d-dd68f41041bf_1080x1665.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pMRS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e691cfc-4bea-4c6a-b59d-dd68f41041bf_1080x1665.png" width="728" height="1122.3333333333333" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8e691cfc-4bea-4c6a-b59d-dd68f41041bf_1080x1665.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1665,&quot;width&quot;:1080,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:259544,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.balancedsec.com/i/189823068?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e691cfc-4bea-4c6a-b59d-dd68f41041bf_1080x1665.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!pMRS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e691cfc-4bea-4c6a-b59d-dd68f41041bf_1080x1665.png 424w, https://substackcdn.com/image/fetch/$s_!pMRS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e691cfc-4bea-4c6a-b59d-dd68f41041bf_1080x1665.png 848w, https://substackcdn.com/image/fetch/$s_!pMRS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e691cfc-4bea-4c6a-b59d-dd68f41041bf_1080x1665.png 1272w, https://substackcdn.com/image/fetch/$s_!pMRS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e691cfc-4bea-4c6a-b59d-dd68f41041bf_1080x1665.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.balancedsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Leader - Balanced Security is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Security Control Frameworks Explained]]></title><description><![CDATA[As AI tools rapidly evolve and expand, bringing new governance demands and security risks, the need for a consistent, unified security practice across projects, systems, and services has never been greater.]]></description><link>https://blog.balancedsec.com/p/security-control-frameworks-explained</link><guid isPermaLink="false">https://blog.balancedsec.com/p/security-control-frameworks-explained</guid><dc:creator><![CDATA[Jeffery Moore]]></dc:creator><pubDate>Fri, 27 Feb 2026 14:03:11 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/87415027-e55b-4b48-895f-bedb03fc9ac8_2189x2252.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>As AI tools rapidly evolve and expand, bringing new governance demands and security risks, the need for a consistent, unified security practice across projects, systems, and services has never been greater. In the race to innovate and capitalize on new software development and deployment models, organizations can unintentionally create critical gaps that expose sensitive assets to unnecessary risk.</p><p>This is where security control frameworks can help. They can provide a more formal, structured way to implement a security strategy that governs and protects organizational assets. They help align goals, guide decisions, and provide the basis for communication with internal stakeholders and external regulators.</p><p>So what is a security control framework? At a high level, they provide a roadmap for creating policies, procedures, and technical safeguards organized by categories. They can include things like access control, incident response, encryption, asset management, and security awareness training.</p><p>Some frameworks define exactly what must be implemented, such as PCI DSS, while others, like NIST CSF, guide organizations to design controls based on risk. Highly regulated industries often require the certainty of prescriptive standards, whereas risk-based models provide flexibility to adapt and evolve securely.</p><p>Despite their differences in scope, audience, and cost, nearly all security control frameworks share the same structural DNA. Once you learn these building blocks, you&#8217;ll recognize them in most frameworks you encounter.<br><br>A typical framework includes components such as:</p><ol><li><p><strong>Controls:</strong> Specific measures used to mitigate risk. Many frameworks organize safeguards into several domains: administrative, technial and physical controls. Administrative controls provide general guidance for policies, procedures, and security awareness training. Technical controls are the tools and configurations, such as firewalls, encryption, MFA, logging, and endpoint detection. Physical controls cover the tangible stuff, such as door locks, security cameras, access badges, and environmental protections. Any given framework may slice these categories differently, but the underlying logic is the same.</p></li><li><p><strong>Maturity models and assessment tiers:</strong> Models and tiers help organizations figure out where they stand and where they need to go. CIS Controls, for instance, uses Implementation Groups. NIST CSF v2.0 uses Tiers: Partial (ad hoc, reactive), Risk Informed (some awareness but inconsistent), Repeatable (formally approved processes), and Adaptive (continuously improving based on lessons learned). COBIT applies a six-level capability model (0 through 5) to each of its 40 governance and management objectives.</p></li><li><p><strong>Governance structure:</strong> Governance serves as the strategic backbone that aligns security activities with an organization&#8217;s mission and risk appetite. It ensures security measures support specific business goals (e.g., growth or innovation) and provide adaptability for a business&#8217;s unique needs. It also helps answer important ownership questions, such as who owns cybersecurity risk at the board level? Who has the authority to approve exceptions to controls? And who is responsible for verifying that controls actually work?</p></li><li><p><strong>Continuous monitoring mechanisms</strong>: We&#8217;re not done after implementation. Continuous monitoring provides a feedback loop to adapt to evolving threats. None of these frameworks is meant to be implemented and left on a shelf. Continuous monitoring helps to create a cycle that updates and implements new controls, tests them, finds gaps, fixes them, and repeats.</p></li></ol><p></p><h3>Let&#8217;s take a look at the major frameworks you should understand for the exam</h3><p>Let&#8217;s look in more detail at the frameworks most likely to show up on the CISSP exam.</p>
      <p>
          <a href="https://blog.balancedsec.com/p/security-control-frameworks-explained">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[A CISSP Threat Modeling Primer]]></title><description><![CDATA[You Already Threat Model.]]></description><link>https://blog.balancedsec.com/p/a-cissp-threat-modeling-primer</link><guid isPermaLink="false">https://blog.balancedsec.com/p/a-cissp-threat-modeling-primer</guid><dc:creator><![CDATA[Jeffery Moore]]></dc:creator><pubDate>Fri, 20 Feb 2026 14:03:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DaKz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb248fbe-e9b8-45d7-b17c-698b72cf250a_1728x2304.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><h3>You Already Threat Model. You Just Don&#8217;t Call It That.</h3><p>You own a retail store. Before opening day, you think about potential merchandise loss from shoplifting. You think about which products are expensive enough to warrant security tags. You think about whether the cheap lock on the back door is good enough, or whether something heavier is warranted. You don&#8217;t have a spreadsheet. But you&#8217;re doing something real: systematically thinking about what can go wrong, how badly, and what it&#8217;s worth spending to prevent it.</p><p>That&#8217;s threat modeling. Every formal framework we&#8217;re about to cover does this same thinking with more structure, more rigor, and a shared vocabulary. A vocabulary that lets teams see the same problems the same way.</p><p>As a CISSP exam candidate, you should be familiar with these threat models. And while you don&#8217;t need to be an expert in each, it helps to understand when they&#8217;re used and why.</p><p>Remember that the goal of threat modeling is simple: to reduce or eliminate threats.</p><div><hr></div><h3>Software-Centric Models: STRIDE and DREAD</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DaKz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb248fbe-e9b8-45d7-b17c-698b72cf250a_1728x2304.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DaKz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb248fbe-e9b8-45d7-b17c-698b72cf250a_1728x2304.png 424w, https://substackcdn.com/image/fetch/$s_!DaKz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb248fbe-e9b8-45d7-b17c-698b72cf250a_1728x2304.png 848w, https://substackcdn.com/image/fetch/$s_!DaKz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb248fbe-e9b8-45d7-b17c-698b72cf250a_1728x2304.png 1272w, https://substackcdn.com/image/fetch/$s_!DaKz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb248fbe-e9b8-45d7-b17c-698b72cf250a_1728x2304.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DaKz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb248fbe-e9b8-45d7-b17c-698b72cf250a_1728x2304.png" width="1456" height="1941" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bb248fbe-e9b8-45d7-b17c-698b72cf250a_1728x2304.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1941,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:532605,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.balancedsec.com/i/188409132?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb248fbe-e9b8-45d7-b17c-698b72cf250a_1728x2304.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DaKz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb248fbe-e9b8-45d7-b17c-698b72cf250a_1728x2304.png 424w, https://substackcdn.com/image/fetch/$s_!DaKz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb248fbe-e9b8-45d7-b17c-698b72cf250a_1728x2304.png 848w, https://substackcdn.com/image/fetch/$s_!DaKz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb248fbe-e9b8-45d7-b17c-698b72cf250a_1728x2304.png 1272w, https://substackcdn.com/image/fetch/$s_!DaKz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb248fbe-e9b8-45d7-b17c-698b72cf250a_1728x2304.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div>
      <p>
          <a href="https://blog.balancedsec.com/p/a-cissp-threat-modeling-primer">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Exploring Claude Code and AI-Driven Development]]></title><description><![CDATA[Let&#8217;s say you run a small or medium-sized business.]]></description><link>https://blog.balancedsec.com/p/exploring-claude-code-and-ai-driven</link><guid isPermaLink="false">https://blog.balancedsec.com/p/exploring-claude-code-and-ai-driven</guid><dc:creator><![CDATA[Jeffery Moore]]></dc:creator><pubDate>Fri, 13 Feb 2026 14:00:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vPDA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cbc141d-43e3-44b5-bd4b-99eff5cba213_2048x2048.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Let&#8217;s say you run a small or medium-sized business. Perhaps it&#8217;s retail or manufacturing for custom designs. You&#8217;ve got process problems: it takes too long to turn around quotes, keep on top of inventory, forecast sales, and let customers visually design custom solutions. All the core processes that generate revenue involve manual effort. The spreadsheets your processes rely on are scattered across different work groups, and understanding how the pieces work together relies on tribal knowledge.</p><p>You&#8217;ve looked at custom software before, but the estimates are always high, and your gut says the total cost is ultimately exponentially more. So you keep nursing the spreadsheets, duct-taping formulas, and hoping Bob in engineering never leaves.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.balancedsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Leader - Balanced Security is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>This has been the reality for millions of small businesses and independent professionals for decades. Software development is expensive because it&#8217;s hard, and it&#8217;s hard because computers are fundamentally stupid. They do exactly what you tell them, nothing more, nothing less. The problem is that &#8220;telling them&#8221; requires speaking their language. Whether that&#8217;s Python, JavaScript, SQL, or a dozen others, each has its own grammar, quirks, and ways of punishing you for a misplaced comma.</p><p>AI-assisted development looks to help fix this problem. The question is can AI toolsets be trusted in production?</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vPDA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cbc141d-43e3-44b5-bd4b-99eff5cba213_2048x2048.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vPDA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cbc141d-43e3-44b5-bd4b-99eff5cba213_2048x2048.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vPDA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cbc141d-43e3-44b5-bd4b-99eff5cba213_2048x2048.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vPDA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cbc141d-43e3-44b5-bd4b-99eff5cba213_2048x2048.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vPDA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cbc141d-43e3-44b5-bd4b-99eff5cba213_2048x2048.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vPDA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cbc141d-43e3-44b5-bd4b-99eff5cba213_2048x2048.jpeg" width="1456" height="1456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1cbc141d-43e3-44b5-bd4b-99eff5cba213_2048x2048.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1551333,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.balancedsec.com/i/187772657?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cbc141d-43e3-44b5-bd4b-99eff5cba213_2048x2048.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vPDA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cbc141d-43e3-44b5-bd4b-99eff5cba213_2048x2048.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vPDA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cbc141d-43e3-44b5-bd4b-99eff5cba213_2048x2048.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vPDA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cbc141d-43e3-44b5-bd4b-99eff5cba213_2048x2048.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vPDA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1cbc141d-43e3-44b5-bd4b-99eff5cba213_2048x2048.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Claude Code, released by Anthropic in early 2025, is a different kind of tool. It&#8217;s AI lives in the command line (the text-based interface developers use to talk to their computers). It reads and understands entire software projects, and can plan, write, test, and fix code autonomously. You describe what you want in plain language. It builds it.</p><p>Now, if you&#8217;re not a developer, you might be tempted to tune out right here. Command line? Codebases? I need to go back to my spreadsheets. Fair enough. </p><p>But here&#8217;s why you should keep reading. Claude Code is a product built for developers. But the <em>pattern</em> it represents is coming for many professions. Understanding what it can do today tells you something important about what your job, your industry, and your competitive position will look like in two or three years.</p><p>This is not really a product review. Not a tutorial. I&#8217;m exploring Claude Code because once I started using it, I started to see more of the possibilities. And I&#8217;d like to share some of these thoughts.</p><h2>Ok, so what is Claude Code?</h2><p>The basics. Claude Code is a tool made by Anthropic, a San Francisco-based AI company that developed the Claude chatbot. If you&#8217;ve used AI chat (e.g., ChatGPT, Claude, Gemini, etc.) to answer questions or help with writing, you&#8217;ve met the polite, conversational version. Claude Code is its more capable sibling. </p><p>You install it on your computer, point it at a folder full of code (or an empty folder, if you&#8217;re starting from scratch), and give it instructions using natural language.</p><p>The critical difference between a chatbot and Claude Code is that it can <em>act</em>. It is an agent (it can do things on your behalf). It reads your files and writes new ones. It runs commands. It tests whether things work. When something breaks, it reads the error message, figures out what went wrong, and tries a fix. This loop of plan-execute-test-fix can be repeated dozens of times without your intervention.</p><p>As I started working with it, I asked for help to do something pretty simple. I pointed Claude Code at my <a href="https://github.com/jefferywmoore/CISSP-Study-Resources">CISSP Study Resources GitHub project</a>, and asked it to identify errors and inconsistencies and automatically fix them. This obviously wasn&#8217;t an actual development assignment. I simply wanted to see how it worked in reviewing files, identifying problems, and providing automated solutions. I was pleasantly surprised to find that it identified several types of issues (a few wrong terms and better groupings for certain concepts), created updates, and successfully installed patches.</p><p>Agent vs. assistant. Earlier AI coding tools, like GitHub Copilot, work more like aggressive autocomplete. You&#8217;re writing code, and the AI suggests the next few lines. Helpful, sure. But you&#8217;re still all the driving.</p><p>Claude Code is closer to handing the keys over entirely. It doesn&#8217;t just suggest. It can plan a sequence of steps, execute them, evaluate the results, and adjust course when things go sideways. If Copilot is a GPS that helps you find faster routes while you drive, then Claude Code is more like the potential Robotaxi service (assuming Robotaxi actually works at some point).</p><h2>So, why should you care?</h2><p>Let&#8217;s say you&#8217;re convinced Claude Code is impressive. You still don&#8217;t write code, and you don&#8217;t plan to start. So why should you care?</p><p>Because the idea underneath Claude Code is leaking into many professions, and the speed of that leak is accelerating.</p><p>Last year, Andrej Karpathy (a well-known AI researcher and former head of AI at Tesla) used the term &#8220;vibe coding&#8221; to describe a different approach to software development. The idea is that you describe what you want in natural language, the AI writes all the code, and you mostly just steer and test the results. You don&#8217;t need to understand the code itself. You just need to know what you want and whether the output meets your needs.</p><p>This sounds gimmicky until you look at what people are actually building this way. Non-programmers have used tools like Claude to build powerful projects, including browser extensions, personal finance trackers, client scheduling tools, and even full-blown SaaS applications. Projects that would have cost thousands of dollars in freelance developer fees a year and a half ago.</p><p>If building custom software becomes as easy as creating a slide deck (we&#8217;re not there yet, but trending in that direction), the market dynamics in many industries will change in ways that weren't obvious not long ago.</p><p>Consider a marketing analyst at a mid-size company. In the past, if he needed a custom dashboard that pulls data from multiple sources with a specific visualization scheme, he submitted a request to the IT or marketing department. Maybe that request sat in a queue for a while. With tools built on the Claude Code model, he could describe what he needed and have a working prototype the same afternoon. He&#8217;s still not a programmer, and he doesn&#8217;t need to be. He just needs to articulate the problem clearly and evaluate whether the output solves it.</p><p>This means that the person who understands <em>what to build</em> and <em>why</em> starts to matter as much as the person who knows <em>how to build it</em>. That&#8217;s a significant reordering of professional value.</p><p>A growing number of tech leaders have been arguing that the ability to direct AI agents is becoming a baseline professional skill. Comparable perhaps to spreadsheet literacy in the 1990s. There&#8217;s something to this, and the gap between &#8220;technical&#8221; and &#8220;non-technical&#8221; roles is genuinely narrowing. Tools like Claude Code are a primary reason.</p><p>But we&#8217;re not there yet, and we need to separate out the marketing hype from the potential. That&#8217;s one of the reasons why I&#8217;ve been spending more time with these tools. I started my career as a developer, and I&#8217;ve been involved in IT, leadership, and security for a long time. My bias is skepticism for replacing human intelligence with Large Language Model (LLM) prediction-based tools. And I am concerned about the security implications of relying entirely on these tools.</p><p>But if you take a step back, tools like Claude Code seem to be improving on a curve measured in months. If you still think of AI based on your last frustrating experience with ChatGPT, it&#8217;s time for an update.</p><h2>The trust problem</h2><p>So far, the story sounds pretty good. Were&#8217; talking about an AI toolset that can build software from plain language instructions. Non-programmers creating functional tools. Retail and manufacturing companies are designing custom solutions for a fraction of the cost. </p><p>I think this is true to a point. But every powerful tool comes with potential problems, and Claude Code&#8217;s are worth understanding clearly because many articles don&#8217;t spend much time on them.</p><p>The fundamental tension is that the thing that makes Claude Code useful is also what makes it risky. It can read your files, write new ones, run commands, and modify your system. That&#8217;s not a chatbot generating text in a sandbox. That&#8217;s AI with real access to real things on your real computer.</p><p>The risk isn&#8217;t necessarily that Claude Code will &#8220;go rogue&#8221; in some sci-fi sense (although there are <a href="https://www.reddit.com/r/ClaudeAI/comments/1mzjn18/so_it_happened_to_me_catastrophic_error/">examples of it making some catastrophic mistakes</a>). The risk is more mundane and, honestly, more likely. </p><p>Consider prompt injection, a class of attack that security researchers have been talking about for several years. The basic idea is that an attacker hides malicious instructions inside content that the AI tool will process. If a developer points Claude Code at files that contain a cleverly hidden instruction (say, buried in a comment or a README file), it might follow that instruction without realizing it came from an adversary rather than the user.</p><p>Another problem is AI's tendency to hallucinate. In a chatbot conversation, a hallucination is when the model confidently states something that is false, such as a made-up citation, a nonexistent historical event, or a plausible-sounding but wrong answer. It&#8217;s annoying, but usually catchable.</p><p>In code, hallucination takes a different and more difficult form. Say Claude generates code that <em>looks</em> correct, follows proper syntax, uses the right function names, and seems logically sound. But it contains a subtle bug. Maybe it handles edge cases incorrectly. Maybe it introduces a security vulnerability by failing to validate user input. Maybe it uses an API function that was deprecated two versions ago and will fail silently under specific conditions.</p><p>And there is the supply-chain problem. When Claude Code writes your software, you&#8217;re not just trusting the code it produces. You&#8217;re trusting the entire chain behind it, largely based on open-source software. When you use a package someone else wrote, you&#8217;re trusting that person&#8217;s competence, security awareness, and good intentions. The catastrophic <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228">Log4j vulnerability</a> in late 2021 showed what happens when a widely used library contains a critical flaw. Note that software developers have been dealing with supply chain risk in open-source libraries for a long time. But left on its own, without supervision, Claude Code could amplify this risk.</p><p>For enterprises and organizations handling sensitive data, these issues create a governance challenge that existing software auditing practices may not have been designed to address. How do you audit code whose &#8220;author&#8221; is a statistical model? How do you assign responsibility when something goes wrong? These questions don&#8217;t have easy answers yet, although with a bit of irony, AI tools may also be part of the solution.</p><p>At present, tools like Claude Code act like a confident junior developer. They are exceptionally fast and knowledgeable about syntax, but they lack the professional judgment, strategic foresight, and security intuition of a senior architect. Agents can struggle with large-scale architectural changes across multiple services, often creating "spaghetti code" or technical debt if not guided by a human who understands the entire system's long-term roadmap.</p><p>And while Claude can run automated security reviews, it often misses nuanced flaws like broken business logic, authorization escapes, or zero-day vulnerabilities that don't match its training patterns. Humans still serve as a critical failsafe, intercepting risky commands or unintended actions before they reach production.</p><p>Claude Code is improving at reviewing software to identify and fix security issues. I&#8217;ll have more to say about that in future articles as I continue to explore.</p><h2>So, where does that leave us?</h2><p>I&#8217;m just scratching the surface of AI tools and toolsets that can help accelerate development work. Claude Code is a tool that dramatically accelerates software development while introducing a new category of risks that the industry is still learning to manage. I don&#8217;t think it&#8217;s a scam. It works, often impressively. But &#8220;it works&#8221; and &#8220;you can trust it blindly&#8221; are very different statements.</p><p>The fact that it&#8217;s possible at all for a person without years of programming training to describe a problem in plain language and get functional software back represents a genuine shift in who gets to build things with computers. Not a complete shift. Not a frictionless one. But a real one.</p><p>And I think there is a real, positive impact for retailers and manufacturers who want software and functionality tailored to their unique needs at a reduced cost.</p><p>Ultimately, however, there is a greater need for enterprise-level software security governance. And these tools still benefit from architect-level software engineering oversight, people who understand the business&#8217;s needs and can guide the development process.</p><p>The question remains, can your AI toolset be trusted in production?</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.balancedsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Leader - Balanced Security is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Understanding CISSP Domain 8, Software Development Security - Part 2]]></title><description><![CDATA[CISSP Domain 8 focuses on securing software throughout the development lifecycle, from design and coding to testing, deployment, and maintenance.]]></description><link>https://blog.balancedsec.com/p/understanding-cissp-domain-8-software-597</link><guid isPermaLink="false">https://blog.balancedsec.com/p/understanding-cissp-domain-8-software-597</guid><dc:creator><![CDATA[Jeffery Moore]]></dc:creator><pubDate>Fri, 06 Feb 2026 14:01:54 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!fOUy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7699c41f-0f01-4b49-b0cf-575a12ecb079_3840x2160.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fOUy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7699c41f-0f01-4b49-b0cf-575a12ecb079_3840x2160.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fOUy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7699c41f-0f01-4b49-b0cf-575a12ecb079_3840x2160.png 424w, https://substackcdn.com/image/fetch/$s_!fOUy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7699c41f-0f01-4b49-b0cf-575a12ecb079_3840x2160.png 848w, https://substackcdn.com/image/fetch/$s_!fOUy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7699c41f-0f01-4b49-b0cf-575a12ecb079_3840x2160.png 1272w, https://substackcdn.com/image/fetch/$s_!fOUy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7699c41f-0f01-4b49-b0cf-575a12ecb079_3840x2160.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fOUy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7699c41f-0f01-4b49-b0cf-575a12ecb079_3840x2160.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7699c41f-0f01-4b49-b0cf-575a12ecb079_3840x2160.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:439340,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.balancedsec.com/i/186537351?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7699c41f-0f01-4b49-b0cf-575a12ecb079_3840x2160.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fOUy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7699c41f-0f01-4b49-b0cf-575a12ecb079_3840x2160.png 424w, https://substackcdn.com/image/fetch/$s_!fOUy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7699c41f-0f01-4b49-b0cf-575a12ecb079_3840x2160.png 848w, https://substackcdn.com/image/fetch/$s_!fOUy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7699c41f-0f01-4b49-b0cf-575a12ecb079_3840x2160.png 1272w, https://substackcdn.com/image/fetch/$s_!fOUy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7699c41f-0f01-4b49-b0cf-575a12ecb079_3840x2160.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>CISSP Domain 8 focuses on securing software throughout the development lifecycle, from design and coding to testing, deployment, and maintenance. In <a href="https://blog.balancedsec.com/p/understanding-cissp-domain-8-software?r=1k08iw&amp;utm_campaign=post&amp;utm_medium=web&amp;triedRedirect=true">Part 1</a>, we covered how to develop software securely from the very beginning of a project, using secure design principles, development practices, and testing methods to reduce risk in enterprise applications.</p><p>In Part 2, we&#8217;ll look at software security effectiveness, including auditing and logging, risk analysis and mitigation, identifying and addressing security weaknesses, and improving API security and coding practices.</p><p>Let&#8217;s jump into the domain and cover the material by following <a href="https://www.isc2.org/certifications/cissp/cissp-certification-exam-outline#Domain%208:%20Software%20Development%20Security">the ISC2 exam outline</a>.</p><h2><strong>8.3 - Assess the effectiveness of software security</strong></h2><p>Assessing software security through auditing, logging, risk analysis, and mitigation is important for shifting from a reactive to a proactive defense strategy. Together, these practices provide the visibility and actionable insights needed to safeguard critical assets.</p><p><em>Auditing and logging of changes</em></p><p>Assessing the effectiveness of software security relies on robust auditing and logging. Applications should be configured to log details of errors and other security events to a centralized log repository. Some security use cases include identifying security incidents, monitoring for policy violations, creating audit trails (e.g., data additions, modifications, deletions), compliance monitoring, risk analysis and mitigation, and attack detection.</p><p>Logs provide a definitive record of "who did what, when, and from where," preventing denial of actions after a security incident. In the wake of a breach, audit trails act as a primary source of truth, allowing teams to reconstruct timelines, identify initial entry points, and determine the full scope of compromised data. Real-time log monitoring can reveal suspicious patterns, such as access to sensitive files outside of normal business hours or a high volume of failed login attempts.</p><p>Key Considerations for Auditing Changes</p>
      <p>
          <a href="https://blog.balancedsec.com/p/understanding-cissp-domain-8-software-597">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Understanding CISSP Domain 8, Software Development Security - Part 1]]></title><description><![CDATA[CISSP Domain 8 focuses on securing software throughout the development lifecycle, from design and coding to testing, deployment, and maintenance.]]></description><link>https://blog.balancedsec.com/p/understanding-cissp-domain-8-software</link><guid isPermaLink="false">https://blog.balancedsec.com/p/understanding-cissp-domain-8-software</guid><dc:creator><![CDATA[Jeffery Moore]]></dc:creator><pubDate>Fri, 30 Jan 2026 14:02:47 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!y0kz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79fc7b53-1b7a-474f-8820-5aa5e2e08bcb_3840x2160.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!y0kz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79fc7b53-1b7a-474f-8820-5aa5e2e08bcb_3840x2160.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!y0kz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79fc7b53-1b7a-474f-8820-5aa5e2e08bcb_3840x2160.png 424w, https://substackcdn.com/image/fetch/$s_!y0kz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79fc7b53-1b7a-474f-8820-5aa5e2e08bcb_3840x2160.png 848w, https://substackcdn.com/image/fetch/$s_!y0kz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79fc7b53-1b7a-474f-8820-5aa5e2e08bcb_3840x2160.png 1272w, https://substackcdn.com/image/fetch/$s_!y0kz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79fc7b53-1b7a-474f-8820-5aa5e2e08bcb_3840x2160.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!y0kz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79fc7b53-1b7a-474f-8820-5aa5e2e08bcb_3840x2160.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/79fc7b53-1b7a-474f-8820-5aa5e2e08bcb_3840x2160.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:323595,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.balancedsec.com/i/185765140?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79fc7b53-1b7a-474f-8820-5aa5e2e08bcb_3840x2160.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!y0kz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79fc7b53-1b7a-474f-8820-5aa5e2e08bcb_3840x2160.png 424w, https://substackcdn.com/image/fetch/$s_!y0kz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79fc7b53-1b7a-474f-8820-5aa5e2e08bcb_3840x2160.png 848w, https://substackcdn.com/image/fetch/$s_!y0kz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79fc7b53-1b7a-474f-8820-5aa5e2e08bcb_3840x2160.png 1272w, https://substackcdn.com/image/fetch/$s_!y0kz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79fc7b53-1b7a-474f-8820-5aa5e2e08bcb_3840x2160.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>CISSP Domain 8 focuses on securing software throughout the development lifecycle, from design and coding to testing, deployment, and maintenance. In Part 1, we&#8217;ll cover how to develop software securely from the very beginning of a project, using secure design principles, development practices, and testing methods to reduce risk in enterprise applications.</p><p>Here is a breakdown of the topics in this domain: </p><ul><li><p>Security in the software development life cycle (SDLC): Integrating security tasks into various methodologies such as Agile, Waterfall, Spiral, and DevSecOps, and understanding how maturity models and change management fit in.</p></li><li><p>Security controls in development ecosystems: Identifying and applying controls for programming languages, libraries, toolsets, and CI/CD pipelines. Utilizing various assessment methods to verify security, including SAST, DAST, and SCA.</p></li><li><p>Software Security Effectiveness: Using auditing, logging, risk analysis, and mitigation.</p></li><li><p>Acquired Software Security: Assessing the security impact of Commercial Off-the-Shelf (COTS), open-source, third-party, and cloud-based software before integration into the organization.</p></li><li><p>Secure Coding Guidelines: Identifying and addressing security weaknesses, applying standards to improve areas such as secure coding practices and API security.</p><p></p></li></ul><p> Let&#8217;s dive into the domain and cover the material by following <a href="https://www.isc2.org/certifications/cissp/cissp-certification-exam-outline#Domain%208:%20Software%20Development%20Security">the ISC2 exam outline</a>.</p><h2>8.1 - Understand and integrate security in the Software Development Life Cycle (SDLC)</h2><p>The software development life cycle (SDLC) is the process of designing, creating, testing, and deploying software. From a security perspective, application development has become more complicated over the last few years, even as the introduction of AI-assisted coding has increased developer output. Incorporating guardrails and boundaries, staying on top of the latest changes, and ensuring the security of the application environment in production continue to be challenging.</p><p>From the CISSP perspective, SDLC terminology varies across models and publications, but what is most important is understanding the fundamental principles of how the process works.</p><p>One of the most important aspects of the SDLC is that security must be incorporated at every phase. While terminology may differ by methodology (such as Waterfall or Agile), the core phases and their associated security activities generally include:</p><ol><li><p><strong>Initiation/Planning:</strong> Define security objectives and perform initial risk assessments.</p></li><li><p><strong>Requirements Definition:</strong> During this phase, security requirements are captured alongside functional requirements, and risk analysis is refined.</p></li><li><p><strong>System Design:</strong> Threat modeling is used to identify architectural risks early in the design phase, before coding begins.</p></li><li><p><strong>Development/Coding:</strong> Apply secure coding standards, conduct manual code reviews, and use static application security testing (SAST) to identify issues early.</p></li><li><p><strong>Testing/Evaluation:</strong> Perform dynamic application security testing (DAST), fuzz testing, and additional SAST to validate security before release.</p></li><li><p><strong>Deployment/Release:</strong> Ensure secure configuration, complete final certification and authorization activities to confirm the system is approved for production use.</p></li><li><p><strong>Maintenance/Operations:</strong> Continuously monitor for emerging threats, apply patches and updates, and perform regular security audits.</p><p></p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bio4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c1e25fa-4246-448a-b157-d0e36b13cd14_3840x2160.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bio4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c1e25fa-4246-448a-b157-d0e36b13cd14_3840x2160.png 424w, https://substackcdn.com/image/fetch/$s_!bio4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c1e25fa-4246-448a-b157-d0e36b13cd14_3840x2160.png 848w, https://substackcdn.com/image/fetch/$s_!bio4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c1e25fa-4246-448a-b157-d0e36b13cd14_3840x2160.png 1272w, https://substackcdn.com/image/fetch/$s_!bio4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c1e25fa-4246-448a-b157-d0e36b13cd14_3840x2160.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bio4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c1e25fa-4246-448a-b157-d0e36b13cd14_3840x2160.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3c1e25fa-4246-448a-b157-d0e36b13cd14_3840x2160.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:374955,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.balancedsec.com/i/185765140?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c1e25fa-4246-448a-b157-d0e36b13cd14_3840x2160.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bio4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c1e25fa-4246-448a-b157-d0e36b13cd14_3840x2160.png 424w, https://substackcdn.com/image/fetch/$s_!bio4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c1e25fa-4246-448a-b157-d0e36b13cd14_3840x2160.png 848w, https://substackcdn.com/image/fetch/$s_!bio4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c1e25fa-4246-448a-b157-d0e36b13cd14_3840x2160.png 1272w, https://substackcdn.com/image/fetch/$s_!bio4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c1e25fa-4246-448a-b157-d0e36b13cd14_3840x2160.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div>
      <p>
          <a href="https://blog.balancedsec.com/p/understanding-cissp-domain-8-software">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Understanding CISSP Domain 7, Security Operations - Part 4]]></title><description><![CDATA[Security Operations is the practical application of security concepts to identify, investigate, and mitigate risks across an organization's daily activities and operational lifecycle.]]></description><link>https://blog.balancedsec.com/p/understanding-cissp-domain-7-security-4bd</link><guid isPermaLink="false">https://blog.balancedsec.com/p/understanding-cissp-domain-7-security-4bd</guid><dc:creator><![CDATA[Jeffery Moore]]></dc:creator><pubDate>Fri, 23 Jan 2026 14:03:13 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!mMDJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F952c3f19-105c-4e50-b5de-eef04763c22d_3840x2160.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mMDJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F952c3f19-105c-4e50-b5de-eef04763c22d_3840x2160.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mMDJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F952c3f19-105c-4e50-b5de-eef04763c22d_3840x2160.png 424w, https://substackcdn.com/image/fetch/$s_!mMDJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F952c3f19-105c-4e50-b5de-eef04763c22d_3840x2160.png 848w, https://substackcdn.com/image/fetch/$s_!mMDJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F952c3f19-105c-4e50-b5de-eef04763c22d_3840x2160.png 1272w, https://substackcdn.com/image/fetch/$s_!mMDJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F952c3f19-105c-4e50-b5de-eef04763c22d_3840x2160.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mMDJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F952c3f19-105c-4e50-b5de-eef04763c22d_3840x2160.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/952c3f19-105c-4e50-b5de-eef04763c22d_3840x2160.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:335752,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.balancedsec.com/i/184601783?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F952c3f19-105c-4e50-b5de-eef04763c22d_3840x2160.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mMDJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F952c3f19-105c-4e50-b5de-eef04763c22d_3840x2160.png 424w, https://substackcdn.com/image/fetch/$s_!mMDJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F952c3f19-105c-4e50-b5de-eef04763c22d_3840x2160.png 848w, https://substackcdn.com/image/fetch/$s_!mMDJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F952c3f19-105c-4e50-b5de-eef04763c22d_3840x2160.png 1272w, https://substackcdn.com/image/fetch/$s_!mMDJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F952c3f19-105c-4e50-b5de-eef04763c22d_3840x2160.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Security Operations</strong> is the practical application of security concepts to identify, investigate, and mitigate risks across an organization's daily activities and operational lifecycle.</p><p><a href="https://blog.balancedsec.com/p/understanding-cissp-domain-7-security?r=1k08iw&amp;utm_campaign=post&amp;utm_medium=web&amp;triedRedirect=true">Part 1</a> covered important concepts, including investigations, evidence collection, logging and monitoring, threat intelligence, and configuration management.</p><p>We continued exploring areas such as resource protection, incident response, and detection and preventive technologies in <a href="https://blog.balancedsec.com/p/understanding-cissp-domain-7-security-79d">Part 2</a>.</p><p>In <a href="https://open.substack.com/pub/jefferymoore/p/understanding-cissp-domain-7-security-fd0?r=1k08iw&amp;utm_campaign=post&amp;utm_medium=web&amp;showWelcomeOnShare=true">Part 3</a>, we looked at vulnerability and patch management, change management, and disaster recovery plans, processes, and testing.</p><p>In the last article, we&#8217;ll discuss business continuity planning and physical and personnel safety.</p><p>Let&#8217;s dive into the domain and cover the material by following <a href="https://www.isc2.org/certifications/cissp/cissp-certification-exam-outline#Domain%207:%20Security%20Operations">the ISC2 exam outline</a>.</p><h2>7.13 - Participate in Business Continuity (BC) planning and exercises</h2><p><strong>Business Continuity Management (BCM)</strong> is the<strong> </strong>holistic process that identifies potential threats and risks to operational continuity and provides a framework for building resilience. It ensures an organization can continue to deliver products or services at acceptable, predefined levels during and after a disruption.</p><p>The BCM process drives disaster planning and preparation by conducting the <strong>Business Impact Analysis (BIA)</strong>. The BIA helps define metrics (e.g., RPO, RTO, WRT, and MTD) that, in turn, drive the creation of Business Continuity Plans (BCPs) and Disaster Recovery Plans (DRPs). BCM primarily aims to ensure an organization's survival during a disaster by maintaining its most critical processes.</p><p>Metrics that you should be familiar with:</p>
      <p>
          <a href="https://blog.balancedsec.com/p/understanding-cissp-domain-7-security-4bd">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Understanding CISSP Domain 7, Security Operations - Part 3]]></title><description><![CDATA[Security Operations is the practical application of security concepts to identify, investigate, and mitigate risks throughout a business&#8217;s daily activities and operational lifecycle.]]></description><link>https://blog.balancedsec.com/p/understanding-cissp-domain-7-security-fd0</link><guid isPermaLink="false">https://blog.balancedsec.com/p/understanding-cissp-domain-7-security-fd0</guid><dc:creator><![CDATA[Jeffery Moore]]></dc:creator><pubDate>Fri, 16 Jan 2026 14:02:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gaRk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb91ac12a-8f8e-4f28-8695-0cf0e9620ede_3840x2160.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gaRk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb91ac12a-8f8e-4f28-8695-0cf0e9620ede_3840x2160.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gaRk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb91ac12a-8f8e-4f28-8695-0cf0e9620ede_3840x2160.png 424w, https://substackcdn.com/image/fetch/$s_!gaRk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb91ac12a-8f8e-4f28-8695-0cf0e9620ede_3840x2160.png 848w, https://substackcdn.com/image/fetch/$s_!gaRk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb91ac12a-8f8e-4f28-8695-0cf0e9620ede_3840x2160.png 1272w, https://substackcdn.com/image/fetch/$s_!gaRk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb91ac12a-8f8e-4f28-8695-0cf0e9620ede_3840x2160.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gaRk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb91ac12a-8f8e-4f28-8695-0cf0e9620ede_3840x2160.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b91ac12a-8f8e-4f28-8695-0cf0e9620ede_3840x2160.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:318485,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.balancedsec.com/i/183482502?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb91ac12a-8f8e-4f28-8695-0cf0e9620ede_3840x2160.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gaRk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb91ac12a-8f8e-4f28-8695-0cf0e9620ede_3840x2160.png 424w, https://substackcdn.com/image/fetch/$s_!gaRk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb91ac12a-8f8e-4f28-8695-0cf0e9620ede_3840x2160.png 848w, https://substackcdn.com/image/fetch/$s_!gaRk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb91ac12a-8f8e-4f28-8695-0cf0e9620ede_3840x2160.png 1272w, https://substackcdn.com/image/fetch/$s_!gaRk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb91ac12a-8f8e-4f28-8695-0cf0e9620ede_3840x2160.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Security Operations</strong> is the practical application of security concepts to identify, investigate, and mitigate risks throughout a business&#8217;s daily activities and operational lifecycle.</p><p><a href="https://blog.balancedsec.com/p/understanding-cissp-domain-7-security?r=1k08iw&amp;utm_campaign=post&amp;utm_medium=web&amp;triedRedirect=true">Part 1</a> covered application of important concepts, including investigations, evidence collection, logging and monitoring, threat intelligence, and configuration management.</p><p>In <a href="https://blog.balancedsec.com/p/understanding-cissp-domain-7-security-79d">Part 2</a>, we continued exploring areas such as resource protection, incident response, and detection and preventive technologies. </p><p>In Part 3, we&#8217;ll look at vulnerability and patch management, change management, and disaster recovery plans, processes, and testing.</p><p>Let&#8217;s dive into the domain and cover the material by following <a href="https://www.isc2.org/certifications/cissp/cissp-certification-exam-outline#Domain%207:%20Security%20Operations">the ISC2 exam outline</a>.</p><h2>7.8 - Implement and support patch and vulnerability management</h2><p><strong>Patch management</strong> and <strong>vulnerability management</strong> are distinct but interconnected cybersecurity processes. While vulnerability management identifies the &#8220;cracks&#8221; in a system, patch management provides the &#8220;repair.&#8221; Patch and vulnerability management processes work together to help protect against emerging threats. Patch management ensures that fixes are applied to systems, and vulnerability management helps verify that systems are not vulnerable.</p><ul><li><p><strong>Vulnerability Management:</strong> A broad, continuous, and strategic lifecycle used to identify, assess, and prioritize security weaknesses, including software flaws, misconfigurations, and weak authentication, across an organization&#8217;s entire IT footprint. Like other areas of cybersecurity, this lifecycle increasingly leverages AI to filter through the thousands of newly published vulnerabilities every year.</p></li><li><p><strong>Patch Management:</strong> A tactical, operational process focused specifically on identifying, testing, and deploying software updates or patches provided by vendors to fix known bugs and security holes. Change and configuration management are often used to make the patch management process work effectively. </p></li></ul><p>Patch management is often viewed as a subset of the broader change and configuration management disciplines. While they overlap, each serves a distinct role in ensuring that security updates are applied safely and predictably.</p><p>Configuration management provides the foundation for patching by maintaining a known, secure baseline of all systems, while change management acts as governance for patching, ensuring that updates don't cause operational outages.</p><p>You should be familiar with the patch management process as follows:</p>
      <p>
          <a href="https://blog.balancedsec.com/p/understanding-cissp-domain-7-security-fd0">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Understanding CISSP Domain 7, Security Operations - Part 2]]></title><description><![CDATA[Security Operations is the practical application of security concepts to identify, investigate, and mitigate risks throughout a business's daily activities and operational lifecycle.]]></description><link>https://blog.balancedsec.com/p/understanding-cissp-domain-7-security-79d</link><guid isPermaLink="false">https://blog.balancedsec.com/p/understanding-cissp-domain-7-security-79d</guid><dc:creator><![CDATA[Jeffery Moore]]></dc:creator><pubDate>Fri, 09 Jan 2026 14:02:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!RzZN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F487db41b-edad-4c32-a77d-559e95251497_3840x2160.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RzZN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F487db41b-edad-4c32-a77d-559e95251497_3840x2160.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RzZN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F487db41b-edad-4c32-a77d-559e95251497_3840x2160.png 424w, https://substackcdn.com/image/fetch/$s_!RzZN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F487db41b-edad-4c32-a77d-559e95251497_3840x2160.png 848w, https://substackcdn.com/image/fetch/$s_!RzZN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F487db41b-edad-4c32-a77d-559e95251497_3840x2160.png 1272w, https://substackcdn.com/image/fetch/$s_!RzZN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F487db41b-edad-4c32-a77d-559e95251497_3840x2160.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RzZN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F487db41b-edad-4c32-a77d-559e95251497_3840x2160.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/487db41b-edad-4c32-a77d-559e95251497_3840x2160.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:333280,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.balancedsec.com/i/183178178?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F487db41b-edad-4c32-a77d-559e95251497_3840x2160.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RzZN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F487db41b-edad-4c32-a77d-559e95251497_3840x2160.png 424w, https://substackcdn.com/image/fetch/$s_!RzZN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F487db41b-edad-4c32-a77d-559e95251497_3840x2160.png 848w, https://substackcdn.com/image/fetch/$s_!RzZN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F487db41b-edad-4c32-a77d-559e95251497_3840x2160.png 1272w, https://substackcdn.com/image/fetch/$s_!RzZN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F487db41b-edad-4c32-a77d-559e95251497_3840x2160.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Security Operations</strong> is the practical application of security concepts to identify, investigate, and mitigate risks throughout a business's daily activities and operational lifecycle.</p><p>In <a href="https://blog.balancedsec.com/p/understanding-cissp-domain-7-security?r=1k08iw&amp;utm_campaign=post&amp;utm_medium=web&amp;triedRedirect=true">Part 1</a>, we covered the basics, including the different types of investigations, evidence collection, logging and monitoring, threat intelligence, configuration management, and a few core security operations concepts.</p><p>In Part 2, we continue exploring the application of resource protections, incident response, and detection and preventive technologies. Let&#8217;s dive into the domain and cover the material by following <a href="https://www.isc2.org/certifications/cissp/cissp-certification-exam-outline#Domain%207:%20Security%20Operations">the ISC2 exam outline</a>.</p><h2>7.5 - Apply resource protection</h2><p>Organizations need to protect sensitive data and systems at every stage of their lifecycle, from secure provisioning and storage to proper disposal when assets are no longer needed.</p><p><em>Media management</em></p><p><strong>Media management</strong> includes the security controls and techniques needed to protect media and stored data. Organizations use a wide variety of storage media, requiring appropriate policies and security controls to maintain confidentiality, integrity, and availability.</p><p>Organizations use a variety of media types that require protection to prevent data breaches, tampering, and loss. Security frameworks and best practices emphasize a mix of physical and digital controls to effectively manage these risks.</p>
      <p>
          <a href="https://blog.balancedsec.com/p/understanding-cissp-domain-7-security-79d">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Understanding CISSP Domain 7, Security Operations - Part 1]]></title><description><![CDATA[Security operations is the practical application of security concepts to identify, investigate, and mitigate risks throughout a business's daily activities and operational lifecycle.]]></description><link>https://blog.balancedsec.com/p/understanding-cissp-domain-7-security</link><guid isPermaLink="false">https://blog.balancedsec.com/p/understanding-cissp-domain-7-security</guid><dc:creator><![CDATA[Jeffery Moore]]></dc:creator><pubDate>Fri, 02 Jan 2026 14:02:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Zw6D!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f2c30da-6666-4eb1-bd35-9855340a828f_3840x2160.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Zw6D!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f2c30da-6666-4eb1-bd35-9855340a828f_3840x2160.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Zw6D!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f2c30da-6666-4eb1-bd35-9855340a828f_3840x2160.png 424w, https://substackcdn.com/image/fetch/$s_!Zw6D!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f2c30da-6666-4eb1-bd35-9855340a828f_3840x2160.png 848w, https://substackcdn.com/image/fetch/$s_!Zw6D!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f2c30da-6666-4eb1-bd35-9855340a828f_3840x2160.png 1272w, https://substackcdn.com/image/fetch/$s_!Zw6D!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f2c30da-6666-4eb1-bd35-9855340a828f_3840x2160.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Zw6D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f2c30da-6666-4eb1-bd35-9855340a828f_3840x2160.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9f2c30da-6666-4eb1-bd35-9855340a828f_3840x2160.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:337812,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.balancedsec.com/i/182113739?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f2c30da-6666-4eb1-bd35-9855340a828f_3840x2160.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Zw6D!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f2c30da-6666-4eb1-bd35-9855340a828f_3840x2160.png 424w, https://substackcdn.com/image/fetch/$s_!Zw6D!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f2c30da-6666-4eb1-bd35-9855340a828f_3840x2160.png 848w, https://substackcdn.com/image/fetch/$s_!Zw6D!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f2c30da-6666-4eb1-bd35-9855340a828f_3840x2160.png 1272w, https://substackcdn.com/image/fetch/$s_!Zw6D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f2c30da-6666-4eb1-bd35-9855340a828f_3840x2160.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Security operations is the practical application of security concepts to identify, investigate, and mitigate risks throughout a business's daily activities and operational lifecycle. Comprising 13% of the exam, the domain covers areas like investigation and digital forensics, incident management, resource protection, and configuration and patch management. </p><p>The goal is to minimize the impact of threats while ensuring the organization meets its confidentiality, integrity, and availability objectives during normal, emergency, and recovery operations.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.balancedsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Leader - Balanced Security is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>In Part 1, we&#8217;ll cover objectives 7.1 through 7.4. Let&#8217;s dive into the domain and cover the material by continuing to follow <a href="https://www.isc2.org/certifications/cissp/cissp-certification-exam-outline#Domain%207:%20Security%20Operations">the ISC2 exam outline</a>.</p><p>An <strong>investigation</strong> is simply the way we dig into what happened during a security incident to figure out how it started.</p><p>Security incidents can be anything from minor issues that don&#8217;t need follow-up to serious situations that require a formal investigation. A more serious incident investigation might involve law enforcement. Important investigations should follow a more formal process to avoid issues that might weaken or derail a case.</p><p>The following are some general high-level components of a formal investigation:</p><ul><li><p>Identify and secure the scene</p></li><li><p>Protect evidence to preserve its integrity and the chain of custody</p></li><li><p>Identify and examine the evidence</p></li><li><p>Do an analysis of the most compelling evidence</p></li><li><p>Provide a final report of findings</p></li></ul><p>Note that we covered different types of investigations in <a href="https://blog.balancedsec.com/i/174867865/understand-requirements-for-investigation-types-ie-administrative-criminal-civil-regulatory-industry-standards">Domain 1</a>, but to briefly review:</p><ul><li><p>Administrative: cover operational issues or violations of an organization&#8217;s policies.</p></li><li><p>Criminal: is centered around court admissibility and is conducted by law enforcement.</p></li><li><p>Civil: conducted by lawyers or private investigators to gather evidence, establish liability, and determine damage or liability amounts.</p></li><li><p>Regulator: conducted by a regulatory body against an organization suspected of an infraction.</p></li></ul><p><strong>Computer crime</strong> is a law or regulation violation that involves a computing device and can be grouped into six categories: </p><ul><li><p><strong>Military and Intelligence Attack:</strong> Often carried out by foreign intelligence agents, state-sponsored actors, or traitors looking for classified military or law enforcement information. The goal is often cyber espionage (stealing proprietary data for political or strategic advantage) or cyber sabotage to disrupt an adversary&#8217;s critical infrastructure or military readiness.</p></li><li><p><strong>Business Attack:</strong> Targets a company to gather intelligence (stealing trade secrets or intellectual property) and DOS attacks intended to disrupt a competitor&#8217;s operations or damage their reputation.</p></li><li><p><strong>Financial Attack:</strong> Attacks targeting financial institutions, e-commerce sites, etc., to steal or embezzle funds. Tactics include stealing credit card numbers, committing identity theft, or using phishing to gain unauthorized access to online financial accounts.</p></li><li><p><strong>Terrorist Attack:</strong> Ideologically motivated attacks designed to incite fear or cause violence against civilian targets. Used to recruit members, spread fear, and cause disruption. Terrorists may target critical infrastructure, such as power grids or communication systems, to cause widespread social or economic disruption.</p></li><li><p><strong>Grudge Attack:</strong> These are personal attacks motivated by revenge, typically carried out by a disgruntled employee or former affiliate. The attacker seeks to damage the organization by deleting critical data, planting logic bombs, or leaking sensitive data.</p></li><li><p><strong>Thrill Attack:</strong> Often categorized as amusement or curiosity attacks, by thrill-seekers or "script kiddies" for the excitement of successfully breaching a system. While the attackers may not intend to cause severe harm, their unauthorized access remains illegal and can inadvertently lead to system instability.</p></li></ul><p><strong>Electronic discovery</strong> (e-discovery) is the legal process of identifying, collecting, and producing electronically stored information (ESI) as evidence in a lawsuit or investigation. While traditional discovery involves exchanging physical paper or digital documents, e-discovery focuses exclusively on digital data.</p><p>Most legal professionals follow the <a href="https://edrm.net/wiki/edrm-model/">Electronic Discovery Reference Model (EDRM)</a> to manage the process in a &#8220;defensible&#8221; manner that stands up in court:</p><ol><li><p><strong>Information Governance:</strong> Managing data from its creation to its destruction to reduce risks before a legal matter even begins.</p></li><li><p><strong>Identification:</strong> Pinpointing which digital files are relevant to the case and identifying the &#8220;custodians&#8221; or people who own or control them.</p></li><li><p><strong>Preservation:</strong> Issuing a legal hold to ensure data is not deleted, altered, or overwritten.</p></li><li><p><strong>Collection:</strong> Gathering the data from sources like email servers, cloud drives, and mobile devices while keeping their original &#8220;digital fingerprint&#8221; (metadata) intact.</p></li><li><p><strong>Processing:</strong> Converting files into a searchable format and removing duplicates (de-duplication).</p></li><li><p><strong>Review:</strong> Examining the data to decide what is relevant to the case and what should be kept private (attorney-client privileged).</p></li><li><p><strong>Analysis:</strong> Looking for patterns, key topics, and timelines to help build a legal strategy.</p></li><li><p><strong>Production:</strong> Formally delivering the relevant data to the opposing side in a readable format, such as a PDF or native file.</p></li><li><p><strong>Presentation:</strong> Displaying the final evidence to stakeholders (e.g., a judge or jury during a trial or deposition).</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://edrm.net/edrm-model/current/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!b05E!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c270b86-88bf-4e74-a376-12b577b3936a_2046x1364.png 424w, https://substackcdn.com/image/fetch/$s_!b05E!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c270b86-88bf-4e74-a376-12b577b3936a_2046x1364.png 848w, https://substackcdn.com/image/fetch/$s_!b05E!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c270b86-88bf-4e74-a376-12b577b3936a_2046x1364.png 1272w, https://substackcdn.com/image/fetch/$s_!b05E!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c270b86-88bf-4e74-a376-12b577b3936a_2046x1364.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!b05E!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c270b86-88bf-4e74-a376-12b577b3936a_2046x1364.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5c270b86-88bf-4e74-a376-12b577b3936a_2046x1364.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1147860,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://edrm.net/edrm-model/current/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.balancedsec.com/i/182113739?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c270b86-88bf-4e74-a376-12b577b3936a_2046x1364.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!b05E!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c270b86-88bf-4e74-a376-12b577b3936a_2046x1364.png 424w, https://substackcdn.com/image/fetch/$s_!b05E!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c270b86-88bf-4e74-a376-12b577b3936a_2046x1364.png 848w, https://substackcdn.com/image/fetch/$s_!b05E!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c270b86-88bf-4e74-a376-12b577b3936a_2046x1364.png 1272w, https://substackcdn.com/image/fetch/$s_!b05E!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c270b86-88bf-4e74-a376-12b577b3936a_2046x1364.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h2>7.1 - Understand and comply with investigations</h2><p><em>Evidence collection and handling</em></p><p>Proper evidence collection and handling are important for any investigation and are considered the &#8220;lifeline of credibility,&#8221; especially as digital data now appears in a high percentage of criminal cases.</p><p>Because digital evidence is fragile and easily altered, strict collection and handling protocols serve several critical functions:</p><ul><li><p>The primary goal of evidence handling is to ensure that it maintains the <strong>Chain of Custody. </strong>Maintaining a chronological record of who handled the evidence, when, and why is an absolute requirement for the court. Any &#8220;break&#8221; or missing link in this chain can lead to a ruling of inadmissible evidence, potentially resulting in the dismissal of an entire case. Chain of custody includes:</p><ul><li><p>Description of the evidence and the circumstances around its collection.</p></li><li><p>Time and date it was collected.</p></li><li><p>Exact location of where the evidence was collected.</p></li><li><p>Name of people collecting the evidence, and logging of who handled it, or transferred it, and why.</p></li><li><p>Proving that it has not been altered.</p></li></ul></li><li><p>Proper handling allows investigators to prove that the evidence presented in court is exactly the same as what was originally collected and has not been tampered with.</p></li><li><p>Digital evidence is &#8220;volatile,&#8221; meaning it can be changed accidentally just by turning on a device or copying a file, so maintaining evidence integrity is the primary concern.</p><ul><li><p><strong>Forensic Imaging:</strong> creating a "bit-for-bit" duplicate (forensic image) of the original data.</p></li><li><p><strong>Cryptographic Hashing:</strong> Every piece of digital evidence is assigned a "digital fingerprint" or hash value. If even one bit of the data is changed, the hash value changes, alerting investigators to tampering.</p></li></ul></li></ul><p>Evidence admissibility requirements include the following:</p><ul><li><p>Admissible:  It must meet legal rules before it can be introduced in court.</p></li><li><p>Relevant and Complete: The evidence must be relevant to determining a fact in the case.</p></li><li><p>Authentic and Related: Evidence must be material or related to the case.</p></li><li><p>Reliable: Evidence must be competently or legally obtained.</p></li><li><p>Believable and Convincing: It must be readily believable and understandable by a court.</p></li></ul><p>The <strong>International Organization on Computer Evidence (IOCE)</strong> established f<strong>ive core principles</strong> to ensure that digital evidence is handled reliably and legally admissible:</p><ul><li><p><strong>Integrity (No Alteration):</strong> When seizing digital evidence, no actions should be taken that change the original evidence.</p></li><li><p><strong>Forensic Competence:</strong> If it is necessary for someone to access the original digital evidence, that person must be specifically trained and forensically competent to do so.</p></li><li><p><strong>Full Documentation:</strong> Every activity related to the seizure, access, storage, or transfer of digital evidence must be fully documented and preserved so it is available for review by other parties.</p></li><li><p><strong>Individual Responsibility:</strong> Any individual who has digital evidence in their possession is personally responsible for all actions taken with that evidence during that time.</p></li><li><p><strong>Agency Compliance:</strong> Any agency responsible for seizing, accessing, storing, or transferring digital evidence is responsible for ensuring all these principles are followed by its staff.</p></li></ul><p>The <strong>Order of Volatility (OoV)</strong> determines the sequence for collecting evidence, prioritizing data that is most likely to change or disappear quickly. Based on <a href="https://datatracker.ietf.org/doc/rfc3227/">RFC 3227</a> guidelines, the standard order from most to least volatile is:</p><ol><li><p>CPU/Cache/Registers: These contain the most transient data, potentially existing only for nanoseconds. They change constantly with every processor cycle.</p></li><li><p>Memory, Kernel/Routing/ARP Cache/Process Tables: Includes machine RAM and dynamic system data like active network routing tables and kernel statistics that change as the system operates.</p></li><li><p>Temporary File Systems/Swap Space: Temporary files and swap/page files reside on disk but are frequently modified or overwritten by the operating system during a live session.</p></li><li><p>Disk (Fixed Storage): Data on physical disks is non-volatile and persists after power-off, though it still risks being overwritten by continued use.</p></li><li><p>Remote Data: This includes live connections, logs, and monitoring data stored on external servers or cloud services, which may be overwritten by the logging system over time.</p></li><li><p>Physical Configuration/Network Topology:<strong> </strong>Physical machine configuration and topology of the network.</p></li><li><p>Stored Data on Backup Media: Archival media or offline backups are the least volatile, as the data remains unchanged unless the physical media is damaged or intentionally modified.</p></li></ol><p>In legal proceedings, evidence is generally categorized into four primary types based on its nature and how it is presented to the court:</p><ul><li><p><strong>Real Evidence (Physical Evidence):</strong> This refers to tangible objects that were directly involved in the event being investigated. Because these items are physical, they can be inspected by the judge or jury.</p></li><li><p><strong>Documentary Evidence:</strong> This consists of information recorded in a format that can be preserved and read, used to prove or challenge facts. Some examples include contracts, emails, business records, and system logs.</p></li><li><p><strong>Testimonial Evidence:</strong> This is oral or written evidence provided by a witness under oath. It involves the witness narrating what they saw, heard, or experienced firsthand.</p></li><li><p><strong>Demonstrative Evidence:</strong> This category includes items created specifically for the trial to illustrate or explain other evidence and testimony. Unlike real evidence, it was not part of the original event but helps the jury understand complex facts.</p></li></ul><p>In legal and forensic contexts, evidence is further classified by source, reliability, and relationship to the facts of the case:</p><ul><li><p><strong>Best Evidence (Primary):</strong> The most reliable form of evidence, typically the original document or file rather than a copy or printout.</p></li><li><p><strong>Secondary Evidence:</strong> Evidence that is reproduced from an original source, such as document copies or a witness&#8217;s oral description of a document&#8217;s contents. This form of evidence is used when best or primary evidence can&#8217;t be obtained.</p></li><li><p><strong>Direct Evidence:</strong> Evidence that proves a fact directly without needing any inference or interpretation, such as eyewitness testimony or a video recording of an event or act.</p></li><li><p><strong>Conclusive Evidence:</strong> Evidence so strong that it cannot be contradicted by other evidence. It obliges the judge or jury to reach a specific conclusion.</p></li><li><p><strong>Circumstantial (Indirect) Evidence:</strong> Evidence that suggests a fact by proving other related facts. It requires the judge or jury to make a logical inference to connect the evidence to the conclusion.</p></li><li><p><strong>Corroborative Evidence:</strong> Additional evidence of a different character that strengthens, supports, or confirms already existing evidence.</p></li><li><p><strong>Opinion Evidence:</strong> Testimony provided by a witness regarding what they believe or infer about a fact, rather than what they personally saw or heard. Typically, this type of evidence is limited to expert witnesses with specialized knowledge in a relevant field.</p></li><li><p><strong>Hearsay Evidence:</strong> &#8220;Second-hand&#8221; evidence consisting of a statement made outside of court by someone other than the person testifying, offered to prove the truth of what was said. It is generally inadmissible unless it meets specific legal exceptions.</p></li></ul><p>Methods of evidence collection are governed by legal frameworks to ensure that evidence is gathered legally and remains admissible in court.</p><p>Methods for collecting evidence include:</p><ul><li><p><strong>Voluntary Surrender (Consent):</strong> A person with authority over the property or data voluntarily agrees to provide it to investigators. For this to be valid, consent must be given freely, without coercion, and the person can typically limit the scope of what is searched.</p></li><li><p><strong>Subpoena:</strong> A legal demand for an individual or entity (like a business or witness) to produce specific documents, records, or digital data at a later date. Unlike a warrant, a subpoena does not require a showing of probable cause, and the recipient can challenge it in court before complying.</p></li><li><p><strong>Search Warrant:</strong> A court order signed by a judge that authorizes law enforcement to immediately enter a location and search for specific items or data based on probable cause. Warrants for digital devices must often include specific &#8220;search protocols&#8221; to prevent overly broad or intrusive exploration of private data.</p></li><li><p><strong>Seizure of Visible Evidence (Plain View Doctrine):</strong> This allows officers to seize evidence without a warrant if they are lawfully present (e.g., executing a different warrant or during a traffic stop), the item is in plain sight, and its incriminating nature is immediately apparent. However, while this may allow the seizure of a computer or phone, it generally does not grant the authority to search the digital contents without an additional warrant.</p></li><li><p><strong>Exigent Circumstances:</strong> Emergency situations that allow for immediate warrantless search or seizure to prevent the imminent destruction of evidence, protect lives from immediate danger, or during the &#8220;hot pursuit&#8221; of a suspect. Once the immediate emergency is over, a warrant is typically required to conduct further detailed searches.</p></li></ul><p>Remember the <strong>Locard exchange principle</strong>: whenever a crime is committed, something is taken, and something is left behind. In short, contact leaves traces, whether it happens in the physical world or between digital objects.</p><p></p><p><em>Reporting and documentation</em></p><p>Reporting and documentation are prioritized as the primary defense against legal challenges and the key to organizational recovery. Effective investigation management centers on these core concepts:</p><p><strong>1. </strong>Meticulous Step-by-Step:<strong> </strong>Documentation should serve as a detailed diary of the investigation to ensure it is thorough and fair.</p><p><strong>2. </strong>Structured Report Creation:<strong> </strong>A professional investigative report summarizes findings objectively and prompts necessary action.</p><p><strong>3. </strong>Secure Storage Systems:<strong> </strong>Integrity is non-negotiable, and investigators rely on secure, centralized systems to protect sensitive data.</p><p><strong>4. </strong>Stakeholder Updates:<strong> </strong>Communication must balance transparency with the need to protect the investigation&#8217;s integrity.</p><p></p><p><em>Investigative techniques</em></p><p>Whether in response to a crime or incident, an organizational policy breach, or troubleshooting a system or network issue, digital forensic methodologies can assist in finding answers, solving problems, and, in some cases, help successfully prosecute crimes.</p><p>The forensic investigation process should include the following:</p><ul><li><p>Identification and securing of a crime scene.</p></li><li><p>Proper collection of evidence that preserves its integrity and the chain of custody.</p></li><li><p>Examination of all evidence.</p></li><li><p>Further analysis of the most compelling evidence.</p></li><li><p>Final reporting.</p><p></p></li></ul><p>Sources of information and evidence include:</p><ul><li><p>Interviews, oral/written statements: Statements from witnesses, investigators, or testimony in court by people who witness a crime or who may have pertinent information.</p></li><li><p>Data collection: Documentation such as business contracts, system logs, network traffic, and other collected system data. This can include photographs, video, recordings, and surveillance footage from security cameras.</p></li></ul><p>Several investigative techniques can be used when conducting analysis:</p><ul><li><p>Forensic analysis: analysis of systems and components that are in scope for the incident or investigation.</p></li><li><p>Software analysis: focuses on applications and malware, determining how it works and what it&#8217;s trying to do, with a goal of attribution.</p></li><li><p>Third-party collaboration: assistance and collaboration with external organizations and authorities, such as law enforcement or insurance-related external investigators.</p></li></ul><p></p><p><em>Digital forensics tools, tactics, and procedures</em></p><p>Digital forensics leverages highly specialized tools and standardized procedures to address the explosive growth of volatile, distributed data. Key areas of focus for investigators include:</p><p><strong>1. Evidence Preservation </strong>(The Foundation)</p><p>Preserving data integrity is the most critical first step to ensure evidence is legally admissible.</p><ul><li><p>Tactics &amp; Procedures:</p><ul><li><p>Write Blockers<strong>:</strong> Using hardware write blockers when connecting to storage media prevents inadvertent modification of original data.</p></li><li><p>Forensic Imaging<strong>:</strong> Creating &#8220;bit-for-bit&#8221; duplicate copies of the original media. Analysis is performed <em>only</em> on these working copies, never the original.</p></li><li><p>Chain of Custody<strong>:</strong> Maintaining a meticulous, timestamped log of every person who handled the evidence.</p></li><li><p>Physical Protection<strong>:</strong> Protecting physical devices from access or damage. Examples include using a Faraday bag to block signals and prevent remote wiping of mobile devices.</p></li></ul></li></ul><p><strong>2. In-Memory (RAM) Analysis</strong></p><p>Memory forensics is essential for detecting &#8220;fileless&#8221; malware, active network connections, and encryption keys that do not exist on a storage drive.</p><ul><li><p>Key Tools: Memory forensic tools focus on acquiring volatile RAM snapshots and analyzing them for threats. The Volatility Framework (an open-source tool written in Python) is an example.</p></li><li><p>Tactics: Prioritize RAM capture over hard drive imaging during initial triage because memory is the most volatile evidence and much faster to acquire.</p></li></ul><p><strong>3. Media Analysis </strong>(Fixed &amp; Removable Storage)</p><p>Media analysis involves deep-level inspection of file systems, registry artifacts, and deleted content.</p><ul><li><p>Key Tools: Media analysis forensic tools provide acquisition, analysis, and reporting capabilities across cloud, desktop, and mobile devices.</p></li><li><p>Tactics:</p><ul><li><p>File Carving: Recovering fragments of deleted files by searching for specific file signatures in unallocated space.</p></li><li><p>Artifact Analysis: A specialized digital forensic process of identifying, extracting, and interpreting "digital footprints&#8221; or records of activity left behind on a device.</p></li></ul></li></ul><p><strong>4. Network Forensics</strong></p><p>Network analysis captures and reconstructs data flowing through a network to identify attack vectors and data exfiltration.</p><ul><li><p>Key Tools: Examples include Wireshark (packet sniffing), tcpdump, Snort (IDS logs), and Nagios.</p></li><li><p>Tactics:</p><ul><li><p>Packet Analysis<strong>:</strong> Deep inspection of individual data packets to identify malicious payloads.</p></li><li><p>Log Examination<strong>:</strong> Correlating traffic patterns with system and application logs to build a timeline of the incident.</p></li></ul></li></ul><p><strong>5. Emerging Trends</strong></p><ul><li><p>Cloud Forensics: Investigators can use specialized tools to extract evidence from remote cloud services and synchronized mobile apps.</p></li><li><p>AI-Driven Analysis: AI tools are used to automatically flag relevant patterns and anomalies in massive datasets that would take human examiners months to review manually.</p></li><li><p>Anti-Forensics Countermeasures: Investigators can use techniques like Metadata Analysis to detect when cybercriminals have attempted to wipe or manipulate evidence.</p></li></ul><p></p><p><em>Artifacts (e.g., data, computer, network, mobile device)</em></p><p>Digital artifacts or digital evidence that provide information on a security incident are classified by their source and state (e.g., volatile vs. non-volatile). These "remnants" allow investigators to reconstruct who performed an action, what occurred, and when it happened.</p><p>Examples of artifacts include:</p><ul><li><p>Computer &amp; OS: artifacts that track user activity, program execution, and system configuration, such as Windows registry elements, execution remnants (proof a program was run), or event logs.</p></li><li><p>Network: Traffic telemetry and connection logs that track data movement and external communications.</p></li><li><p>Mobile device: Smartphones function as "digital journals" with unique location and communication data that might include SMS, GPS location data, or browser history.</p></li></ul><h2>7.2 - Conduct logging and monitoring activities</h2><p>Logging and monitoring are the primary mechanisms for security assurance, shifting security from a reactive "snapshot" approach to an ongoing "operational cadence". They help prevent incidents and provide critical validation that security controls, such as access management, firewalls, and encryption, are functioning as designed and effectively protecting assets.</p><p>Logging simply means recording information about events, such as changes, messages, and activities. The goal is to keep a record of what, when, where, and even how an event occurred. Logging and monitoring act as an "electronic sentry," providing immediate visibility when a control is bypassed or incorrectly implemented.</p><p>Security professionals need to understand and master tools such as IDPS, SIEM, SOAR, Threat Intelligence, and UEBA because modern cyberattacks, now frequently accelerated by AI, unfold faster than manual monitoring can keep pace. These technologies work together to transform massive volumes of raw data into actionable security insights and rapid responses.</p><p>Sampling is a technique for managing the explosive volume of telemetry data generated by distributed systems and AI-driven infrastructures. By capturing and analyzing a representative subset of data rather than every event, organizations can maintain visibility while controlling costs.</p><p><strong>Clipping levels</strong> are a form of non-statistical (or discretionary) sampling in which only events that exceed a predefined threshold (the clipping level) are selected, and these types of events are ignored until they reach this threshold. Clipping is widely used to set a baseline for user activity or routine events.</p><p></p><p><em>Intrusion detection and prevention (IDPS)</em></p><p>IDPS<strong> </strong>provides early warning signals by monitoring network traffic for known threats or policy violations in real time. The technology helps provide visibility into malicious activity across networks with both real-time alerting (IDS) and automated response (IPS).</p><p>The two primary detection methodologies differ in their approach to identifying threats:</p><p><strong>1. </strong>Signature-Based</p><p>Signature-based (AKA pattern-based or knowledge-based) IDPS works like antivirus software, matching incoming traffic against a database of known attack patterns or &#8220;signatures.&#8221;</p><ul><li><p>Effectiveness: Highly accurate at detecting known threats.</p></li><li><p>Key Advantage: It produces a very low false-positive rate, meaning it rarely flags legitimate traffic as a threat.</p></li><li><p>Limitation: It is entirely ineffective against zero-day exploits or novel attacks that do not yet have a recorded signature.</p></li></ul><p><strong>2. </strong>Anomaly-Based </p><p>Instead of looking for specific threats, this method establishes a normalized baseline of typical network behavior and flags any significant deviations as suspicious.</p><ul><li><p>Effectiveness: It excels at detecting unknown or emerging threats, including zero-day attacks, sophisticated insider threats, and polymorphic malware.</p></li><li><p>Key Advantage: It is highly adaptable and can identify unusual patterns (e.g., massive data transfers at 3 AM) that signature-based systems would miss.</p></li><li><p>Limitation: It is prone to a higher false-positive rate because legitimate but unusual business changes can trigger alerts. It also requires substantial computational resources for real-time behavioral analysis.</p></li></ul><p></p><p><em>Security Information and Event Management (SIEM)</em></p><p>A <strong>SIEM</strong> collects, aggregates, and analyzes log and event data from various sources across an IT environment, such as network hardware, applications, and endpoints. </p><p>SIEMs have evolved from simple log collectors into &#8220;central nervous systems&#8221; for Security Operations Centers (SOCs), prioritizing threat detection, investigation, and response over basic compliance.</p><p>Common SIEM features include:</p><ul><li><p>Data aggregation and normalization<strong>:</strong> Collects logs from diverse sources (firewalls, cloud apps, servers) and converts them into a uniform, searchable format.</p></li><li><p>Real-time event correlation: Uses predefined rules and advanced analytics to link seemingly unrelated log events (e.g., a failed login followed by a successful one from an unusual location) to identify a single multi-stage threat.</p></li><li><p>AI and machine learning: Employs advanced algorithms to detect anomalies and &#8220;fileless&#8221; attacks that traditional signature-based rules might miss.</p></li><li><p>User and Entity Behavior Analytics (UEBA): Establishes behavioral baselines for users and devices to flag suspicious deviations, such as an employee accessing sensitive files at odd hours.</p></li><li><p>Incident response automation integration: Modern platforms increasingly integrate Security Orchestration, Automation, and Response (SOAR) to trigger automated workflows, such as isolating a compromised host or blocking a malicious IP within seconds.</p></li><li><p>Compliance Management and Reporting: Automates the creation of audit-ready reports for regulatory frameworks like GDPR, HIPAA, and PCI DSS.</p></li><li><p>Centralized dashboards: Provide &#8220;single-pane-of-glass&#8221; visibility with visual metrics and real-time alerts for security analysts.</p></li><li><p>Forensic and historical analysis: Enables teams to search vast amounts of historical data to reconstruct the timeline of an attack and find its root cause.</p></li><li><p>Threat intelligence integration: Enriches internal log data with external feeds of global indicators of compromise (IoCs) for more accurate detection.</p></li></ul><p><strong>Security Orchestration, Automation, and Response (SOAR)</strong> is a technology stack that enables organizations to collect data from various security sources, such as firewalls and endpoint protection systems, and automate responses to security events through a centralized platform.</p><p>SOAR is critical for reducing <strong>"</strong>alert fatigue<strong>"</strong> by automating low-level, repetitive tasks, allowing security analysts to focus on complex threat hunting and investigation.</p><p>Playbooks vs runbooks: note that there isn&#8217;t a universal definition for these terms.  However, in incident response, <strong>playbooks</strong> are broad documents, checklists, or digital workflows that outline the high-level plan for responding to specific incident types. They help coordinate security tools and personnel to ensure a consistent, organization-wide response. Playbooks are the documented processes that should be followed.</p><p><strong>Runbooks</strong>, on the other hand, implement the playbook&#8217;s actions. In a SOAR context, runbooks take playbook steps and translate them into automated actions and workflows. Runbooks are the implementation of the playbook&#8217;s documented processes.</p><p></p><p><em>Continuous monitoring and tuning</em></p><p>Monitoring and tuning are continuous processes of assessing events and adjusting security controls to match an organization&#8217;s requirements and operating environment. Systems like IDPS require tuning to reduce false positives while ensuring that potential intrusions are not missed. </p><p>In order to maximize the value of monitoring and tuning, considerations include:</p><ul><li><p>Establish metrics and KPIs: As we&#8217;ve previously noted, metrics are important for establishing baselines and showing progress, especially in the context of event and control monitoring. Boards will continue to require quantified, data-driven insights that metrics help provide.</p></li><li><p>It&#8217;s also important to continuously improve security operations via processes such as root cause analysis, maintaining updated policies, and continuous training, evaluation, and tuning.</p></li></ul><p></p><p><em>Egress monitoring</em></p><p><strong>Egress monitoring</strong> involves tracking and analyzing data as it leaves a private network for external destinations. While many organizations traditionally focus on "ingress" (incoming) traffic to block external attacks, egress monitoring focuses on the internal-to-external flow to prevent data loss and detect compromised systems already inside the network.</p><p>The goal of egress monitoring is to prevent the exfiltration of sensitive data, disrupt malware, detect early compromise, and monitor the sharing of personal or financial information.</p><p>Egress monitoring tools and considerations include:</p><ul><li><p>Developing policies and rules to detect and deter exfiltration and communication with known malicious sites and services.</p></li><li><p>Using egress filtering and monitoring controls such as firewalls and data loss prevention (DLP) to detect and block sensitive data transmissions and provide alerting.</p></li><li><p>Using modern firewalls that can inspect the content of encrypted outbound traffic to ensure sensitive files are not hidden within authorized protocols like HTTPS.</p></li><li><p>Monitoring egress traffic from internal services to third-party APIs to prevent the leakage of PII or the abuse of API keys.</p></li><li><p>Integrating egress monitoring with other tools such as SIEM and SOAR.</p></li></ul><p></p><p><em>Log management</em></p><p><strong>Log management</strong> captures, stores, and protects<strong> </strong>the logs generated across an organization&#8217;s infrastructure. Robust log management is a requirement to support security monitoring, incident response, and compliance. </p><p>Log management involves creating the systems and infrastructure to capture and store log data from an organization&#8217;s diverse and relevant sources. To avoid losing data, organizations capture logs from the full stack, including ephemeral sources such as serverless functions and containers. </p><p>Log data should be stored for relevant periods, and retention and archival policies should define:</p><ul><li><p>The availability of log data for required record retention and regulatory compliance. </p></li></ul><ul><li><p>The integrity of log data, for instance, by storing logs in a centralized location and ensuring that logs have not been altered or deleted.</p></li><li><p>Ensuring the confidentiality of log data, which often contains sensitive information, such as IP addresses, usernames, and sometimes inadvertently captured passwords or PII.</p></li></ul><p></p><p><em>Threat intelligence (e.g., threat feeds, threat hunting)</em></p><p><strong>Threat intelligence</strong> is the collection, analysis, and interpretation of information about potential or current attacks targeting an organization. It can be classified into three functional levels:</p><ul><li><p>Strategic Intelligence<strong>:</strong> High-level information for executives and board members regarding long-term trends, geopolitical risks, and financial impacts.</p></li><li><p>Operational Intelligence<strong>:</strong> Detailed insights into specific incoming campaigns, including the &#8220;who&#8221; (threat actors) and &#8220;why&#8221; (motivations) behind an attack.</p></li><li><p>Tactical Intelligence<strong>:</strong> Real-time, technical indicators of compromise (IoCs) like malicious sites, IP addresses, file hashes, and specific Tactics, Techniques, and Procedures (TTPs) used by attackers.</p></li></ul><p>A <strong>threat intelligence feed</strong> is an automated, continuous stream of real-time data that provides actionable information on emerging and active cyber threats. These feeds are the "breaking news ticker" for cybersecurity teams, delivering the technical details needed to identify and block attacks before they impact an organization.</p><p>STIX and TAXII are the global open standards that enable organizations to share cyber threat intelligence in a machine-readable format, reducing the need for manual data processing.</p><p><strong>STIX</strong> (Structured Threat Information eXpression) is a standardized language and serialization format, typically in JSON, for <em>describing cyber threat information</em>. </p><p><strong>TAXII</strong> (Trusted Automated eXchange of Intelligence Information) is <em>the transport protocol</em> used to securely exchange STIX-formatted data over HTTPS.</p><p><strong>Automated Indicator Sharing (AIS)</strong> is a no-cost, voluntary service that enables the real-time exchange of machine-readable cyber threat indicators and defensive measures between the federal government and the private sector. AIS is managed by the Cybersecurity and Infrastructure Security Agency (CISA).</p><p><strong>Threat hunting</strong> is a proactive search across an organization&#8217;s network and endpoints to identify malicious activity that has evaded traditional automated security tools. Unlike reactive monitoring, which waits for a system alert to trigger an investigation, threat hunting assumes an attacker may already be present in the environment.</p><p>The <strong>Cyber Kill Chain</strong> is a<strong> </strong>foundational cybersecurity framework that describes the sequential stages an adversary must complete to conduct a successful attack. Developed by Lockheed Martin, it adapts military strategy to help defenders identify, disrupt, and prevent intrusions across the attack lifecycle.</p><p>While some modern models expand this to eight stages by adding monetization (how attackers profit), the classic Lockheed Martin model consists of seven phases:</p><ol><li><p><strong>Reconnaissance:</strong> Gathering intelligence on the target, such as identifying open ports, searching employee details on social media, or scanning for network vulnerabilities.</p></li><li><p><strong>Weaponization:</strong> Coupling an exploit (targeting a specific vulnerability) with a malicious payload that includes a backdoor for delivery to the target.</p></li><li><p><strong>Delivery:</strong> Transmitting the weaponized payload to the target via phishing emails, malicious links, compromised websites, or physical media like USB drives.</p></li><li><p><strong>Exploitation:</strong> Executing the malicious code on the target system by taking advantage of a software or hardware vulnerability.</p></li><li><p><strong>Installation:</strong> Establishing a persistent foothold on the victim&#8217;s network, often by installing backdoors or Trojans that survive system reboots.</p></li><li><p><strong>Command and Control (C2):</strong> Establishing a remote communication channel between the compromised system and the attacker&#8217;s infrastructure to receive instructions or move laterally.</p></li><li><p><strong>Actions on Objectives:</strong> The final phase, where the attacker fulfills their primary goal, such as exfiltrating data, destroying systems, or encrypting files for ransom.</p></li></ol><p>By understanding these phases, defenders can aim to "break the chain" as early as possible. Disrupting even a single stage can prevent the entire attack from succeeding. Security teams use the kill chain to map specific controls to each phase (e.g., email security for Delivery, EDR for Exploitation, and network monitoring for C2).</p><p>While traditionally linear, it is increasingly used alongside more detailed frameworks like MITRE ATT&amp;CK to handle non-linear, AI-accelerated attacks that may compress multiple stages into hours rather than weeks.</p><p><strong>MITRE ATT&amp;CK</strong> (Adversarial Tactics, Techniques, and Common Knowledge) is the global industry-standard knowledge base for documenting and categorizing real-world cyber adversary behaviors. It provides a standardized language that allows security professionals to describe "how" and "why" attackers operate.</p><p>The framework or core is structured into tactics, techniques, sub-techniques, and procedures (TTPs):</p><ul><li><p>Tactics (The &#8220;Why&#8221;): The high-level technical goals an adversary wants to achieve, such as initial access, persistence, or exfiltration.</p></li><li><p>Techniques (The &#8220;How&#8221;): Specific methods used to achieve a tactic. For example, spearphishing attachment is a technique used to achieve the Initial Access tactic.</p></li><li><p>Sub-techniques (The &#8220;How&#8221; in Detail): More granular descriptions of a technique. Under phishing for instance, sub-techniques might include spearphishing link or &#8220;Spearphishing<em> </em>via Service.&#8221;</p></li><li><p>Procedures: Real-world implementations and specific tools used by threat actors in observed incidents.</p></li></ul><p></p><p><em>User and Entity Behavior Analytics (UEBA)</em></p><p><strong>UEBA</strong> is an advanced cybersecurity solution that often uses AI and ML to establish "normal" behavioral baselines for users and entities. By monitoring for deviations from these baselines, UEBA identifies subtle, risky activities that traditional rule-based security tools often miss.</p><ul><li><p>Behavioral Baselining: The UEBA system observes activity over a period of time to learn patterns using data collected from sources such as system, application, and endpoint logs. The baseline covers things like standard login times, frequent file access, and average data transfer volumes.</p></li><li><p>Anomaly Detection: Once a baseline is established, it continuously compares real-time activity to these norms. For example, a user who typically downloads 20MB of data suddenly downloading 4GB might be flagged as an anomaly.</p></li><li><p>Dynamic Risk Scoring: UEBA assigns a risk score to each anomaly based on its severity and context. Multiple minor anomalies (e.g., a login from a new location plus access to sensitive files) can aggregate into a high-risk score that triggers an alert.</p></li></ul><p>UEBA use cases include areas such as:</p><ul><li><p>Insider Threat Detection: Identifies unusual behavior that might indicate policy violations or malicious intent to harm the organization.</p></li><li><p>Compromised Account Identification: Detects when a legitimate user&#8217;s credentials have been stolen by highlighting behavioral changes, even if the login appears authorized. It also helps monitor highly privileged user accounts for IoCs.</p></li><li><p>Zero-Day and APT Detection: Uncovers sophisticated &#8220;low and slow&#8221; attacks and previously unknown exploits that lack traditional signatures.</p></li><li><p>Data Exfiltration Prevention: Monitors for unusual data movement, such as large transfers to external cloud services or USB drives.</p></li></ul><h2>7.3 - Perform Configuration Management (CM) (e.g., provisioning, baselining, automation)</h2><p><strong>Configuration Management (CM) </strong>is the<strong> </strong>process of identifying, controlling, and verifying the configuration of organizational systems and settings.<strong> </strong>The focus is on establishing and maintaining the integrity of IT products and systems by controlling their initialization and changes, and by monitoring configuration throughout their lifecycle.</p><p>When something changes in systems under configuration management, for instance, patching software or a configuration update, the change is recorded. This allows the configuration management system to track changes, helping prevent mistakes and reduce security risks.</p><p>Some of the core functions of configuration management include:</p><ul><li><p>Developing a configuration management plan that outlines roles, responsibilities, standards, and the tools to be used for a project.</p></li><li><p>Selecting and documenting configuration items<strong> (</strong>any IT asset worth tracking) and establishing a baseline configuration snapshot.</p></li><li><p>Implementing configuration change control, a structured process managed by a configuration control board<strong> </strong>to review, approve, and track system changes to prevent unauthorized or risky modifications.</p></li><li><p>Record-keeping that documents details (location, version, status) and tracks the history of changes (who, what, when, and why).</p></li><li><p>Formal reviews to ensure that a system actually matches its design documentation and satisfies established performance and security requirements.</p></li></ul><p><strong>Provisioning</strong> means taking a specific config baseline, creating additional or modified copies, and deploying those copies into the environment. For instance, installing and configuring the operating system and required applications on new systems.</p><p><strong>System hardening</strong> refers to the process of applying security configurations and locking down hardware, communication systems, and software. System hardening is normally based on industry guidelines and benchmarks.</p><p>A <strong>baseline </strong>in the context of configuration management is the starting point or starting config for a system.</p><p></p><h2>7.4 - Apply foundational security operations concepts</h2><p><em>Need-to-know/least privilege</em></p><p><strong>Need-to-Know</strong> is a fundamental security principle that restricts access to sensitive data to only those individuals who require it to perform their specific, authorized job duties. It ensures that a user must have a legitimate business or mission requirement to access specific information, and even if an individual has the appropriate security clearance or high-level organizational role, they are still denied access to data that is not essential for their current task.</p><p>Granular data-centric access controls are often applied to specific information or data sets, which can be challenging to enforce in hybrid environments.</p><p>As we discussed in <a href="https://blog.balancedsec.com/i/175364869/research-implement-and-manage-engineering-processes-using-secure-design-principles">Domain 3,</a> least privilege means that subjects are granted only the privileges necessary to perform assigned work tasks and no more. The concept should be applied to data, software, and system design to reduce the surface, scope, and impact of any attack.</p><p></p><p><em>Separation of Duties (SoD) and responsibilities</em></p><p>Separation of Duties (SoD) (AKA Segregation of Duties) helps prevent any single person from having enough unchecked authority to commit and conceal fraud or errors by dividing tasks among different individuals or organizations. It&#8217;s an effective "system of checks and balances," and a primary defense against insider threats.</p><p>Collusion is an agreement or cooperation between two or more individuals to deceive, bypass security controls, or commit fraud. By splitting responsibilities, SoD reduces the likelihood of fraud because it requires collusion &#8212; multiple people working together to commit the crime.</p><p></p><p><em>Privileged account management</em></p><p><strong>Privileged Account Management (PAM)</strong> is the specialized security around controlling, monitoring, and auditing accounts with elevated permissions. These accounts have the authority to perform critical tasks like changing configurations, installing software, or accessing sensitive data.</p><p>PAM combines people, processes, and technology to tightly control who can access privileged accounts and how they&#8217;re used, helping protect an organization&#8217;s most critical systems and data. PAM enforces least privilege by granting only the minimum access needed for a role. It can also provide Just-in-Time (JIT) access, granting elevated privileges temporarily for a specific task and automatically revoking them once the task is complete, eliminating "standing privileges."</p><p>PAM is often required to qualify for cyber insurance and to meet stringent regulatory requirements.</p><p></p><p><em>Job rotation</em></p><p>Job rotation is an administrative security control where employees are systematically moved through different positions or tasks within an organization at regular intervals.</p><p>While it is often used for cross-training and employee development, its primary purpose in security is to act as a detective and deterrent control against fraud and insider threats.</p><p>As a real-world example, rotating the administrators responsible for managing the PAM system ensures that no single &#8220;super-admin&#8221; has unchecked control over the organization&#8217;s most sensitive credentials for too long.</p><p></p><p><em>Service-level agreements (SLA)</em></p><p>A <strong>service-level agreement (SLA)</strong> is a legally binding contract between a service provider and a customer that defines the expected service standard, the metrics used to measure it, and the remedies available if those standards are not met.</p><p>Effective SLAs often include several essential elements to prevent ambiguity:</p><ul><li><p><strong>Service Description:</strong> A detailed overview of exactly what services are provided, their scope, and any dependencies.</p></li><li><p><strong>Performance Metrics:</strong> Quantifiable criteria (KPIs) such as uptime percentages, response times, and resolution rates.</p></li><li><p><strong>Roles and Responsibilities:</strong> Clear definitions of what is expected from both the provider and the customer (e.g., the customer&#8217;s duty to report issues promptly).</p></li><li><p><strong>Penalties and Rewards:</strong> Financial consequences like service credits for missed targets, or occasionally, incentives for exceeding performance standards.</p></li><li><p><strong>Exclusions:</strong> Explicitly stated services or circumstances (like natural disasters or &#8220;force majeure&#8221;) that are not covered by the agreement.</p></li><li><p><strong>Security and Compliance:</strong> Protocols for data protection, confidentiality, and meeting industry-specific regulatory standards (e.g., HIPAA for healthcare).</p></li></ul><p>In part two, we&#8217;ll continue through Domain 7 and objectives 7.5 forward. If you&#8217;re on the CISSP learning journey, keep studying and connecting the dots, and let me know if you have any questions about this domain.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://www.balancedsec.com/1on1-mentoring" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Oarb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6fbf1efa-0d98-4500-95d8-1208196eadd7_700x200.png 424w, https://substackcdn.com/image/fetch/$s_!Oarb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6fbf1efa-0d98-4500-95d8-1208196eadd7_700x200.png 848w, https://substackcdn.com/image/fetch/$s_!Oarb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6fbf1efa-0d98-4500-95d8-1208196eadd7_700x200.png 1272w, https://substackcdn.com/image/fetch/$s_!Oarb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6fbf1efa-0d98-4500-95d8-1208196eadd7_700x200.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Oarb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6fbf1efa-0d98-4500-95d8-1208196eadd7_700x200.png" width="700" height="200" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6fbf1efa-0d98-4500-95d8-1208196eadd7_700x200.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:200,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:&quot;https://www.balancedsec.com/1on1-mentoring&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Oarb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6fbf1efa-0d98-4500-95d8-1208196eadd7_700x200.png 424w, https://substackcdn.com/image/fetch/$s_!Oarb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6fbf1efa-0d98-4500-95d8-1208196eadd7_700x200.png 848w, https://substackcdn.com/image/fetch/$s_!Oarb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6fbf1efa-0d98-4500-95d8-1208196eadd7_700x200.png 1272w, https://substackcdn.com/image/fetch/$s_!Oarb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6fbf1efa-0d98-4500-95d8-1208196eadd7_700x200.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h2></h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.balancedsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Leader - Balanced Security is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Understanding CISSP Domain 6, Security Assessment and Testing - Part 2]]></title><description><![CDATA[In Part 1, we covered the CISSP Domain 6 topics related to designing and validating assessment & audit strategies and conducting control testing.]]></description><link>https://blog.balancedsec.com/p/understanding-cissp-domain-6-security-cbf</link><guid isPermaLink="false">https://blog.balancedsec.com/p/understanding-cissp-domain-6-security-cbf</guid><dc:creator><![CDATA[Jeffery Moore]]></dc:creator><pubDate>Fri, 26 Dec 2025 14:00:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!pBaM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F770fa219-d6ad-4ad4-a7a2-c3dd28751339_3840x2160.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pBaM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F770fa219-d6ad-4ad4-a7a2-c3dd28751339_3840x2160.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pBaM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F770fa219-d6ad-4ad4-a7a2-c3dd28751339_3840x2160.png 424w, https://substackcdn.com/image/fetch/$s_!pBaM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F770fa219-d6ad-4ad4-a7a2-c3dd28751339_3840x2160.png 848w, https://substackcdn.com/image/fetch/$s_!pBaM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F770fa219-d6ad-4ad4-a7a2-c3dd28751339_3840x2160.png 1272w, https://substackcdn.com/image/fetch/$s_!pBaM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F770fa219-d6ad-4ad4-a7a2-c3dd28751339_3840x2160.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pBaM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F770fa219-d6ad-4ad4-a7a2-c3dd28751339_3840x2160.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/770fa219-d6ad-4ad4-a7a2-c3dd28751339_3840x2160.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:400982,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.balancedsec.com/i/182015894?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F770fa219-d6ad-4ad4-a7a2-c3dd28751339_3840x2160.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!pBaM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F770fa219-d6ad-4ad4-a7a2-c3dd28751339_3840x2160.png 424w, https://substackcdn.com/image/fetch/$s_!pBaM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F770fa219-d6ad-4ad4-a7a2-c3dd28751339_3840x2160.png 848w, https://substackcdn.com/image/fetch/$s_!pBaM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F770fa219-d6ad-4ad4-a7a2-c3dd28751339_3840x2160.png 1272w, https://substackcdn.com/image/fetch/$s_!pBaM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F770fa219-d6ad-4ad4-a7a2-c3dd28751339_3840x2160.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In <a href="https://blog.balancedsec.com/p/understanding-cissp-domain-4-communication">Part 1</a>, we covered the CISSP Domain 6 topics related to designing and validating assessment &amp; audit strategies and conducting control testing. We defined core concepts, including what a security test and an audit are, which types of testing fall under an organization&#8217;s control, and what a vulnerability management program is designed to accomplish.</p><p>In Part 2, we continue exploring data collection, analyzing test results, reporting, and conducting various types of security audits. Let&#8217;s dive into the domain and cover the material by continuing to follow <a href="https://www.isc2.org/certifications/cissp/cissp-certification-exam-outline#Domain%205:%20Identity%20and%20Access%20Management%20(IAM)">the ISC2 exam outline</a>.</p>
      <p>
          <a href="https://blog.balancedsec.com/p/understanding-cissp-domain-6-security-cbf">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>