👾
Rootkid - Cyber Journal
Portfolio
  • 👩‍🚀Introduction
    • 🤖About Cyber Journal & Rootkid
    • 📜License Agreement
    • ⚠️Disclaimer
  • 📚Exam Prep Notes
    • 🗒️KLCP Exam (PEN-103) - Notes
      • 1. Linux Fundamentals
      • 2. Introduction
      • 3. About Kali Linux
      • 4. Getting Started with Kali Linux
      • 5. Installing Kali Linux
      • 6. Configuring Kali Linux
      • 7. Helping Yourself and Getting Help
      • 8. Securing and Monitoring Kali Linux
      • 9. Debian Package Management
      • 10. Advanced Usage
      • 11. Kali Linux in the Enterprise
      • 12. Introduction to Security Assessments
      • 13. Conclusion: The Road Ahead
    • 📒ISO/IEC 27001:2022 Lead Auditor - Notes
      • ISO - Training - Day - 1
      • ISO - Training - Day - 2
      • ISO - Training - Day - 3
      • ISO - Training - Day - 4
      • Practice Questions - Notes
      • Other PDF References
    • 📑Junior Penetration Tester (eJPTv2) - Notes
      • 💡Assessment Methodologies
        • 🔍Information Gathering
          • 🌏Passive Information Gathering
          • 🧐Active Information Gathering
        • 👣Footprinting & Scanning
          • 🗺️Mapping a Network
          • 🎛️Port Scanning
        • 🕵️Enumeration
          • 📜SMB Enumeration
          • 📂FTP Enumeration
          • 🐚SSH Enumeration
          • 🕸️HTTP Enumeration
          • 🗄️MySQL & MSSQL Enumeration
        • 🐛Vulnerability Assessment
          • 🩸Case Study: Heartbleed Vulnerability (CVE-2014-0160)
          • 🔵Case Study: EternalBlue Vulnerability (CVE-2017-0143)
          • 👨‍💻Case Study: Log4J Vulnerability (CVE-2021-44228)
      • 🧰Assessment Methodologies: Auditing Fundamentals
      • 📶Host & Network Penetration Testing
        • 💻System/Host Based Attacks
          • 🪟Overview Of Windows Vulnerabilities
          • 💣Exploiting Windows Vulnerabilities
            • 🧨Exploiting Microsoft IIS WebDAV
            • 🧨Exploiting WebDAV With Metasploit
            • 🧨Exploiting SMB With PsExec
            • 🧨Exploiting Windows MS17-010 SMB Vulnerability (EternalBlue)
            • 🧨Exploiting RDP - Brute Force
            • 🧨Exploiting Windows CVE-2019-0708 RDP Vulnerability (BlueKeep)
            • 🧨Exploiting WinRM
          • 📈Windows Privilege Escalation
            • 🔥Windows Kernel Exploits
            • 🔥Bypassing UAC With UACMe
            • 🔥Access Token Impersonation
          • 🗃️Windows File System Vulnerability - Alternate Data Streams
          • 💳Windows Credential Dumping
            • 🔑Searching For Passwords In Windows Configuration Files
            • 🔑Dumping Hashes With Mimikatz
            • 🔑Pass-The-Hash Attacks
          • 💎Linux Vulnerabilities
          • 🎰Exploiting Linux Vulnerabilities
            • 🐚Exploiting Bash CVE-2014-6271 Vulnerability (Shellshock)
            • 🗄️Exploiting FTP - Linux
            • 🔐Exploiting SSH - Linux
            • 📭Exploiting SAMBA - Linux
          • ‼️Linux Privilege Escalation
            • 💥Linux Kernel Exploits
            • 💥Exploiting Misconfigured Cron Jobs
            • 💥Exploiting SUID Binaries
          • 🔐Linux Credential Dumping
        • 📶Network-Based Attacks
          • 📦Tshark & Filtering Basics
          • 🕷️Arp Poisoning
        • 💣The Metasploit Framework (MSF)
        • 💥Exploitation
          • 🖲️Vulnerability Scanning
          • ⚠️Searching For Exploits
          • 🐚Bind & Reverse Shells
          • 👾Exploitation Frameworks
          • 🪟Windows Exploitation
          • 🥌Linux Exploitation
          • ☣️AV Evasion & Obfuscation
        • 🚩Post-Exploitation
          • 🌬️Windows Local Enumeration
          • 📟Linux Local Enumeration
          • 🚜Transferring Files To Windows & Linux Targets
          • 🔼Upgrading Shells
          • 👀Windows Privilege Escalation
          • ⚒️Linux Privilege Escalation
          • 🔮Windows Persistence
          • 🧙Linux Persistence
          • 〰️Dumping & Cracking Windows Hashes (NTLM Hashes)
          • 🍘Dumping & Cracking Linux Password Hashes
          • ➿Pivoting Overview
          • 🧹Clearing Your Tracks On Windows & Linux
        • 🧑‍🔬Social Engineering Fundamentals
      • 🕸️Web Application Penetration Testing
        • ℹ️Intro to Web
        • 🎯Directory Enumeration
        • 🧰BurpSuite and ZAP-Proxy Overview
        • 🛠️Nikto, SQLMap, XSSer & Hydra Overview
      • 👽Extra Resources
        • ➕CIDR Conversion Table
        • 📦Machines or Lab Solved to Practice
    • 📓Certified in Cybersecurity - (ISC)2 - Notes
      • 📝Chapter-1 Security Controls - Notes
      • 📝Chapter-2 Incident Response, Business Continuity & Disaster Recovery - Notes
      • 📝Chapter 3: Access Control Concepts - Notes
      • 📝Chapter 4: Network Security - Notes
      • 📝Chapter 5: Security Operations - Notes
    • 📕Certified Ethical Hacker v12 - Practical - Notes
      • 👣Module 02: Footprinting and Reconnaissance
      • 🔎Module 03: Enumeration
      • Module 04: Scanning Networks
      • Module 05: Vulnerability Analysis
      • 💻Module 06: System Hacking
      • 🐛Module 07: Malware Threats
      • 🧙Module 08: Sniffing
      • 🐧Module 09: Social Engineering
      • ⚠️Module 10: Denial-of-Service
      • 🪝Module 11: Session Hijacking
      • Module 12: Evading IDS, Firewalls, and Honeypots
      • 🗄️Module 13: Hacking Web Servers
      • Module 14: Hacking Web Applications
      • 💉Module 15: SQL Injection
      • Module 16: Hacking Wireless Networks
      • Module 17: Hacking Mobile Platforms
      • Module 18: IoT and OT Hacking
      • Module 19: Cloud Computing
      • Module 20: Cryptography
      • Extra Resources
        • 📚Helpful Resources
        • 📜Cheat Sheet
  • ✍️Blogs
    • Mastering the Art of Logic Flaws: Unraveling Cyber Mysteries !!!
    • How to write a Detailed Vulnerability Report
    • Payment Gateway Bypass on Government Domain.
Powered by GitBook
On this page
  • Audit Prepare Work Documents
  • Audit Work Documents – Benefits & Potential Drawbacks
  • Potential Drawbacks
  • Nonconformity
  • Nonconformity – Minor
  • Nonconformity – Major
  • Classifying the Nonconformity
  • Nonconformity – Poor Finding Examples

Was this helpful?

  1. Exam Prep Notes
  2. ISO/IEC 27001:2022 Lead Auditor - Notes

ISO - Training - Day - 4

Audit Prepare Work Documents

Checklists

Audit sampling plans

Use as a reference and for recording audit proceedings

Keep checklists flexible to allow changes resulting from information collected during the audit

Safeguard any confidential and proprietary information

Retain work documents and records

Audit Work Documents – Benefits & Potential Drawbacks

Benefits

Keep audit scope and objectives clearn

Serve as aide-memoir

Provide evidence of audit planning

Maintain audit pace and continuity

Reduce auditor bias

Reduce workload during audit

Provide space for auditor notes

Identify expected evidencen

Potential Drawbacks

Work documents tend to lose value if they are:

Tick lists

Questionnaires

Too focussed

Inflexible

Checklists may lead to rigid adherence to pre-planned questions

Prepare them as aide-memoir

Nonconformity

Non-fulfillment of a specified requirement:

Not doing it

Partially doing it

Doing it the wrong way

Specified requirements:

Conditions of customer contract

ISMS standard (ISO 27001)

Implemented information security management system

Statutory or regulatory requirements related to ISMS

Nonconformity – Minor

Nonconformity that does not affect the capability of the management system to achieve the intended results

Single observed lapse or isolated incident

Minimal risk of nonconforming product or service

A human error

Examples:

  • A previous corrective action as a result of an audit has not been assessed for its effectiveness

  • A record is not available or is incomplete

Nonconformity – Major

Nonconformity that affects the capability of the management system to achieve the intended results

Absence or total breakdown of a systems’ ability to meet a requirement

A number of minor nonconformities related to the same clause or requirement that shows there is a breakdown of the system

The complete failure of a process

Examples:

  • No evaluation of training or records of competence

  • Changes to the system made without authorization

  • No future planned internal audits

Classifying the Nonconformity

Consider the Seriousness:

  • What could go wrong if the nonconformity remains uncorrected?

  • What is the likelihood of such a thing going wrong?

  • Is it likely the system would detect it before the customer is affected?

  • If you are not certain it is a nonconformity, it is not. You must have:

    • A requirement that has been broken

    • Proof and evidence that it has been broken

Nonconformity – Poor Finding Examples

The nonconformity statements below are inadequate due to the lack of specified requirements and detailed evidence:

  • Customer meeting minutes are not adequate

  • The change management process does not meet the requirements of the standard

  • Up-to-date information on known errors was not available during the audit.

  • Internal audits have not been carried out


Checkpoint Form for Point 7: Support

  1. Commitment from Top Management

    • What to Check:

      • Ensure top management is actively involved in the ISMS and provides clear direction and support for its implementation.

    • Evidence:

      • Minutes from management review meetings.

      • ISMS policy signed by top management.

      • Documentation of top management’s roles and responsibilities regarding ISMS.

      • Interviews or statements from senior management demonstrating commitment.

  2. Information Security Roles and Responsibilities

    • What to Check:

      • Confirm that roles and responsibilities related to information security are clearly defined and assigned.

    • Evidence:

      • Organizational chart showing roles for information security.

      • Job descriptions or roles related to ISMS.

      • Assigned roles and responsibilities documented in ISMS procedures.

  3. Resources for Implementing the ISMS

    • What to Check:

      • Verify that sufficient resources (financial, human, technical) are allocated to support the ISMS.

    • Evidence:

      • Resource allocation plan.

      • Budgetary allocation for information security initiatives.

      • Records showing training and staff development for ISMS implementation.

  4. Competence and Awareness of Staff

    • What to Check:

      • Ensure that all relevant staff are competent and aware of information security policies, controls, and their responsibilities.

    • Evidence:

      • Training records or certificates.

      • Awareness programs or workshops conducted.

      • Evidence of regular communication (emails, intranet posts) about security awareness.

      • Interviews with employees regarding their awareness of ISMS requirements.

  5. Internal and External Communication

    • What to Check:

      • Check that there are proper channels for communication related to ISMS both internally (within the organization) and externally (with stakeholders).

    • Evidence:

      • Internal communication protocols for ISMS.

      • Documentation of communication with external parties (e.g., auditors, regulators, third-party suppliers).

      • Evidence of feedback mechanisms.

  6. Documented Information and Records Management

    • What to Check:

      • Ensure that information related to ISMS, such as policies, procedures, records, etc., are documented and properly maintained.

    • Evidence:

      • Document control records (e.g., version control, approval process).

      • List of all ISMS-related documents and records.

      • Audit logs or reports showing document review and updates.

  7. Management Reviews and Audits

    • What to Check:

      • Verify that regular management reviews and internal audits are conducted to assess the effectiveness of the ISMS.

    • Evidence:

      • Management review meeting minutes.

      • Audit reports and corrective action records.

      • Follow-up actions and evidence of continuous improvement.

  8. Corrective and Preventive Actions

    • What to Check:

      • Ensure that any identified issues (nonconformities, incidents, etc.) are addressed through corrective and preventive actions.

    • Evidence:

      • Records of corrective and preventive actions.

      • Root cause analysis documentation.

      • Evidence that corrective actions have been implemented and are effective.




Hacker's Mantra: Growth hacking is the future of marketing. It has to be. -- Ryan Holiday

PreviousISO - Training - Day - 3NextPractice Questions - Notes

Last updated 3 months ago

Was this helpful?

📚
📒