Comprehensive Study Guide with 103 Interactive MCQs · Based on ISACA CISA Review Manual 2025
| Principle | Definition | Threat Examples | Controls |
|---|---|---|---|
| Confidentiality | Information accessible only to authorized parties | Eavesdropping, data theft, unauthorised access | Encryption, access controls, DLP |
| Integrity | Information is accurate and unaltered by unauthorised parties | Tampering, man-in-the-middle, malware modification | Hashing, digital signatures, checksums |
| Availability | Information accessible to authorised users when needed | DDoS, ransomware, hardware failure | Redundancy, backups, DRP/BCP |
🔵 Extended Model — Parkerian Hexad: Adds Possession/Control, Authenticity, and Utility to the CIA Triad for a more complete view of information security.
| Framework | Focus | Key Feature |
|---|---|---|
| ISO/IEC 27001 | Information Security Management System (ISMS) | Certifiable standard; 114 controls in Annex A (ISO 27002); Plan-Do-Check-Act cycle |
| ISO/IEC 27002 | Code of practice for information security controls | Best-practice guidance for implementing 27001 controls |
| NIST CSF 2.0 | Cybersecurity risk management | Govern, Identify, Protect, Detect, Respond, Recover (added Govern in v2.0) |
| NIST SP 800-53 | Security and privacy controls for federal systems | Comprehensive control catalogue; widely adopted beyond US government |
| CIS Controls v8 | Prioritised security actions | 18 control groups; Implementation Groups (IG1/IG2/IG3) by maturity |
| COBIT 2019 | IT governance including security | APO13 — Managed Security; DSS05 — Managed Security Services |
⚠️ CISA Exam Hot Topic: The Data Owner is a BUSINESS role — not IT. They are accountable for classifying data and determining who should have access. The Data Custodian (IT) implements the owner's decisions.
Multiple overlapping security layers ensure that failure of one control does not result in a breach. Layers: Physical → Network → Host → Application → Data. Each layer independently prevents or detects attacks.
| Step | Definition | Example |
|---|---|---|
| Identification | Claiming an identity | Entering a username |
| Authentication | Proving the claimed identity | Entering a password, biometric scan |
| Authorisation | Granting access to resources based on verified identity | RBAC role granting read access to finance module |
| Accountability | Tracking actions to an authenticated identity via audit logs | Audit trail showing user X accessed record Y at time Z |
✅ MFA (Multi-Factor Authentication): Uses TWO OR MORE DIFFERENT factors. Two passwords = NOT MFA (same factor). Password + OTP = MFA. Password + fingerprint = MFA.
| Model | Description | Use Case |
|---|---|---|
| DAC (Discretionary) | Resource owner controls access — can grant to others | File systems (Windows NTFS permissions) |
| MAC (Mandatory) | System enforces access based on labels/clearances — owners cannot override | Government/military (Top Secret, Secret, Confidential) |
| RBAC (Role-Based) | Access granted based on job role/function | Enterprise applications — most common in business |
| ABAC (Attribute-Based) | Access based on attributes of user, resource, and environment | Dynamic, context-aware access (time, location, device) |
| Rule-Based | Access controlled by system rules (e.g., firewall ACLs) | Network firewalls, routers |
| Metric | Definition | Implication |
|---|---|---|
| FRR (False Rejection Rate) | Legitimate users denied access (Type I error) | Too high = user frustration |
| FAR (False Acceptance Rate) | Impostors granted access (Type II error) | Too high = security breach |
| CER/EER | Crossover Error Rate — where FRR = FAR; lower = better biometric | Key comparison metric between biometric systems |
⚠️ CISA Key: FAR (False Acceptance) is the more dangerous error — it allows unauthorised access. FRR causes inconvenience. Lower CER indicates a better overall biometric system.
Data classification ensures information receives appropriate protection based on its sensitivity and value. It drives access controls, encryption requirements, handling procedures, retention, and disposal requirements.
| Commercial Scheme | Government/Military Scheme | Description |
|---|---|---|
| Public / Unclassified | Unclassified | Safe for public release; no harm if disclosed |
| Internal / Restricted | Sensitive But Unclassified (SBU) | Not public; minor harm if disclosed |
| Confidential | Confidential | Serious business/national harm if disclosed |
| Secret / Highly Confidential | Secret | Severe harm if disclosed |
| Top Secret | Top Secret | Exceptionally grave harm if disclosed |
| State | Description | Key Controls |
|---|---|---|
| Data at Rest | Stored data (databases, files, backups, archives) | Encryption (AES-256), access controls, DRM, secure disposal |
| Data in Transit | Data moving across networks | TLS/SSL, VPN, SFTP, encrypted email (S/MIME, PGP) |
| Data in Use | Data being actively processed in memory/CPU | Memory encryption, secure enclaves (Intel SGX), access controls |
DLP solutions monitor, detect, and block unauthorised transfer of sensitive data:
| Type | Description | Key Feature | Examples |
|---|---|---|---|
| Symmetric Encryption | Same key for encryption and decryption | Fast; key distribution challenge | AES, DES (obsolete), 3DES, RC4 |
| Asymmetric Encryption | Public key encrypts; private key decrypts (or vice versa) | Solves key distribution; slower | RSA, ECC, Diffie-Hellman, DSA |
| Hashing | One-way function producing fixed-length digest | Cannot be reversed; detects tampering | SHA-256, SHA-3, MD5 (obsolete) |
| Hybrid Encryption | Asymmetric to exchange symmetric key; symmetric for data | Best of both — secure key exchange + performance | TLS, PGP, S/MIME |
🔵 Digital Signature Process: Sign with PRIVATE key (only you have it → proves it came from you). Verify with PUBLIC key (anyone can verify). This is the OPPOSITE of encryption (encrypt with public, decrypt with private).
| Component | Role |
|---|---|
| Certificate Authority (CA) | Issues, signs, and revokes digital certificates — the trusted third party |
| Registration Authority (RA) | Verifies identity of certificate requestors before CA issues certificates |
| Certificate Revocation List (CRL) | List of revoked certificates published by CA — checked before trusting a certificate |
| OCSP (Online Certificate Status Protocol) | Real-time certificate revocation checking — more current than CRL |
| Certificate Repository | Directory where certificates are published and accessible |
| Root CA | Top of the PKI trust hierarchy; signs Intermediate CA certificates |
⚠️ CISA Audit Focus: The strength of an encryption system depends on key management as much as algorithm strength. Weak key management (poor storage, no rotation, shared keys) undermines even the strongest algorithm.
| Control | Function | Placement |
|---|---|---|
| Firewall (NGFW) | Filters traffic based on rules; NGFW adds application-layer inspection, IPS, and user identity awareness | Network perimeter, between zones |
| IDS / IPS | Detects (IDS) or blocks (IPS) malicious traffic patterns | Network segments; inline (IPS) or passive (IDS) |
| WAF | Protects web applications from OWASP Top 10 (SQLi, XSS, CSRF) | In front of web servers |
| VPN | Encrypted tunnel for remote access (IPsec site-to-site; SSL/TLS remote access) | Perimeter; remote users |
| Zero Trust Network Access (ZTNA) | Never trust, always verify — micro-segmentation; least-privilege access per session | Replaces VPN in modern architectures |
| Network Segmentation / VLAN | Isolates network zones to limit lateral movement | Throughout the network |
| DNS Security (DNSSEC) | Prevents DNS poisoning/spoofing; authenticates DNS responses | DNS infrastructure |
| Email Security | Anti-spam, anti-phishing, DMARC, DKIM, SPF — prevents email spoofing | Email gateway |
Zero Trust rejects the implicit trust given to users/devices inside the network perimeter. Core principles:
| Layer | Name | Security Controls |
|---|---|---|
| 7 | Application | WAF, application firewall, content filtering, API gateway |
| 6 | Presentation | SSL/TLS encryption, data format validation |
| 5 | Session | Session tokens, authentication protocols (Kerberos) |
| 4 | Transport | TLS, port filtering, stateful firewall |
| 3 | Network | IP filtering, router ACLs, IPsec, VPN |
| 2 | Data Link | MAC filtering, 802.1X, VLAN, ARP inspection |
| 1 | Physical | Physical access controls, cable locks, tamper protection |
| Capability | Function |
|---|---|
| MDM (Mobile Device Management) | Manages and enforces policies on mobile devices — enrollment, configuration, remote wipe |
| MAM (Mobile Application Management) | Manages specific apps on devices without controlling the whole device (BYOD-friendly) |
| MCM (Mobile Content Management) | Controls access to and sharing of corporate content on mobile devices |
| EMM (Enterprise Mobility Management) | Comprehensive umbrella: MDM + MAM + MCM |
| UEM (Unified Endpoint Management) | Manages all endpoints (mobile, desktop, IoT) from a single platform |
CVSS v3.1 scores vulnerabilities 0-10 based on: Attack Vector, Attack Complexity, Privileges Required, User Interaction, Scope, Confidentiality Impact, Integrity Impact, Availability Impact.
| Score Range | Severity | Typical Patch SLA |
|---|---|---|
| 9.0 – 10.0 | Critical | 24–72 hours |
| 7.0 – 8.9 | High | 7–14 days |
| 4.0 – 6.9 | Medium | 30 days |
| 0.1 – 3.9 | Low | 90 days / next cycle |
| Type | Tester Knowledge | Simulates |
|---|---|---|
| Black Box | No prior knowledge of target | External attacker with no insider knowledge |
| White Box | Full knowledge (source code, architecture, credentials) | Insider threat or thorough security review |
| Grey Box | Partial knowledge (user credentials, network diagrams) | Authenticated attacker; compromised account |
⚠️ CISA Critical Point: Penetration testing MUST have written authorisation before beginning. Conducting a pen test without explicit written permission is illegal, regardless of intent.
| Aspect | Vulnerability Scanning | Penetration Testing |
|---|---|---|
| Frequency | Continuous / weekly / monthly | Annual / after major changes |
| Automation | Fully automated tools (Nessus, Qualys) | Manual + tools; human expertise required |
| Exploitation | No exploitation — identifies potential vulnerabilities | Actively exploits vulnerabilities to prove impact |
| Depth | Broad coverage; less deep | Narrower scope; much deeper |
MITRE ATT&CK is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. Key Tactics (in order of attack progression):
| Attack | Description | Defence |
|---|---|---|
| Phishing | Deceptive email to steal credentials or deliver malware | Email security (DMARC), user training, MFA |
| Spear Phishing | Targeted phishing at specific individuals using personal information | Same + executive awareness training |
| SQL Injection (SQLi) | Malicious SQL code injected into input fields to manipulate databases | Parameterised queries, WAF, input validation |
| XSS (Cross-Site Scripting) | Malicious script injected into trusted web pages executed in victim's browser | Input validation, output encoding, CSP headers |
| Man-in-the-Middle (MitM) | Attacker intercepts communication between two parties | Encryption (TLS), certificate pinning, HSTS |
| Ransomware | Malware encrypts victim's data; demands ransom for decryption key | Backups, EDR, network segmentation, patch management |
| DDoS | Flood of traffic overwhelms services, causing denial of service | CDN, rate limiting, DDoS scrubbing services, anycast |
| Social Engineering | Manipulating people into revealing information or performing actions | Security awareness training, verification procedures |
| Insider Threat | Malicious or negligent actions by employees/contractors | SoD, least privilege, DLP, UBA, background checks |
| Supply Chain Attack | Compromising software/hardware through trusted third parties | Vendor vetting, SCA, code signing, SBOM |
The SOC is the centralised function responsible for continuous monitoring, detection, analysis, and response to cybersecurity incidents. SOC tiers:
SIEM aggregates, normalises, correlates, and analyses security event data from across the IT environment.
SOAR automates repetitive SOC tasks and orchestrates response playbooks:
UEBA uses ML to establish behavioural baselines and detect anomalies:
IS auditors verify that logs are:
🔵 Key Audit Point: Logs stored only on the originating system are a weakness — administrators can delete them. Logs must be forwarded to a separate, protected SIEM/log management system where the originating system's administrators cannot modify them.
EU regulation effective May 2018 — most comprehensive privacy regulation globally. Applies to any organisation processing EU residents' personal data regardless of location.
| GDPR Principle | Meaning |
|---|---|
| Lawfulness, fairness, transparency | Processing has a legal basis; individuals are informed |
| Purpose limitation | Data collected for specified purposes only; not further processed incompatibly |
| Data minimisation | Only collect data adequate and relevant to the purpose |
| Accuracy | Data kept accurate and up to date |
| Storage limitation | Not kept longer than necessary for the purpose |
| Integrity and confidentiality | Appropriate security measures to protect data |
| Accountability | Controller responsible for demonstrating compliance |
GDPR Key Rights: Right to access, Right to rectification, Right to erasure ("right to be forgotten"), Right to data portability, Right to object, Right not to be subject to automated decision-making.
GDPR Breach Notification: Supervisory authority within 72 hours; affected individuals without undue delay if high risk.
GDPR Penalties: Up to €20 million or 4% of global annual turnover (whichever higher) for most serious violations.
| Regulation | Jurisdiction | Key Focus |
|---|---|---|
| HIPAA | USA (Healthcare) | Protected Health Information (PHI); Privacy Rule and Security Rule |
| CCPA/CPRA | California, USA | Consumer privacy rights; opt-out of data sale |
| PIPEDA | Canada | Personal information in commercial activities |
| PDPA | Singapore / Thailand | Personal Data Protection Act — consent-based model |
| PDPL | Saudi Arabia | Personal Data Protection Law — effective 2022 |
Seven foundational principles (Ann Cavoukian):
GDPR requires a DPO for: public authorities, organisations whose core activities require large-scale processing of special categories of data, or large-scale systematic monitoring. DPO advises on compliance — cannot be dismissed or penalised for performing their tasks.
The human element is the most exploited attack vector — phishing, social engineering, and insider threats all rely on human failure. Security awareness transforms users from a vulnerability into a defence layer.
| Attack | Description | Defence Training |
|---|---|---|
| Phishing | Deceptive email requesting credentials or action | Check sender, hover links before clicking, report suspicious emails |
| Vishing | Voice phishing — phone calls impersonating IT/bank/government | Verify caller identity through official channels; never give passwords over phone |
| Smishing | SMS phishing — text messages with malicious links | Don't click links in unexpected texts; verify through official apps |
| Pretexting | Creating fabricated scenario to manipulate target | Verify identity through established channels before acting |
| Baiting | Physical media (USB drops) or digital lures | Never plug in unknown USB devices; don't accept unknown downloads |
| Tailgating | Following authorised person into secure area | Challenge anyone without a visible badge; don't hold doors for strangers |
The IS auditor evaluates the design and operating effectiveness of information security controls through a risk-based approach.
| Technique | Description | Examples |
|---|---|---|
| Review of Documentation | Assess policies, procedures, and security architecture | Security policy review, architecture diagram review |
| Interviews | Assess understanding and awareness of controls | Interview CISO, security analysts, users |
| Observation | Verify controls are operating as described | Watch badge access; observe security monitoring |
| Testing / Re-performance | Independently execute a control to verify it produces correct results | Attempt to log in with expired credentials; test lockout policy |
| Configuration Review | Review system configurations against security baselines | Firewall rule review; OS hardening benchmark (CIS Benchmarks) |
| Vulnerability Scanning | Automated scans to identify known vulnerabilities | Network scan; web application scan |
| Penetration Testing | Authorised simulated attack to test defences | Red team exercise; web app pen test |
| Log Analysis | Review security logs for anomalies, policy violations, unauthorised access | SIEM query; firewall log analysis; access log review |
✅ Audit Independence: The IS auditor must maintain independence from the systems and processes they audit. Participating in designing security controls impairs the ability to independently assess those controls later.
