Foundational Security Operations Concepts
The Principles That Run Under Everything
Every operational security control you will ever implement rests on a small set of foundational principles. Least privilege determines who can access what. Separation of duties prevents any single person from controlling an entire process. Job rotation ensures that no one person becomes an irreplaceable single point of failure — or an undetectable insider threat.
These are not just concepts to memorize. They are the design principles behind every access decision, every operational procedure, and every staffing decision in a security-conscious organization.
This module covers CISSP exam objective 7.4: understand and apply foundational security operations concepts. ISC2 tests these principles in scenario form — you will need to identify which principle was violated, which one should be applied, or which one addresses the risk in a given situation.
Need-to-Know and Least Privilege
These two principles are related but distinct.
Need-to-know restricts access to information based on whether a person requires that specific information to perform their job. A system administrator with Top Secret clearance does not automatically get access to every Top Secret document — they must demonstrate a specific need for each piece of information.
Least privilege restricts access rights to the minimum permissions necessary to perform a job function. A database administrator needs access to database management tools, not to firewall configuration. An application developer needs write access to the development environment, not to production.
The difference: need-to-know governs what information you can access. Least privilege governs what actions you can perform on systems.
In operations, least privilege applies to:
- User accounts — Standard users should not have administrative rights
- Service accounts — Applications should run with only the permissions they need
- Administrative accounts — Administrators should use standard accounts for daily work and elevated accounts only when performing administrative tasks
- Network access — Systems should only communicate with the systems they need to reach
Separation of Duties
Separation of duties (SoD) divides critical functions among multiple people so that no single individual can complete a sensitive process alone. The goal is to prevent fraud, errors, and abuse by requiring collusion between two or more people.
Classic examples in security operations:
- The person who requests a change should not be the person who approves it
- The person who develops code should not deploy it to production
- The person who creates user accounts should not be the person who assigns permissions
- The person who processes financial transactions should not be the person who reconciles accounts
SoD creates a natural check-and-balance system. If a developer can both write code and deploy it to production without review, a single compromised or malicious developer can introduce backdoors, exfiltrate data, or sabotage systems. If deployment requires a separate team’s approval and action, the attack requires compromising two independent parties.
Job Rotation
Job rotation periodically moves employees between roles or responsibilities. It serves two security purposes:
- Fraud detection — When someone new takes over a role, irregularities or fraudulent activities become visible. The incoming person may notice discrepancies that were hidden by the previous occupant.
- Reduced single-point-of-failure risk — If only one person understands a critical process, the organization is vulnerable if that person becomes unavailable. Cross-training through rotation builds redundancy.
Job rotation is particularly important in roles with significant financial authority, system administration privileges, or access to sensitive data. It is a detective control — it does not prevent fraud directly, but it increases the probability of detection.
Mandatory Vacations
Mandatory vacation policies require employees in sensitive positions to take consecutive time off — typically one to two weeks. During their absence, another person performs their duties.
The security purpose is identical to job rotation: it forces a temporary handover that can expose fraud, unauthorized activities, or undocumented processes. Many financial fraud schemes require the perpetrator’s daily involvement to maintain the deception. Removing that person for two consecutive weeks creates a window where the scheme may unravel.
Mandatory vacations are common in financial services, banking, and government positions with fiduciary responsibility. The exam treats mandatory vacations as a detective control, not a preventative one.
Two-Person Integrity (Dual Control)
Two-person integrity requires two authorized individuals to be present or participate in completing a sensitive action. Neither person can complete the action alone.
Examples in security operations:
- Two key holders are needed to open a safe or access a secure facility
- Two administrators must approve and execute a critical system change
- Split-knowledge encryption key management, where two people each hold half of a key
- Nuclear launch systems (the classic example) require two operators
Dual control is a stronger form of separation of duties because it requires simultaneous participation rather than sequential handoff. It is applied to the most sensitive operations where the consequences of unauthorized or erroneous action are severe.
Privileged Account Management
Privileged accounts (root, administrator, domain admin, service accounts with elevated rights) represent the highest risk in any environment because they can bypass security controls, access any data, and modify system configurations.
Privileged account management (PAM) includes:
- Vaulting — Storing privileged credentials in a secure vault rather than allowing administrators to know passwords directly. The vault checks out credentials for a session and checks them back in when the session ends.
- Just-in-time access — Granting privileged access only when needed and only for the duration of the task. An administrator requests elevated access, receives approval, completes the task, and the elevated access expires.
- Session recording — Recording all activity during privileged sessions for later review and forensic purposes.
- Credential rotation — Automatically changing privileged passwords after each use or on a regular schedule to limit the window of exposure if credentials are compromised.
Service Level Agreements (SLAs)
SLAs define the expected performance and security levels between a service provider and its customers. In security operations, SLAs are governance instruments that set measurable expectations.
Security-relevant SLA components include:
- Availability targets — Uptime percentages (99.9%, 99.99%) and the maximum allowable downtime per period
- Incident response times — How quickly the provider must acknowledge and respond to security incidents
- Patching and update timelines — Maximum time between patch release and deployment
- Reporting requirements — Frequency and content of security reports, audit results, and compliance attestations
- Penalties and remedies — Consequences for failing to meet SLA commitments
SLAs without penalties are aspirations, not agreements. The exam expects you to recognize that SLAs are a management control for third-party and internal service relationships.
Due Care and Due Diligence in Operations
These two terms appear throughout the CISSP but have specific operational meaning.
Due care is doing what a reasonable person would do in the same situation. In operations, due care means implementing the security controls that a reasonable organization would implement given the risk. If a known vulnerability exists and a patch is available, due care requires applying the patch in a timely manner.
Due diligence is the ongoing process of verifying that due care is being maintained. It includes monitoring, auditing, testing, and reviewing to confirm that controls are working as intended. Implementing a firewall is due care. Regularly reviewing firewall rules to ensure they are still appropriate is due diligence.
Due care + due diligence = reasonable security posture. Failing either can constitute negligence in legal proceedings.
Secure Provisioning and Operational Resilience
Secure provisioning means that resources (accounts, systems, services) are created with security controls in place from the start, not added after deployment. This principle applies to:
- User accounts created with appropriate role-based access, not blanket administrative rights
- Systems deployed from hardened baselines, not default installations
- Cloud resources provisioned with security groups, encryption, and logging enabled by default
Operational resilience is the ability to continue delivering services during and after disruptions. Resilience in operations means designing processes that tolerate failures, staffing that handles turnover, and systems that recover quickly. It connects directly to business continuity (Domain 1) but is implemented through operational practices.
Pattern Recognition
Foundational operations questions on the CISSP follow these structures:
- Single person controls entire process — Separation of duties violation. The answer involves splitting responsibilities across multiple people.
- Fraud discovered only after employee departure — Missing job rotation or mandatory vacation controls. The answer involves implementing one or both.
- Administrator has unchecked access — Missing privileged account management. The answer involves PAM tools, session recording, or just-in-time access.
- Third-party underperformance — Missing or poorly defined SLAs. The answer involves establishing measurable commitments with penalties.
Trap Patterns
Watch for these wrong answers:
- “Give administrators full access so they can respond quickly to incidents” — Speed does not override least privilege. Just-in-time access provides elevated rights when needed without permanent elevation.
- “Separation of duties is too expensive for small organizations” — Compensating controls (additional logging, management review, dual approval) can achieve similar outcomes where full separation is not feasible.
- “Mandatory vacations punish good employees” — Mandatory vacations are a security control, not a disciplinary measure. They protect both the organization and the employee.
- “Due diligence and due care are the same thing” — Due care is taking the right action. Due diligence is verifying it remains effective. Both are required.
Scenario Practice
Question 1
A mid-size company has one database administrator who manages all production databases, creates all database accounts, assigns all permissions, and performs all database backups. The DBA has been in this role for seven years and has never taken more than three consecutive days of vacation.
Which security principle is MOST at risk?
A. Least privilege, because the DBA has too many permissions
B. Separation of duties, because the DBA controls the entire database lifecycle without independent oversight
C. Need-to-know, because the DBA can see all data in all databases
D. Due diligence, because the company has not audited the DBA’s activities
Answer & reasoning
Correct: B
The DBA controls account creation, permission assignment, data management, and backups with no separation or independent oversight. This concentration of control means the DBA could create unauthorized accounts, grant excessive permissions, modify data, and ensure no backup evidence exists — all without anyone else’s involvement. While the other principles may also be relevant, the most immediate risk is the total absence of separation of duties combined with no mandatory vacation to force temporary role coverage.
Question 2
An organization implements a privileged access management solution. Administrators now check out credentials from a vault for each session, and all sessions are recorded. After implementation, several administrators complain that the process adds 10 minutes to every task and request a permanent exception for “routine” administrative work.
How should management respond?
A. Grant the exception for routine tasks and require the PAM process only for sensitive operations
B. Maintain the PAM requirement for all privileged access and work with the team to streamline the check-out process
C. Remove the PAM solution since it is impeding operational efficiency
D. Allow administrators to keep personal copies of privileged credentials for emergency use
Answer & reasoning
Correct: B
Exceptions for “routine” work would effectively bypass PAM for the majority of privileged activity. The value of PAM is accountability for every privileged session, not just sensitive ones. The correct approach is to maintain the security requirement while improving the process. If check-out takes too long, optimize the workflow rather than eliminating the control.
Question 3
A financial services company discovers that a senior accountant has been embezzling funds over a three-year period. The fraud was detected only when the accountant was hospitalized and a replacement took over the duties. An investigation reveals that the accountant had sole control over payment processing, account reconciliation, and audit report generation.
Which combination of controls would have been MOST effective at preventing or detecting the fraud earlier?
A. Stronger background checks and annual ethics training
B. Separation of duties for financial processes and mandatory vacation policy
C. Real-time transaction monitoring and enhanced physical security
D. Regular password changes and multi-factor authentication on financial systems
Answer & reasoning
Correct: B
Two controls directly address this scenario. Separation of duties would have prevented the accountant from controlling the entire payment-to-reconciliation process. Mandatory vacations would have forced a temporary handover that likely would have exposed the discrepancies. The fraud persisted for three years specifically because one person controlled the entire process and was never required to step away. Background checks (A) would not have prevented the fraud. Technical controls (C, D) do not address the governance failure.
Key Takeaway
Foundational security operations concepts are not abstract theory — they are the design principles that determine how you structure roles, assign access, and build accountability into daily operations. When the exam presents a scenario where something went wrong, ask yourself: Was there separation of duties? Was least privilege enforced? Was there a mechanism to detect insider activity? Could one person act alone without oversight? The answer almost always traces back to one of these foundational principles being absent or poorly implemented.