Security Control Assessment (SCA) Process Overview

Поділитися
Вставка
  • Опубліковано 14 січ 2025

КОМЕНТАРІ • 88

  • @benjaminacquaye6444
    @benjaminacquaye6444 11 місяців тому +2

    🙏

  • @germainkone9029
    @germainkone9029 2 роки тому +4

    So thankful. Anytime that I am lost a little bit I come over here and I walked out so satisfied . Thanks again 🙏

    • @KamilSec
      @KamilSec  2 роки тому

      You are so welcome

    • @germainkone9029
      @germainkone9029 2 роки тому +1

      @@KamilSec Please tell me what how far in details and how many minutes should I go with Tell me about yourself question ! After watching so many videos with no clear answer , here I am again seeking for some tips. Thanks again in advance. 🙏

  • @lawrencemichael6002
    @lawrencemichael6002 Рік тому +4

    Kamil, you are just a generous genius. Bless your heart in the good work you continue to do and life you touch globally. Thank you champ.

    • @KamilSec
      @KamilSec  Рік тому

      Thank you, I appreciate that!!!

  • @Risklearner
    @Risklearner 11 місяців тому +2

    Thank you for the video. So helpful to understand the SCA process.

    • @KamilSec
      @KamilSec  11 місяців тому

      Glad it was helpful!

  • @realchanger8220
    @realchanger8220 Рік тому +2

    Very very helpful. Thank you

  • @Fidelisinspire
    @Fidelisinspire 9 місяців тому +2

    Excellent content and presentation. I'm using this to prepare for an upcoming SCA interview. Thank you so much brother!

    • @KamilSec
      @KamilSec  8 місяців тому

      Best of luck!

  • @PrinceO-g2k
    @PrinceO-g2k 10 місяців тому +2

    Thank you for such a great presentation. Very informative and helpful. 👍

    • @KamilSec
      @KamilSec  9 місяців тому

      Glad it was helpful!

  • @poshtecconsults8
    @poshtecconsults8 3 роки тому +6

    A great teachable moment. Thank you Prof.

    • @KamilSec
      @KamilSec  3 роки тому

      You are very welcome, Portia.

  • @sjames916
    @sjames916 2 роки тому +2

    Gold! Kamil laying out the blueprint to get into security compliance.

  • @iyamahsylva7316
    @iyamahsylva7316 Рік тому +2

    Good training and program

  • @XX2LFEUSNVET
    @XX2LFEUSNVET 2 роки тому +2

    Appreciate it learned more here than on my project team, like they're trying to sabatosh me on purpose.

    • @KamilSec
      @KamilSec  2 роки тому

      I am glad it was helpful!

  • @ALLISONFolks
    @ALLISONFolks Рік тому +2

    amazing content sir, extremely helpful. Thank you

  • @Nsorkwame
    @Nsorkwame 3 роки тому +4

    Thanks sir, very informative as usual 👌🏼

    • @KamilSec
      @KamilSec  3 роки тому +1

      You're welcome Kwame, thanks!

  • @princenanafosu8161
    @princenanafosu8161 2 роки тому +2

    Good job .thanks👍

    • @KamilSec
      @KamilSec  2 роки тому

      You're Welcome 👍

  • @leviteshouse7213
    @leviteshouse7213 3 роки тому +4

    Great job as usual Prof👍

  • @annetish1205
    @annetish1205 3 роки тому +3

    Awesome- God bless u

    • @KamilSec
      @KamilSec  3 роки тому +1

      Thank you so much, Anne.

    • @annetish1205
      @annetish1205 3 роки тому

      How do I contact you?

    • @KamilSec
      @KamilSec  3 роки тому

      Kaamilzak@gmail.com

  • @AdeleClarice
    @AdeleClarice 2 роки тому +2

    Thank you for the video.. very helpful.

    • @KamilSec
      @KamilSec  2 роки тому

      You're very welcome! Glad it was helpful!

    • @AdeleClarice
      @AdeleClarice 2 роки тому

      @@KamilSec do you have some form of training? I just got a job as a SCA... I need some more help.

  • @Gboluaje
    @Gboluaje 2 роки тому +2

    such great information.Thanks Kamilsec. Am a new subscriber

    • @KamilSec
      @KamilSec  2 роки тому

      You're very welcome Adedola, and thanks for being a subscriber on the channel!

  • @sidalpha2000
    @sidalpha2000 2 роки тому +2

    good info

  • @FM-zp2hl
    @FM-zp2hl 3 роки тому +2

    Amazing content

  • @algbla6042
    @algbla6042 3 роки тому +4

    Great presentation on preparation for control assessment. Definitely learned a lot from this.

    • @KamilSec
      @KamilSec  3 роки тому

      Awesome, I am glad to hear that Alhaji, Thanks!

  • @elvistuffour1731
    @elvistuffour1731 3 роки тому +2

    Great content, Legend!

  • @tanveerahmed9494
    @tanveerahmed9494 Рік тому +2

    Hi, can u pls share the artifact request list

    • @KamilSec
      @KamilSec  Рік тому

      There is a link to my Patreon page in the video description where you can find all documents I used in my videos.

  • @cgao5599
    @cgao5599 Рік тому +2

    Share a complete ATO package video.

  • @PiusAnkamah
    @PiusAnkamah Місяць тому +1

    Kamil, please what sampling tool will you recommend to use during Testing AC-2(d)(1) during assessment . Thank you and hope to hear from you.

    • @KamilSec
      @KamilSec  Місяць тому

      Try: randomizer.org/

  • @juddybest1612
    @juddybest1612 2 роки тому +3

    The best teaching. Thanks a lot. Question: What skills or qualities are expect by an Organization from a newly hired SCA who has no prior practical/ field knowledge of the job? For instance, one who just graduated from the college.

    • @KamilSec
      @KamilSec  2 роки тому

      Usually, they prefer to hire candidates with at least few years of experience.

  • @lachampagnia
    @lachampagnia 2 роки тому +3

    Hello. Do you offer interview prep classes?

  • @RodThePRConsult
    @RodThePRConsult 3 роки тому +5

    Awesome presentation... Thank you.. I have a question, how often should Security Assessment Report be updated?

    • @KamilSec
      @KamilSec  3 роки тому +3

      New SARs are only created after every Security Control Assessment (SCA). SAR are updated when/if after the SCA and a finding was disputed, and the assessors agree, then they will update the SAR. Hope that makes sense.

  • @maxwellaburam4911
    @maxwellaburam4911 3 роки тому +2

    Great Video.
    Do you have a video on how to develop a test plan for assessing security controls./Control Correlation I identifier (CCI)?

    • @KamilSec
      @KamilSec  3 роки тому +2

      Not yet, will do that soon.

    • @CFH298
      @CFH298 2 роки тому

      This was would be an awesome video. Thanks!

  • @abdulzar1050
    @abdulzar1050 3 роки тому +2

    Thanks a lot for this presentation. It a has vicarious feel to it. Can you do on risk assessment?

    • @KamilSec
      @KamilSec  3 роки тому

      I am sure I have something on Risk Assessment on the channel as well.

    • @abdulzar1050
      @abdulzar1050 3 роки тому

      @@KamilSec thanks

  • @farahatiqah9988
    @farahatiqah9988 2 роки тому +2

    Great presentation! Is there any sources or guidance from NIST on artifacts request list? For eg if Access Control Family is being assessed, what are the list of artifacts should be requested? Thanks!

    • @KamilSec
      @KamilSec  2 роки тому +1

      Unfortunately no. This has to be developed by the assessment team members.

  • @jesl3nt64
    @jesl3nt64 2 роки тому +2

    I have a question what are some of the monitoring tools afther Accessment is done

    • @KamilSec
      @KamilSec  2 роки тому

      Well depending on the agency, SIEM tools like Splunk, QRadar as well as Vulnerability scanning tools like Nessus, WebInspect, DBProtect, NexPose etc. can be used to assist in the Continuous Monitoring.

  • @estheranddemiyaforsang6171
    @estheranddemiyaforsang6171 2 роки тому +2

    Awesome video Sir! Can you share the artifact list, please?

  • @atohambe5775
    @atohambe5775 3 роки тому +2

    Hi Kamilsec. I will like to join your class for training.
    When is the next cissp class?

    • @KamilSec
      @KamilSec  3 роки тому

      Not conducting training currently.

  • @cricriy1400
    @cricriy1400 3 роки тому +2

    Is this work a team work or a self work?

    • @KamilSec
      @KamilSec  3 роки тому

      Yea, the SCA is a team work

  • @joycefynn8496
    @joycefynn8496 2 роки тому +2

    Well done prof! How can I contact you please?

    • @KamilSec
      @KamilSec  2 роки тому

      kaamilzak@gmail.com

  • @maryniang7683
    @maryniang7683 2 роки тому +2

    How can you be reached?

    • @KamilSec
      @KamilSec  2 роки тому

      Kaamilzak@gmail.com

  • @uche2564
    @uche2564 Рік тому +2

    What are some common problems you would run into during an assessment ?

    • @KamilSec
      @KamilSec  Рік тому +1

      1. Clients not providing artifacts/evidence on time
      2. Clients deliberately providing wrong artifacts/evidence
      3. Clients refusing to accept findings and so on....

    • @uche2564
      @uche2564 Рік тому

      @@KamilSec Thankyou! One last question. As an assessor, what are your options or next steps if a client refuses to accept the findings

  • @jackybandoh7335
    @jackybandoh7335 3 роки тому +2

    Quick question
    What’s the difference between security assessment and risk assessment?

    • @KamilSec
      @KamilSec  3 роки тому +3

      I will say Security Assessment can be a subset of Risk Assessment. Because in Risk Assessment, every aspect of the business or the organization such as financial, marketing, competitive advantages etc. of the business will be evaluated and reviewed, where as Security Assessment can be just limited to security operation.

    • @jackybandoh7335
      @jackybandoh7335 3 роки тому

      Thanks

  • @dinayenbelirta4213
    @dinayenbelirta4213 2 роки тому +2

    Great one,Can you be my Mentor sir

    • @KamilSec
      @KamilSec  2 роки тому +1

      kaamilzak@gmail.com

  • @ITSS.MEEEEEEE
    @ITSS.MEEEEEEE 3 роки тому +3

    Hi uncle

    • @KamilSec
      @KamilSec  3 роки тому +1

      Hi Zee Zee, How are you? I hope you are reading your books.

    • @ITSS.MEEEEEEE
      @ITSS.MEEEEEEE 3 роки тому +2

      I think so