Over 10 years we help companies reach their financial and branding goals. Engitech is a values-driven technology agency dedicated.

Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

1.1 Domain 1 · Security & Risk Management

Professional Ethics

Understand, adhere to, and promote professional ethics — ISC2 Code and organizational ethics

Concept
2
Textbook
3
Reference
4
Scenario
5
Hard Choice
6
Traps
7
Exam
The Concept

The ISC2 Code of Professional Ethics has four canons in strict priority order. When they conflict, the higher canon wins. No exceptions.

I. Protect society, the common good, public trust, and the infrastructure
II. Act honorably, honestly, justly, responsibly, legally
III. Provide diligent and competent service to principals
IV. Advance and protect the profession

Your organization's ethics code supplements the ISC2 code. It can add requirements but never override or weaken the canons. If they conflict, ISC2 wins.

At a company with a mature security program: The CISO reports to the board. Ethics training happens annually. There's a whistleblower hotline. When a junior analyst discovers marketing is sharing customer PII with an unauthorized analytics vendor:

  • Report to the security team lead — internal escalation first
  • Team lead escalates to the CISO — who has authority to stop the sharing
  • CISO notifies legal and compliance — potential GDPR/CCPA exposure
  • The practice stops — within days, not months

Canon I (protect the public) is served. Canon III (serve your employer) is also served — you just saved them from a regulatory fine. No conflict.

CanonPriorityPrincipleWhen It's Tested
Canon IHighestProtect society, public trust, infrastructureEmployer asks you to cover up a breach
Canon IISecondAct honorably, honestly, legallyYou discover evidence of fraud
Canon IIIThirdProvide competent service to principalsClient asks for advice outside your expertise
Canon IVLowestAdvance and protect the professionSharing knowledge, mentoring, not cheating
Key Takeaway

Mnemonic: "Some Honorable Servants Profess" — Society, Honor, Service, Profession. When canons conflict, higher always wins. The exam will NEVER have a correct answer where Canon III overrides Canon I.

You're the only security person. You report to the IT Director, who reports to the CFO. There is no CISO. The marketing VP is a peer of your boss's boss.

Scenario
The Analytics Vendor
Mid-size SaaS · 400 employees · No CISO
YouYou discover marketing signed with a third-party analytics vendor 6 months ago. They receive full customer behavioral data — emails, sessions, purchase history. No security review. No DPA. The vendor resells aggregated data.
Marketing VP"This vendor increased our conversion rate by 23%. We're not turning it off. The CEO personally approved this spend."
IT Director"I hear you, but marketing brings in the revenue. Pick your battles. Can we add it to the risk register and revisit next quarter?"
Compensating Control

When you can't get the ideal outcome immediately: (1) Document the risk in writing — email, not verbal. (2) Request a DPA from the vendor as a minimum. (3) Limit data fields shared — strip PII where possible. (4) Set a hard deadline: "90-day vendor security review." You've created a paper trail, reduced exposure, and established accountability.

What actually happens: The DPA takes 3 months. You deploy a proxy that strips email addresses. The marketing VP grudgingly accepts it because "we still get behavioral data." Not perfect, but it's Canon I progress without destroying Canon III. Incremental risk reduction with political awareness.

Real Talk — Career Context

How you escalate matters as much as whether you escalate. Use established channels first — compliance hotlines, ethics committees, ombudsman offices. Document everything in writing with timestamps. Know your legal protections (SOX Section 806, EU Directive 2019/1937). The ISC2 Ethics Committee complaint process is a real mechanism, not just exam trivia.

On the exam: Choose Canon I. In practice: escalate through proper channels, document your recommendation, and ensure the right decision gets made — not unilaterally.

Six months later, the analytics vendor has a breach — 2M records, including your customers. Your IT Director says: "Don't report externally. Let legal handle it." GDPR requires notification within 72 hours. You have EU customers.

Option A
Follow IT Director's guidance

Let legal assess scope. Premature notification could cause unnecessary panic.

Option B
Escalate and push for 72-hour notification

Canon I requires protecting the public. The GDPR clock started when you became aware.

Option B is correct — but A isn't unreasonable

Option B: Canon I overrides Canon III. Escalate through established incident response channels — involve legal AND begin notification planning in parallel. Escalation doesn't mean going around leadership; it means ensuring the right people are informed.

Option A's kernel of truth: You should involve legal and assess scope. The error is using assessment to delay rather than inform the notification.

On the exam: "protect the public" always beats "involve legal" when both are options. In practice: escalate through channels, document, let the org act.

!
Choosing resignation over escalation
Resigning doesn't protect the public. The exam answer is to escalate through proper channels, not walk away. Resignation removes your ability to influence the outcome and leaves the risk unaddressed.
Why it's tempting: feels noble and principled — "I won't be part of this."
!
Employer loyalty overrides public safety
Canon III (serve your employer) never beats Canon I (protect society). When an employer directive conflicts with public safety, Canon I wins. Every time, no exceptions.
Why it's tempting: in real life, employer relationships feel more immediate than abstract "public safety."
!
Reporting externally as first step
You should use internal channels first — compliance hotline, ethics committee, management chain — before going external. External reporting (regulators, media, ISC2 Ethics Committee) is the escalation path when internal channels fail or are compromised.
Why it's tempting: seems like the most protective action — go straight to the authorities.
Exam Signal

When you see employer vs. public safety: the exam answer is Canon I. Choose the answer that protects society, uses proper escalation, and documents the decision. The exam isn't testing whether you'd quit — it's testing whether you know which principle takes priority and how a professional handles the conflict through established processes.

Quick Check — End of 1.1
Your CEO instructs you to delete security logs showing unauthorized access to a government contract database, stating "this will cause us to lose the contract." What should you do?
  • A Delete the logs — Canon III requires service to your employer
  • B Delete them but keep a personal backup as insurance
  • C Refuse and escalate — Canon I supersedes Canon III
  • D Resign immediately to avoid complicity

Correct: C. Deleting evidence violates Canon I (infrastructure protection) and Canon II (act honestly/legally — this is likely obstruction). Canon III does NOT override higher canons. Resignation (D) doesn't protect the public. Personal backup (B) is still destroying official evidence.

Disclaimer: This content is provided for educational and exam preparation purposes only. It is not official ISC2 content, is not endorsed by ISC2, and does not guarantee exam success. All practice questions are original and based on published exam objectives. Always refer to the official ISC2 CISSP Exam Outline as your primary reference.