Over 10 years we help companies reach their financial and branding goals. Engitech is a values-driven technology agency dedicated.

Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

1.8 Domain 1 · Security & Risk Management

Personnel Security Policies

Contribute to and enforce personnel security policies and procedures

Concept
2
Textbook
3
Reference
4
Real Scenario
5
Hard Choice
6
Common Traps
7
Exam Signal
The Concept

People are the biggest risk vector. Personnel security covers the entire employment lifecycle: screening/hiring, onboarding, transfers, and termination. Four key controls define this domain:

Separation of Duties — prevent fraud (no single person controls an entire transaction)
Job Rotation — detect fraud (rotating people into different roles exposes irregularities)
Mandatory Vacation — detect fraud (forced absence reveals schemes that require daily attention)
Least Privilege — limit blast radius (access proportional to job requirements, nothing more)

The critical exam point: for hostile terminations, the first step is always to disable access. Not confront, not collect the laptop, not schedule an exit interview. Disable access first, then everything else.

At a mature organization, personnel security covers every stage of the employment lifecycle:

  • Hiring / Screening — Background checks proportional to role sensitivity. A help desk analyst gets a basic criminal check. A sysadmin with root access to financial systems gets a full background investigation including credit history, employment verification, and reference checks.
  • Onboarding — Security awareness training before access is granted. Acceptable Use Policy (AUP) signed and acknowledged. Access provisioned based on least privilege — only what the role requires, nothing inherited from a previous employee in the same position.
  • Transfers — Access is reviewed and adjusted. When an employee moves from Finance to Marketing, their Finance access is revoked — not just added to Marketing’s group. Access creep (accumulating permissions across roles) is a major risk that transfers expose.
  • Termination (friendly) — Exit interview, return of assets, access revocation, knowledge transfer. Conducted in an orderly, respectful process.
  • Termination (hostile)Immediate access revocation first. Then escort from premises, asset collection, and legal documentation. The sequence matters: if the employee reaches their desk before access is disabled, they can destroy evidence or exfiltrate data.

The common thread: access is the primary control. Every lifecycle stage involves granting, adjusting, or revoking access based on the current role and risk level.

ControlPurposePrevents / DetectsExample
Separation of Duties Prevent fraud Prevents — no single person completes a sensitive transaction Payment approver ≠ payment issuer
Job Rotation Detect fraud + reduce key-person risk Detects — new person in role discovers irregularities Rotate financial analysts quarterly
Mandatory Vacation Detect fraud Detects — forced 2-week absence exposes schemes requiring daily attention All finance staff take consecutive 2-week leave
Least Privilege Limit blast radius Prevents — limits damage from compromised or malicious accounts Help desk doesn’t need domain admin
Key Takeaway

Termination first step for a hostile employee: DISABLE ACCESS. Not confront. Not collect the laptop. Not schedule an exit interview. Disable all network and system access immediately. Everything else happens after the access is revoked. This is the single most tested point in personnel security.

A long-term finance manager — 12 years at the company, consistently rated as a top performer — hasn’t taken vacation in three years. They handle all wire transfers personally and become defensive when asked to cross-train a backup.

Scenario
The Indispensable Employee
Mid-size company · Finance dept · $2M monthly wire transfers
CFO“They’re our best performer. Leave them alone. They’re the only reason our wire transfers run smoothly. I don’t want to disrupt that.”
You“That’s exactly the pattern that mandatory vacation and job rotation are designed to detect. No vacation in 3 years, refuses to cross-train, defensive about their processes — these are textbook insider threat indicators.”
HR“But they’ve been here 12 years. We trust them.”
YouTrust is not a security control. Mandatory vacation is a detective control. Job rotation is a detective control. If they’re innocent, they get a well-deserved vacation. If they’re not, we find out before the damage grows.”
CFO“And if the wire transfers fail while they’re gone?”
You“If one person’s absence can bring down a $2M/month process, that’s a business continuity failure, not a personnel issue. We need documentation and cross-training regardless.”
Compensating Control

The “indispensable employee” is a risk, not an asset. If one person is the only one who can perform a critical function, you have a single point of failure AND a fraud risk. Mandatory vacation and job rotation solve both problems simultaneously.

Real Talk — Career Context

In practice, pushing back on a trusted long-term employee is politically difficult. The CFO sees a loyal performer. You see a control gap. Frame it as business continuity (“what if they get hit by a bus?”) rather than accusation (“they might be stealing”). Same outcome, better reception.

On the exam: “Trust” is never a valid reason to skip controls. If the answer says “this employee is trusted, so we don’t need X” — that answer is wrong. Controls are proportional to access level, not trust level.

Your most trusted sysadmin — 15 years at the company, built most of your infrastructure — is being investigated for potential data theft. They have root access to every production system. The investigation is preliminary and may clear them.

Option A
Wait for the investigation to conclude

Avoid false accusation. 15 years of trust deserves the benefit of the doubt. Revoking access prematurely could damage the relationship if they’re innocent.

Option B
Immediately revoke elevated privileges

Assign monitoring controls. This isn’t an accusation — it’s risk management. Root access to every production system is too much exposure during an active investigation.

Option B is correct — managing risk is not the same as presuming guilt

Option B: Revoking elevated privileges during an investigation is a standard security control, not a presumption of guilt. The employee retains their position and base access — only the elevated (root) access is temporarily removed. If the investigation clears them, access is restored. Meanwhile, the organization is protected from the worst-case scenario: a guilty party with root access who knows they’re being investigated.

Option A’s kernel of truth: Due process matters, and false accusations destroy morale. But Option B isn’t an accusation — it’s a temporary, proportional response to a risk. If a pilot is being investigated for substance abuse, they’re grounded during the investigation. That’s not punishment — it’s risk management.

On the exam: controls are applied based on risk level and access, never based on trust or tenure. “Wait and see” is almost always wrong when elevated privileges are involved.

“Confront the employee first” during termination
No — disable access first. Confrontation gives the employee time to destroy evidence, exfiltrate data, or cause damage. The correct sequence for hostile termination is: (1) disable all access, (2) escort from premises, (3) collect assets, (4) conduct exit procedures. Every minute between confrontation and access revocation is a window of risk.
Why it’s tempting: In normal human interactions, you talk to someone before taking action against them. But hostile terminations are not normal interactions — they’re security events.
“Separation of duties detects fraud”
Separation of duties prevents fraud. Job rotation and mandatory vacation detect fraud. This distinction is tested directly. Separation of duties works by ensuring no single person can complete a sensitive transaction. Job rotation works by putting a new pair of eyes on a process. Mandatory vacation works by removing the person who may be covering up fraud.
Why it’s tempting: All three controls relate to fraud, so it’s easy to blur the prevent/detect distinction. Remember: SoD = prevent, rotation & vacation = detect.
“Trusted employees need fewer controls”
Trust is not a security control. Controls are proportional to access level, not trust level. A trusted employee with root access to production systems needs MORE controls (monitoring, separation of duties, mandatory vacation) than a new hire with limited access. The insider threat with the most trust often causes the most damage.
Why it’s tempting: It feels wrong to “not trust” a loyal colleague. But controls aren’t about trust — they’re about managing risk proportional to access.
Exam Signal

When you see a hostile termination or insider threat question: “disable access” is almost always the first step. Not “confront,” not “investigate,” not “contact law enforcement.” Disable access first to prevent further damage or evidence destruction. Everything else follows. Also remember: separation of duties PREVENTS, job rotation and mandatory vacation DETECT.

Quick Check — End of 1.8
An organization discovers that an employee in the finance department has been embezzling funds. The employee becomes hostile when confronted by HR. What should be the security team’s FIRST action?
  • A Escort the employee from the building
  • B Disable all network and system access
  • C Begin a forensic investigation
  • D Contact law enforcement

Correct: B. Disable all network and system access immediately to prevent further damage, data destruction, or evidence tampering. The employee is already hostile — every second with active access is a risk. Escorting (A) is important but happens after access is disabled. Forensic investigation (C) requires preserved evidence, which means access must be disabled first. Law enforcement (D) is appropriate but not the security team’s first priority — containment comes before notification.

Disclaimer: This content is provided for educational and exam preparation purposes only. It is not official ISC2 content, is not endorsed by ISC2, and does not guarantee exam success. All practice questions are original and based on published exam objectives. Always refer to the official ISC2 CISSP Exam Outline as your primary reference.