16 Security Governance Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do security governance practices ensure?

A

Organizations achieve their strategic objectives

Security governance practices are essential for aligning security efforts with business goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are governance programs?

A

Sets of procedures and controls for directing organizational work

Governance programs may involve various stakeholders, including boards and regulators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between centralized and decentralized governance models?

A

Centralized uses a top-down approach; decentralized delegates authority to subordinate units

This affects how security objectives are met within the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What components make up policy frameworks?

A

Policies, standards, procedures, and guidelines

Each element serves a different purpose within the information security program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are policies in the context of information security?

A

High-level statements of management intent

Policies guide the overall direction of the security program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the role of standards in a policy framework?

A

Describe detailed implementation requirements for policy

Standards ensure compliance with the established policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do procedures provide in a security program?

A

Step-by-step instructions for security activities

Procedures are critical for consistent implementation of security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are guidelines in a policy framework?

A

Optional advice that complements policies, standards, and procedures

Guidelines provide flexibility in implementation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name common security policies that organizations may adopt.

A
  • Information security policy
  • Acceptable use policy
  • Data ownership policy
  • Data retention policy
  • Account management policy
  • Password policy

The specific policies depend on the organization’s culture and needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What should policy documents include regarding exceptions?

A

Exception processes outlining required information and approval authority

This ensures proper management of policy deviations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the primary goal of change management?

A

Ensure that changes do not cause outages

Change management processes are vital for system availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What must be evaluated during change review processes?

A

The potential impact of any change

This helps mitigate risks associated with changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What compliance requirements do organizations face?

A
  • Payment Card Industry Data Security Standard (PCI DSS)
  • EU General Data Protection Regulation (GDPR)
  • National, territory, and state laws

Compliance is crucial for legal and operational integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do standards frameworks provide?

A

An outline for structuring and evaluating cybersecurity programs

Frameworks help organizations assess their cybersecurity posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name two examples of security frameworks.

A
  • NIST Cybersecurity Framework (CSF)
  • International Organization for Standardization (ISO) standards

These frameworks guide security program development and evaluation.

17
Q

What is the NIST Risk Management Framework (RMF) used for?

A

Guiding U.S. federal government agencies and contractors

RMF helps in managing risks in federal environments.

18
Q

What is the purpose of security training and awareness?

A

Ensure individuals understand their responsibilities

Training and awareness are essential for maintaining security in organizations.

19
Q

What do security training programs aim to do?

A

Impart new knowledge on employees and stakeholders

Tailoring training to roles enhances its effectiveness.

20
Q

What is the focus of security awareness programs?

A

Remind users of their security responsibilities

These programs keep security top-of-mind for employees.