2.1_The Security Organization - GRC Flashcards
What are the 5 areas of Security Team Alignment?
- Linux and Windows
- Networking
- Defense Security
- Web and Web Vulnerabilities
- Offensive Security
Security operations will interact with other non-security team departments within the organization. Give an example.
An organization’s Marketing and Communications teams use the networks and accounts that IT and Networking manage.
Security Concerns vs. Business Concerns
Security Team’s Main Goal: Protect the business’s data
Business Goal: To make profit
An organization’s engineering team proposes an innovative but insecure new feature for their flagship product. What would the security team say vs the suits?
Security Team:
The security team would probably advise against the new feature due to its poor security.
Business-At-Large:
The business might decide to develop it anyway, believing the potential profit is worth the risk.
An organization’s engineering team proposes an innovative but insecure new feature for their flagship product. What could the security team do?
- Put in place more aggressive monitoring
on data servers likely to be exposed by the
new feature. - Advise IT and Networking to put in place more sophisticated access controls on important servers and proxies.
True or False:
100% security is not the business’s goal
True
To limit spending and increase profit, businesses often provide only adequate protection for their most important assets.
What is the GRC framework and the three components?
GRC is a framework for answering the questions: What assets are most important? and what is adequate protection?
Creating management processes for implementing security practices across the organization is what component of GRC framework?
Governance
Making sure the business follows internal security policies and adheres to relevant security laws is what component of GRC framework?
Compliance
Identifying an organization’s most important assets and determining how they might be compromised.
Risk Management
The more significant the loss, the more important the asset is apart of what concept?
GRC Framework
Security vs. Business Objective:
The organization performs a risk assessment and concludes that the feature could lead to a 25% increase in quarterly profits. The feature would also risk exposing an isolated data server containing customer names, usernames, and email addresses, but no other PII (personally identifiable information). What wins?
Business Wins!
The security team objects to the feature on the grounds of insecurity. But the business decides that the cost of the potential breach—of an isolated server with no sensitive PI —would be less than the potential profit of the feature.
The director of Engineering suggested giving all developers access to all data. What’s the recommendation?
Reject on the grounds of privacy?
The director of IT suggested exposing administration servers to the public internet. What’s the recommendation?
Reject this request. A VPN would be a better solution to this problem.
An SOC analyst recommended merging all of the company’s mail servers into a single server, in order to cut costs and improve efficiency. What’s the recommendation?
If the company has so many emails that it needs to maintain multiple servers, this suggestion is not possible. Otherwise, hosting all of the data on a single server makes sense.