3rd Part from Audits and Assessments Flashcards
What are audits?
Audits can be performed by someone internal in the organization or they can be performed by an external entity.
Audits are the evaluation of effectiveness of organizational policies, procedures, processes and controls and involves finding the gaps in these policies and producers from industry standards.
For example - There can be an audit of access control systems. In this audit, audit team will make sure access control policies are current (as compared to industry standards) and they are being followed by organization’s employees.
Also, note - for supervising the audit processes, there is a Audit Committee who consists of board of directors.
What are some of the benefits of performing audits?
- With audits, we can provide attestation that we are in compliance with industry regulations or applicable laws.
- We can find any gaps in policies, procedures and processes.
- Audits helps us make sure that our current policies, standards and processes are still effective to protect against threats.
Audits should be performed on regular basis.
Give me some example of audits.
- Privilege creep audits - employees tend of gain more privileges as they change job roles
- Account usage audits
- Access control audits
- Audit to check if company is adhering to GDPR
Many more………
What are assessments (Internal and external)?
Assessment is the process of assessing current organizational controls and information systems to make sure they are still effective in protecting against current threats, vulnerabilities and risks.
It could be performed by internal team or external entity.
When should an organization normally perform an assessment and what are different kinds of assessments?
When it is adding new systems to the organization.
Or current systems are undergoing through changes.
Different assessments :
Risk Assessment
Threat assessment :
Vulnerability Assessment :
What are some of the benefits of external 3rd party audits as compared to internal audits?
3rd party audits can help us provide validation of adherence or facts (like Financial status to stakeholders) to someone like Government or stakeholders.
- They also increase transparency
- They also foster trust with customers and stakeholders.
What is Penetration Testing?
it is simulated cyber attack on information systems.
Types :
Physical Pentesting
Offensive Pentesting
Defensive Pentesting
Integrated Pentesting (It works both the red team and the blue team who work in collaboration)
What is Reconnaisance?
It is process of collecting more information about a target using different sources to make our attack more effective against a target.
Types :
Active reconnaisance
Passive reconnaisance
Pentesting could be in following environments:
- Known environment (White box)
- Partial know environment
- Unknown environment (Black box)
What are some of the benefits of defensive pentesting?
- It can help us improve our detection techniques
- It can help us to improve our Incident response processes and find any gaps in them.
What is attestation in Security audits and assessments?
It is a process that involves the formal validation or confirmation provided by an entity that is used to assert the accuracy and authenticity of specific information.
It is used as an proof of compliance.
There could be :
Software Attestation
Hardware Attestation
System Attestation
What is one hacking tool that DION has recommended to learn?
metasploit
It is a full freamework
What is Cyber Resilience?
It is the capability of a system, to continue its operation even some adverse incident has occurred.
What is redundancy?
It refers to having multiple instances of something like multiple webservers (With primary server and secondary server).
We can have redundancy by having redundant of following -
- Power supplies
- Network connection
- Servers
- Software Services
- Service Providers (Like by having multiple cloud [providers)
What is the concept of High Availability?
High Availability refers to the process of decreasing downtime of something.
We can have high availability using :
- Load Balancing
- Clustering
What are different RAIDs for Data Redundancy?
RAID (Redundant Array of independent disks)
RAID0 - Striping - requires a minimum of 2 disks
RAID 1 - mirroring - require a minimum of 2 disks
RAID 5 - Striping with parity = require a minimum of 3 disks
RAID 6 - Striping with double parity - require a minimum of 4 disks
RAID 10 - requires a minimum of 4 disks