(6) Regulations and Corporate Rules Flashcards
What is the Payment Card industry Data Security Standard (PCI DSS)?
The PCI DSS lays out specific security controls for metchants who handle credit card transactions and service providers who help merchants with these transactions.
What details are including in the vulnerability scans that PCI DSS demands?
Organizations must run both internal and external vulnerability scans
Must run scans at least one every three months and after any major change
Internal scans must be conducted by qualified personnel
Orgs must remediate any high risk vulnerability and repeat scans to confirm that they are resolved until they get a clean scan report
External scans must be conducted by an Approved Scanning Vendor (ASV) authorized by PCI SSC
What is the Federal Information Security Management Act (FISMA)
FISMA requires that gov agencies and other orgs acting on behalf of government agencies comply with a series of security standards.
This depends on if the gov designates the system as low, moderate, or high impact, according to FIPS 199 Standards
According to the Federal Information Security Management Act (FISMA), what must all federal information systems meet?
According to FISMA, all federal information systems must meet the basic standards found in NIST Special Publication 800-53. (review these standards on your own)
What is the Open Web Application Security Project (OWASP)?
OWASP is comprised of a large group of developers and security practitioners, and it has many community developed standards, guides, and best practice documents along with many open source tools.
What four industry frameworks do you need to know well?
PCI DSS, CIS, OWASP, and the ISO 27000 series
What helps determine what systems that an org may scan when checking for vulnerabilities?
Orgs may ask:
-What is the data classification of the info stored, processed, or transmitted?
-Is the system exposed to the Internet?
-What services are offered by the system?
-Is the system a production, test, or development system?
Once cybersecurity professionals conduct the scans that they need to run, what are they trying to build?
Once cyber security professionals conduct the scans that they need to run, they aim to develop an asset inventory
As part of the process of developing an asset inventory, what other information might system administrators add?
Sysadmins might add what type of system it is and the information that it handles to help see if the system is critical or non critical.
Asset criticality and asset inventory helps make decisions about the types of scans that are done, how often they are done, and the level of importance that admins should put on fixing what they find