CCSP Domain 6: Legal, Risk, and Compliance Flashcards
Policies
Interpretations of laws and practices deemed essential to the firm, policies for the foundation of corporate governance by setting rules that must be followed by employees of the firm; as such, they require approval by senior management and penalties for non-compliance.
Policies, which are general principles, are often supported by standards – unambiguous benchmarks for compliance with policy – and guidelines – prototype policies and standards for emerging but as of yet undecided rules of conduct.
Criminal Law
A body of rules and statutes that define conduct prohibited by the government so as to foster the safety and well being of the public.
Tort Law
A body of rights, obligations, and remedies that set our relief for people suffering harm because of the wrongful acts of others.
E-discovery
The identification, preservation, collection, processing, review, analysis, or production or electronically stored information.
Triggered by: investigation of a crime, internal policy violation, recovery from accidental damage, legal hold, and violations of compliance or regulations.
Forensic Requirements
1) Document all steps taken and discoveries made
2) Photograph computer set-ups and peripheral devices used in discovery (e.g. show your work)
3) Before touching a system, photograph / note any information displayed on the monitor, peripherals, etc.
4) Maintain chain of custody – e.g. ideally, have one person gather all evidence
ISO/IEC 27037
Guidance on identification of data sources, acquisition of data, and preservation of data in e-discovery and forensic analysis.
Five Rules of Evidence
1) Be authentic : evidence needs to tie back to the scene (i.e. a clean chain of custody)
2) Be accurate : evidence must have authenticity and veracity
3) Be complete : gather all evidence even if it contradicts the hypothesis of the investigators
4) Be convincing : the evidence should be clear and easy to understand (i.e. quoniam res ipsa loquitur)
5) Be admissible : evidence must be admissible and probative (material) to the case
EU-U.S. Privacy Shield
This framework protects the fundamental rights of anyone in the EU whose personal data is transferred to the U.S. for commercial purposes.
HIPAA
The Health Insurance Portability and Accountability Act (HIPAA) sets out the requirements of the U.S. Department of Health and Human Services to adopt national standards for electronic health care transactions and national identifiers for providers, health plans, and employees.
GLBA
The Gramm-Leach-Bliley Act (GLBA) is a federal law that controls the ways that financial institutions deal with the private information of individuals.
It is composed of three sections:
1) Financial privacy rule : regulates the collection and disclosure of financial data
2) Safeguards rule : states that firms must actively protect the financial data they hold
3) Pretexting provisions : prohibits access to the financial information of an individual under false pretenses
ISO/IEC 27018:2019
Code of practice for the protection of personal data in the cloud.
The five principles of ISO/IEC 27018:2019 are:
1) Consent: a provider may not use customer data without express customer consent
2) Control: customers retain explicit control of how their data is used by the provider
3) Transparency: operations must be clearly documented for and described to the customer
4) Communication: breeches and other incidents must be disclosed in a timely manner with sufficient detail
5) Independent annual audit: adherence must be certified by a neutral party via audit
GAPP
There are ten Generally Accepted Privacy Principles (GAPP) in this privacy framework:
1) Management: policy and procedures are documented and warranted (i.e. say what you do, do what you say)
2) Notice: the nature and management of gathered data is disclosed to the subject, partner, etc.
3) Choice and Consent: Consent is required and the choices available to the subject, partner, etc., are clearly articulated
4) Collection: data collected aligns with the limits established in 1-3, above
5) Use, Retention, and Disposal: are each documented and maintained in operations (i.e. say what you do, do what you say)
6) Access: the data subject may access / review the data you hold about them
7) Disclosure to Third Parties: is limited to 1-3, above
8) Security for privacy: data is protected
9) Quality: data is accurate and has integrity
10) Monitoring and enforcement: as it says on the tin… the system is watched and kept within the range of allowable security states
Privacy Maturity Model
M1: ad hoc (i.e. repetition of outcomes is by chance)
M2: limited documentation and process (i.e. repeatable outcomes are possible but variance is likely)
M3: defined, the system works in a proscribed way (i.e. repeatable outcomes are most likely)
M4: managed, the system is monitored for performance and improvement (i.e. business continuity is applied)
M5: optimized, the system is designated ‘perfect’ for the environment – note this may be a system with 80% availability or one with 99.999% … ‘optimized’ mean ideal within the constraints required or desired by the firm
Audit Planning
The stages of implementation are:
define audit objectives -> define audit scope -> refine audit processes from lessons learned -> fieldwork -> analysis -> reporting
CSA STAR Level 1
Self-assessment against the Cloud Controls Matrix (CCM) or the Consensus Assessments Initiative Questionnaire (CAIQ) by the vendor.