CCSP Domain 6: Policies, Standards, Baselines and Guidelines Flashcards

1
Q

What is a policy?

A

broad statement of management intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is policy compliance mandatory?

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the generalized statements about the cybersecurity objective included in information security policy?

A
  • stetement of importance of cybersecurity to the organization
  • requirements that all staff and contracts take measures to protect the confidentiality, integrity and availability of information and information systems
  • statement of the ownership of information created and/or possessed by the organization
  • designation of CISO or other individual as the executive responsible for cybersecurity issues
  • delegation of authority granting the CISO the ability to create standards, procedures and guidelines that implement the policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who approves policies?

A

CEO; requires approval from senior management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What should cybersecurity managers do when developing new security policies in the relation to the already existing policy development mechanisms?

A

should align their work with any other policy development mechanisms that may exist within their organization; aligning with existing procedures makes it easier for the new initiative to track action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What key principles should be followed by cybersecurity managers when working on policy development initiatives? (4)

A
  1. obtain input from all relevant stakeholders
  2. follow the chain of command
  3. accomodate the organizational structure
  4. meet internal and external requirements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Do security policies contain prescriptive technical guidance, such as a requirement to use a specific encryption algorithm?

A

no, this type of detail would normally be found in a security standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

All policies within the organization should include a section that includes which elements?

A
  • policy maintenance
  • policy enforcement
  • policy enforcement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The baseline should cover what systems?

A

as many systems throughout the organization as possible; more systems that are included in the baseline, the more cost-effective and scalable the baseline is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do standards provide?

A

mandatory requirements describing how an organization will carry out its information security policies; may include specific configuration settings used for OS’es

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who approves standards in an organization?

A

standards are usually approved at lower organizational level than policies, thus they change more frequently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are procedures?

A

detailed, step-by-step processes that individuals and organizations must follow; ensure consistent process for achieving a security objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is compliance with procedures mandatory?

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of guidelines?

A

provide best practices and recommendations related to a given concept, technology or task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is compliance with guidelines mandatory?

A

no, it aims to serve as a helping hand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do many exception processes require?

A

use of compensating controls to mitigate the risk associated with exceptions to security standards

17
Q

PCI DSS includes one of the most formal compensating control process in use today and sets out 3 criteria that must be met for a compensating control to be satisfactory. What are these criteria?

A
  1. the control must meet the intent and rigor of the original requirement
  2. the control must provide similar level of defense as the original requirement such that the compensating control sufficiently offsets the risk that the original PCI DSS requirement was designed to defend against
  3. the control must be “above and beyond” other PCI DSS requirements
18
Q

Are compansating controls intended to be permanent?

A

no, remediation plans should be developed to bring the organization back into compliance with the letter and intent of the original control

19
Q

What is the common baselining method?

A

imaging

20
Q

What is versioning?

A

using a labeling or numbering system to track changes in updated versions of baseline (image, application, system, etc.)

20
Q

How can be baselines applied?

A

to a single VM image or to a VM template, that is then used to deploy all VMs

21
Q

What is hardening?

A

configuration of a machine into a secure state through application of a configuration baseline

22
Q

Who can offer hardened VM images?

A
  • customer-defined
  • CPS-defined
  • 3rd party, often available through a cloud marketplace
23
Q

Who offers hardened VM images in CSP marketplaces?

A

Center for Internet Security (CIS)

24
Q

What is a control?

A

high-level description of a feature or activity that needs to be addressed and is not specific to a technology or implementation

25
Q

What does benchmark contain?

A

contains security recommendations for a specific technology, such as an IaaS VM; describe configuration baselines and best practices for securely configuring a system

26
Q

What is a baseline?

A

implementation of the benchmark on the individual service

27
Q

How is control expressed?

A

as a benchmark

28
Q

How is benchmark implemented?

A

through a baseline

29
Q

What is the main purpose of benchmarks?

A

to ease process of securing a component, reduce footprint and minimize risk of security breach

30
Q

What are the sources from where baselines can be obtained?

A
  • Vendor-Supplied Baselines
    • vendors provide configuration guideliness
  • DISA STIGs
    • U.S. Defense Information Systems Agency (DISA) produces baseline documents known as Security Technical Implementation Guides (STIGs); may be too restrictive for businesses
  • NIST Checklists
    • National Institute of Technology and Standards maintains a repository of configuration checklists for various OS and application software
  • CIS Benchmarks
    • Center for Internet Security publishes baseline guides for a variety of OSes, applications and devices
    • priced based on environment size
31
Q

Baselines are composed of individual settings called what?

A

Configuration Items (CI)

32
Q

What organizations provide Windows server security baselines?

A

Center for Internet Security, Microsoft, and the National Institute for Standards and Technology

33
Q

What are CIS security controls?

A

security baseline adopted by many organizations

34
Q

What term describes a general-purpose map of the systems and networks used in an organization?

A

baseline