CH30 Policies and Procedures Flashcards
What are policies?
Policies defines the role of security in an organization and establishes the desired and state of the security program
For the exam : Policies are generic. Procedures are specific
What are Organizational Policies?
provide general direction and goals, a framework to meet the business goals, and define the roles, responsibilities, and terms
What are System-specific policies?
address the security needs of a specific technology, application, network, or computer system
What are Issue-specific policies?
built to address a specific security issue, such as email privacy, employee termination procedures, or other specific issues
What are 3 Information Security policy categories?
- Regulatory – mandatory standards and laws that are going to affect the organization.
- Advisory – guidance on what is and what is not considered acceptable activity. (Ex: Acceptable Use Policy – AUP)
- Informative – focuses on a certain topic and it’s designed to be educational in nature.
What are Procedures in regards to Policies and Procedures ?
detailed step-by-step instructions that are created to ensure personnel can perform a given action
For the exam : Policies are generic. Procedures are specific
What is Data Classifications?
Category based on the value to the organization and the sensitivity of the information if it were to be disclosed.
What is Sensitive Data?
Any information that can result in a loss of security, or loss of advantage to a company, if accessed by unauthorized persons
What are the 4 classification levels of Commercial business ?
a. Public – has no impact to the company if released and is often posted I the open-source environment.
b. Sensitive – might have a minimal impact if released.
c. Private – contains data that should only be used within the organization
d. Confidential – highest classification level that contains items such as trade secrets, intellectual property data, source code, and other types that would seriously affect the business if disclosed.
What are the 5 classification levels of Government Organization?
a. Unclassified – can be released to the public
b. Sensitive but Unclassified – items that wouldn’t hurt national security if released but could impact those whose data is contained in it.
c. Confidential – Data that could seriously affect the government if unauthorized disclosure were to happen.
d. Secret – data that could seriously damage national security if disclosed.
e. Top Secret – data that could gravely damage national security if it were known to those who are not authorized for this level of information
Who is Data Owner?
a senior (executive) role with ultimate responsibility for maintaining the confidentiality, integrity, and availability of the information asset. He is responsible for labeling the asset and ensuring that it is protected with appropriate controls
Who is Data Steward?
a role focused on the quality of the data and associated metadata
Who is Data Custodian?
a role responsible for handling the management of the system on which the data assets are stored.
Who is Privacy Officer?
a role responsible for the oversight of any PII/SPI/PHI assets managed by the company
What is PII
PII = Personally Identifiable Information
a piece of data that can be used either by itself or in combination with some other pieces of data to identify a single person. (Ex: full name, driver license number, social security number, date of birthday, places of birth, biometric data, financial account number, address, email address, social media usernames)
What is Privacy Act of 1972 ?
Affects U.S government computer systems that collects, stores, uses, or disseminates personally identifiable information.
What is Health Insurance Portability and Accountability Act (HIPAA) ?
Affects healthcare providers, facilities, insurance companies, and medical data clearing houses
What is Sarbanes-Oxley (SOX) ?
affects publicly-traded U.S. corporations and requires certain accounting methods and financial reporting requirements
What is Gramm-Leach-Bliley Act (GLBA) ?
affects banks, mortgage companies, loan offices, insurance companies, investment companies, and credit card providers. Prohibits sharing of financial information of an individual with any third parties
What is Federal Information Security Management (FISMA) Act of 2002 ?
Requires each agency to develop, document, and implement an agency-wide information systems security program to protect their data
What is Payment Card Industry Data Security Standard (PCI DSS)?
a contractual obligation. An agreement that any organization who collects, stores, or processes credit card information for a customer to follow