Chapter 1 Flashcards
Name 5 architecture frameworks
- Zachmann (what/where/when/who in columns and system archtectes, business managers etc in rows)
- TOGAF - views of business , application, technology, data
- DoDAF - systems, processes, personnel in concerted manner
- MoDAF - data in right format to right people
- SABSA - Assets, motivation, people, process, location and time in columns (similar to zachmann)
For an enterprise security architecture to be successful in development and implementation
- Strategic alignment
- Business enablment
- Process enhancement
- Security effectiveness
What are the principles that COBIT is based on
- End to end enterprise coverage
- Single integrated framework
- Holistic approach
- Separating governance from management
How many goals does COBIT have
17 enterprise goals
17 IT related goals
What does COBIT ask?
Simple question – “Why are we doing this”. This should lead to an IT Goal that is tied to an enterprise goal that is tied to a stakeholder need
What is the misconception with COBIT
It is a misconception that COBIT is purely security focussed
What does NIST 800-53 provide
Security and Privacy controls for federal information systems and organisation
How many control categories does NIST have
18 control categories, categorised into (MOT)
Management,
Operational and
Technical
How is COSO - IC Integrated Framework majorly different?
It works at strategic level instead of IT
Deals with fraud through corporate governance
How many and what are the control principles in COSO IC Integrated Framework?
17 internal control principles, grouped into 5 components
- Control environment
- Risk Assesment
- Control Activities
- Information and communication
- Monitoring activities
SOX is based on which security controls framework
COSO IC Integrated framework
What is the difference between NIST 800-53/COBIT etc and Zachmann/SABSA
former are security controls, later are enterprise architectures
CMMI Level 0
Non existent management
CMMI Level 1
Unpredictable processes
CMMI Level 2
Repeatable processes
CMMI Level 3
Defined processes
CMMI Level 4
Managed Processes
CMMI Level 5
Optimised processes
ISO 27001
ISMS requirements
27002
Code of practice for information security management
27003
ISMS implementation
27004
ISMS measurement
27005
Risk Management
27006
Certification body requirements
27007
ISMS auditing
27008
Guidance for auditors
27011
Telecommunications organization
27014
Information security governance
27015
Financial sector
27031
Business continuity
ISO 27016 to 27030
No Standard
ISO 27032
Cybersecurity
ISO 27033
Network security
ISO 27034
Application Security
ISO 27035
Incident management
ISO 27037
Digital evidence collection and preservation
ISO 27099
Health organizations
What is the Difference between ISO 27001 and Enterprise security frameworks:
ISO 27001 is general in nature
- Can be difficult to know how to implement in a specific environment of a company
- That is where the enterprise security architecture comes into play
How are security controls categorised in enterprises
APT
Administrative
Physical
Technical
How are security controls categorised in government
MOT
Management
Operational
Technial
Describe the frameworks, controls standards in the analogy of a house
ISO/IEC 27001 - policy level (description of house)
Security Enterprise Framework - architecture level (arch of house)
Blueprints - detailed descriptions e.g window types
Control Objectives - building specification codes
Define Risk
Likelihood of threat source exploiting vulnerability and its business impact
What are the 6 functionalities that Controls provide
Detective
Preventive
Corrective
Deterrent
Recovery
Compensating
Which is better between detective, corrective, preventive
Most productive to use a preventive model followed by detective, correcitve and recovery ( stop any troble before it starts but be able to react and combat it if it does happen)
If detective control identifies that means preventive failed
Hence corrective is necessary to ensure next time it is prevented
How to map functionality to a control ?
try to think of the MAIN reason why the control was put in place
Eg.
A firewall was put in place to prevent an intruder
Auditing of logs is post facto so it is detective
Backup helps to restore data hene it is recovery
Computer images can be reloaded in case of corruption hence corrective
Why is compensating control required
it is either
Affordable
Allows specifically required business functionality
What are the 8 OECD principles for privacy protection and transborder flow of data
(Quality Cleaning of Personal Underwear using SOAP)
- Collection limitation principle: limited collection, in lawful means, with knowledge of user
- Data Quality principle: data is complete, current and relevant
- _P_urpose specification: users notified during collection, data used only for that purpose
- Use limitation: use other than stated only by explicit agreement of user
- Security safeguards: put safeguards to protect loss, modification, damage
- _O_penness: communicate standards, practices etc openly
- Individual participation: user should know about data held by org and correct erroneous data
- Accountability: organizations should be accountable for complying
What are the 7 Safe Harbor principles
What is the Wassenar arrangement
implements export control for “conventional arms and dual use goods and technologies” . Cryptography falls under dual-use