Chapter 16 - Security Governance and Compliance Flashcards
Governance
Governance programs are the sets of procedures and controls put in place to allow an organization to effectively direct its work.
Board of Directors
A Board of Directors has ultimate authority over a corporation as the owner’s representatives. Shareholders elect the members of this board to direct the actions of the corporation on their behalf.
Independent Directors
Independent Directors have no significant relationship with the company other than their board membership.
Chief Executive Officer (CEO)
The Chief Executive Officer is hired by the board of directors to manage the day-to-day operations of the corporation. The CEO is hired by the board, may be dismissed by the board, and has their performance reviews and compensation determined by the board.
Centralized Governance Model
Centralized Governance Models use a top-down approach where a central authority creates policies and standards, which are then enforced throughout the organization.
Decentralized Governance Model
Decentralized Governance Models use a bottom-up approach, where individual business units are delegated the authority to achieve cybersecurity objectives and then may do so in the manner they see fit.
Policy
Policies are high-level statements of management intent. Compliance with policies is mandatory. An information security policy will generally contain broad statements about cybersecurity objectives.
Standards
Standards provide mandatory requirements describing how an organization will carry out its information security policies. These may include the specific configuration settings used for a common operating system, the controls that must be put in place for highly sensitive information, or any other security objective.
Procedures
Procedures are detailed, step-by-step processes that individuals and organizations must follow in specific circumstances. Similar to checklists, procedures ensure a consistent process for achieving a security objective.
Guidelines
Guidelines provide best practices and recommendations related to a given concept, technology, or task. Compliance with guidelines is not mandatory, and guidelines are offered in the spirit of providing helpful advice.
Compensating Control
Compensating Controls are designed to mitigate the risk associated with exceptions to security standards.
Change Management
Change Management processes ensure that appropriate personnel review and approve changes before implementation and ensure that personnel test and document the changes.
Impact Analysis
Impact Analysis is the process of evaluating changes to identify any security impacts before personnel deploy the changes in a production environment.
Backout Plan
A Backout Plan allows personnel to undo the change and return the system to its previous state if necessary.
What are the common tasks within a change management process?
- Request the change
- Review the change
- Approve/reject the change
- Test the change
- Schedule and implement the change
- Document the change
Version Control
Version Control ensures that developers and users have access to the latest versions of software and that changes are carefully managed throughout the release process. A labeling or numbering system differentiates between different software sets and configurations across multiple machines or at different points in time on a single machine.
Two-Person Control
Two-Person Control requires the participation of two people to perform a single sensitive action.