Chapter 2 Flashcards

1
Q

Organisation-Wide Risk Management

A

Involve everyone in the organisation, from top leaders to regular employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Multi-Level Risk Management Model

A

This model manages risks at three levels: organisation, mission/business process, and information system, ensuring that risks are addressed comprehensively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Level 1 and 2 Activities

A

These activities prepare the organisation for risk management by identifying roles, assets, threats, and risk assessments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Level 3 in Risk Management

A

Level 3 focuses on system-specific risks, guided by decisions at higher levels, and designates controls based on security/privacy requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Traceability of Controls

A

It ensures that security and privacy controls are linked to specific requirements throughout the system’s lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Consequences of Inadequate Organisational Preparation

A

Inadequate preparation can lead to costly and ineffective security measures, impacting the organisations efficiency and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Management Framework Steps (RMF)

A

RMF has seven steps, including preparation, categorisation, selection, implementation, assessment, authorisation, and monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Prepare
A

Step 1 establishes priorities for security and privacy risk management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Categorise
A

In step 2, the impact of potential loss and system categorisation is analysed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Select
A

Step 3 involves selecting and tailoring controls based on a risk assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Implement
A

Step 4 is about putting selected controls into practice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Assess
A

Step 5 evaluates control implementation to ensure they meet requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Authorise
A

Step 6 grants system authorisation based on acceptable risk levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Monitor
A

Step 7 involves continuous assessment of control effectiveness and reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Adaption of RMF Steps

A

RMF steps can be adjusted as needed, especially in agile development, where steps may need revisiting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Integration of Information Security and Privacy Programs

A

Information security and privacy programs work together to manage risks associated with personally identifiable information (PII) by selecting and monitoring controls.

17
Q

Privacy Controls vs Security Controls

A

Privacy controls focus on compliance and privacy risks, while security controls cover broader protection needs.

18
Q

Authorisation Boundaries

A

The authorisation boundary defines what the organisation commits to protect in an information system, involving people, processes, and technologies supporting the organisations mission.

19
Q

Systems and System Elements

A

Information systems consist of various elements, including technology, humans, physical components, and environmental factors, working together for specific goals.

20
Q

Authorisation Boundaries Review

A

The scope of the authorisation boundary is periodically reviewed as part of continuous monitoring, aligning with the organisations resources and flexibility.

20
Q

Interconnections in Systems

A

Systems’ interconnections enable them to interact and produce capabilities, operating within an influencing environment.

20
Q

External Systems

A

Other systems interact with the operational environment but may be outside the authorisation boundary, depending on context and organisational considerations.

20
Q

Enabling Systems

A

Enabling systems, although outside the authorisation boundary, may provide support during a system’s lifecycle by offering common controls or services.

21
Q

Establishing Authorisation Boundaries

A

Establishing meaningful authorisation boundaries involves coordinating with key participants, considering mission, business, security, privacy, and cost factors.

21
Q

Requirements and Controls Overview

A

Requirements signify protection needs, while controls outline safeguards. Requirements can be legal, policy-based, or from risk assessments, and controls are chosen and implemented to meet these needs.

21
Q

Categorising Requirements

A

Organisations may categorise requirements as capability, system, or statement of work requirements, depending on their role in the SDLC.

21
Q

Types of Controls

A

Controls cover technical, administrative, and physical aspects and are chosen and implemented to meet system requirements.

21
Q

Security and Privacy Posture Definition

A

The security and privacy posture reflects the organisations status in terms of resources and capabilities to protect information systems and comply with privacy requirements.

21
Q

Supply Chain Risk Management (SCRM)

A

Organisations increasingly rely on external providers for products and services, introducing significant risks. SCRM policies help address these supply chain risks.

22
Q

Responsibilities with External Providers

A

External providers handling federal information must meet security and privacy requirements equivalent to federal agencies, with the RMF serving as a tool for managing supply chain risk.

22
Q

Assurance in SCRM

A

Assurance in SCRM is based on contractual terms, evidence of control, effectiveness, and trust in the provider, and it determines the acceptability of risk from external providers.