Chapter 3 - Governance and Security Planning Flashcards

1
Q

Mission: explicitly declares the business of the organisation. it is the Identity. how the organisation goes there.

Vision: where the organisation wants to go. visions are not meant to express the probable, only the possible.

Value Statement: formal set of principles and values for measuring behaviour

A

..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Planning Hierarchy

A

Corporate Strategy
_______________|_______________________
| | | |
Financial Str. IT Str. Operations Str. |
| | | |
|_______Infosec Strategy______ |_________ |
|
Infosec Tactical Planning
|
Infosec Operational Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Budgeting, resource allocation and personnel are critical components of tactical plan.

A

managers and employees are using operational plans, which are derived from tactical plans to organise the ongoing, day to day performance of tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

First priority of CISO should be structure of strategic plan.

Basic components of a typical organisation level strategic plan includes:

A
  1. executive summary
  2. mission, vision, and values statements
  3. organisational profile and history
  4. strategic issues and challenges
  5. organisational goals and objectives
  6. major business unit goals and objectives
  7. appendicies.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IDEAL

Initiating:

Diagnosing: determine where you are relative to where you want to be

Establishing: plan how you will reach there

Acting: do the work according to the plan

Learning: learn from experience and improve

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information Security Governance Responsibilities

CEO
See overall posture
brief board, customer, public

CISO CSO CRO, Department Head..
set security policy, program, training for company
respond to security bridges
be responsible for annual independent audit
implement, audit, asses compliance

Mid Level Manager
implement/audit/asses compliance
communicate policies, program(training)

Employees
communicate policies, program(training)
implement policy, report security vulnerabilities and breaches

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CERT GES Hierarchy

Risk Management Plans
Enterprise Security Strategy
Enterprise Security Plan
BU Plans, policies, procedures, architectures

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ISO/IEC 27014:2013
Governance of Information Security

Evaluate, the current dtatus
Direct, 
Monitor
Communicate
Assure
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Convergence

merging of management accountability in the areas of physical secu, corporate risk management, computer security, network security, and InfoSec..,

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Top Down approach for security implementation

must have a champion.

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SDLC: system development life cycle

SecSDLC: security system development life cycle

after implementation, security program should be supported by continuous improvement(CIP).

IDEAL is one of the popular CIP model.

A

..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SDLC waterfall methodology(Implementation)

Investigation: begins with policy. manager and employees investigate problems, define scope, identify goals…
Analysis: Risk management starts here
Logical - Physical design:security policy, SETA, controls, Contingency Planning
Implementation:…
Maintenance and Change:

A

Implementation:
Champion: senior level sponsor

Team leader: understands project mgmt, personnel mgmt and technical requirements

Security policy developers; understand company culture, policies and requirements

Security professionals
System administrators
End users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Control Types:

Managerial Controls: security program management, address risk management and security controls.

Operational controls: addressing disaster recovery, personnel security, physical security

technical controls: logical access controls

A

infosec and staffing:

  1. where to position security
  2. Infosec community; plan for proper staffing
  3. IT community; understand how infosec affects IT and adjust job description and documented practices
  4. General community works with infosec to integrate infosec concepts into personnel management processes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CISO: responsible for assessment management and implementation of security

Security Managers: day to day operations of infosec program, accomplishing objectives set by CISO, resolving issues identified by technicians

Security technicians: diagnosing and troubleshooting problems, configuring eg. firewalls, ensuring secure implementation

data owners: control and are therefore responsible for the information

data trustees: ultimately responsible C level executives

A

..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly