Chapter 5 - Governance, Risk, and Compliance Flashcards
Managerial Controls
Controls that address security design and implementation
Security policies, standard operating procedures
Operational Controls
Controls that are implemented by people
Security guards, awareness programs
Technical Controls
Controls implemented by system
Operating systems, firewalls, anti-virus
Control Type - Preventative
Physically control access
Door lock, security guard, firewall
Control Type - Detective
May not prevent access but identifies and records any intrusion attempt
Motion detector, IDS/ IPS
Control Type - Corrective
Designed to mitigate damage
IPS - block an attacker, Backups - mitigate a ransomware infection, Backup site - can provide options when a storm hits
Control Type - Deterrent
May not directly prevent access but discourages an intrusion attempts
Warning signs, login banner
Control Type - Compensating
Doesn’t prevent an attack but can restore using other means
Re-image or restore from backup, hot site, backup power system, generator
Control Type - Physical
Real-world security
Fences, locks, man traps
Security Controls
Prevent security events, minimize the impact, and limit the damage
General Data Protection Regulation (GDPR)
A set of rules and regulations that allows someone in the EU to control what happens with their private information
Name, address, photo, email, bank
Controls export of personal data and can decide where it goes
National, Territory, or State Laws
Payment Card Industry Data Security Standard (PCI DSS)
A standard for protecting credit cards and transactions
Objectives: build/maintain a secure network and systems, protect cardholder data, maintain vulnerability management program, implement strong access control, regularly monitor, information security policies
Center for Internet Security (CIS) Critical Security Controls for Effective Cyber Defense (CSC)
Improves security posture of organization
Has 20 keys actions and is designed for implementation
National Institute of Standards and Technology (NIST) Risk Management Framework (RMF)
Mandatory for US federal agencies and organizations that handle federal data
Six step process: categorize, select, implement, assess, authorize, monitor
National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)
A voluntary commercial implementation framework
Framework core - identify, protect, detect, respond, recover
Framework implementation tiers - view and process of handling risk
Framework profile - standards, guidelines, and practices of core
International Organization for Standardization (ISO)/ International Electrotechnical Commission (IEC)
27001/ 27002/ 27701/ 31000
ISO/ IEC 27001 - standard for information security management systems (ISMS)
ISO/ IEC 27002 - Code of practice for information security controls
ISO/ IEC 27701 - Privacy information Management systems (PIMS)
ISO 31000 - International standards for risk management practices
SSAE SOC 2 Type I/II
American Institute of Certified Public Accountants auditing standard
SOC 2 - Trust services criteria (security controls)
Type I Audit - Tests controls in place at a particular point in time
Type II Audit - Tests controls over a period of at least six consecutive months
Cloud Security Alliance (CSA)
Security in cloud computing
Not-for-profit organization
Cloud Control Matrix
Cloud-specific security controls
Controls are mapped to standards, best practices, and regulations
Reference Architecture
Methodology and tools, assessing internal organization, security capabilities, and building a road map
Platform/ Vendor-specific Hardening Guides
Guides that are specific to the software and platform
Get feedback from manufacturer or internet interest group
Web Server Hardening Guide
Provides information on how to prevent data leakage and server access, what permissions the server should run on, configuring SSL, and monitoring/ reporting on access logs
Operating System Hardening Guide
Provides latest OS updates/ service packs, user accounts limitations and password complexity/ length, and how to control network access and security