Chapter 5 - Governance, Risk, and Compliance Flashcards
Managerial Controls
Controls that address security design and implementation
Security policies, standard operating procedures
Operational Controls
Controls that are implemented by people
Security guards, awareness programs
Technical Controls
Controls implemented by system
Operating systems, firewalls, anti-virus
Control Type - Preventative
Physically control access
Door lock, security guard, firewall
Control Type - Detective
May not prevent access but identifies and records any intrusion attempt
Motion detector, IDS/ IPS
Control Type - Corrective
Designed to mitigate damage
IPS - block an attacker, Backups - mitigate a ransomware infection, Backup site - can provide options when a storm hits
Control Type - Deterrent
May not directly prevent access but discourages an intrusion attempts
Warning signs, login banner
Control Type - Compensating
Doesn’t prevent an attack but can restore using other means
Re-image or restore from backup, hot site, backup power system, generator
Control Type - Physical
Real-world security
Fences, locks, man traps
Security Controls
Prevent security events, minimize the impact, and limit the damage
General Data Protection Regulation (GDPR)
A set of rules and regulations that allows someone in the EU to control what happens with their private information
Name, address, photo, email, bank
Controls export of personal data and can decide where it goes
National, Territory, or State Laws
Payment Card Industry Data Security Standard (PCI DSS)
A standard for protecting credit cards and transactions
Objectives: build/maintain a secure network and systems, protect cardholder data, maintain vulnerability management program, implement strong access control, regularly monitor, information security policies
Center for Internet Security (CIS) Critical Security Controls for Effective Cyber Defense (CSC)
Improves security posture of organization
Has 20 keys actions and is designed for implementation
National Institute of Standards and Technology (NIST) Risk Management Framework (RMF)
Mandatory for US federal agencies and organizations that handle federal data
Six step process: categorize, select, implement, assess, authorize, monitor
National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)
A voluntary commercial implementation framework
Framework core - identify, protect, detect, respond, recover
Framework implementation tiers - view and process of handling risk
Framework profile - standards, guidelines, and practices of core
International Organization for Standardization (ISO)/ International Electrotechnical Commission (IEC)
27001/ 27002/ 27701/ 31000
ISO/ IEC 27001 - standard for information security management systems (ISMS)
ISO/ IEC 27002 - Code of practice for information security controls
ISO/ IEC 27701 - Privacy information Management systems (PIMS)
ISO 31000 - International standards for risk management practices
SSAE SOC 2 Type I/II
American Institute of Certified Public Accountants auditing standard
SOC 2 - Trust services criteria (security controls)
Type I Audit - Tests controls in place at a particular point in time
Type II Audit - Tests controls over a period of at least six consecutive months
Cloud Security Alliance (CSA)
Security in cloud computing
Not-for-profit organization
Cloud Control Matrix
Cloud-specific security controls
Controls are mapped to standards, best practices, and regulations
Reference Architecture
Methodology and tools, assessing internal organization, security capabilities, and building a road map
Platform/ Vendor-specific Hardening Guides
Guides that are specific to the software and platform
Get feedback from manufacturer or internet interest group
Web Server Hardening Guide
Provides information on how to prevent data leakage and server access, what permissions the server should run on, configuring SSL, and monitoring/ reporting on access logs
Operating System Hardening Guide
Provides latest OS updates/ service packs, user accounts limitations and password complexity/ length, and how to control network access and security
Application Server Software
Middleware - between web server and database
Disables all unnecessary devices, updates security patches, and limits access and rights
Network Infrastructure Devices
Switches, routers, firewalls, IPS, etc.
Purpose-built devices, configure authentication, and check with manufacturer for known updates
Acceptable Use Policy
Detailed documentation of acceptable use of a companies assets
Used by an organization to limit legal liability
Job Rotation
Keep people moving between responsibilities so no one person maintains control for long periods of time
Mandatory Vacation
Rotate others through job to make sure everything is operating correctly
Not used often but especially important in high security environment
Separation of Duties
Split knowledge - No one person has all of the details
Example: half of a safe combination
Dual control - two people must be present to perform a task
Example: two keys opening a safe (or launch missile)
Least Privilege
Rights and permissions set to the bar minimum so a user only has exact access needed to perform an objective
Clean Desk Space
Whenever leaving desk, not important information is left on desk
Background Checks
Pre-employment screening to verify the applicant’s claims, discover criminal history, workers compensation claims
Non-disclosure Agreements (NDA)
Confidentiality agreement where both sides decide what information can be shared and what information should be kept private
Social Media Analysis
Gathering information from social media platforms to be able to see what the potential employee is like outside of a professional atmosphere
Onboarding
Bring a new person into the organization
IT agreements need to be signed, create accounts, provide hardware
Offboarding
Someone leaving the organization in a pre-planned way
Returning of hardware, access of data, deactivate accounts
User Training
Helps the user in operating the system in efficient way by learning, executing, and implementation policies
Gamification
Train while giving people points, competing with other, and collecting badges
Capture the Flag
Security competition where someone hacks into a system in order to steal the flag and create simulations
Phishing Campaigns
A scam that impersonates a reputable person or organization with the intent to steal credentials or sensitive information
Phishing Simulations
Send simulated emails/ make vishing calls
See which users need additional training is susceptible
Computer-based Training (CBT)
Automated pre-built training to do on your own time
What I am doing now
Role-based Training
Specialized training that requires each user to experience with their unique security responsibilities
Third Party Risk Management - Vendors
Important company data is shared
Perform a risk assessment for each vendor and use contracts
Payroll, travel, raw material, customer relations
Third Party Risk Management - Supply Chain
The system involved when creating a product
Perform a supply chain assessment
Organizations, people, activities, and resources
Third Party Risk Management - Business Partners
Closer to data than a vendor
Involves communication over trusted connection
Service Level Agreement (SLA)
Sets a minimum set of service terms for a particular service or product
Between customers and service providers
uptime, response time agreement
Memorandum of Understanding (MOU)
Memo sent between two different parties so that they understand what the requirements might be for a particular business process
Measurement of Systems Analysis (MSA)
Provides a way for a company to evaluate and assess the quality of the process used in their measurement systems
Business Partnership Agreement (BPA)
A legally binding document that determines the roles and responsibilities between two individuals or entities acting as business partners
End of Life (EOL)
When a manufacturer stops selling a product but may still support the product
Security patches, updates
End of Service Life (EOSL)
When a manufacturer stops selling and supporting the product
Security patches, updates
Could maybe pay a premium fee to get security patch or update
Data Classification
Identify data types - use and protect data efficiently
Personal, public, restricted, etc.
Data Governance
Rules, processes, and accountability associated with an organization’s data - data is used in the right ways
Data steward
Data Retention
Keep files that change frequently for version control
Corporate tax information, customer PII, tape backups, etc.