Chapter 5: Security Governance Concepts, Principles, and Policies Flashcards
What is the purpose of security management planning?
Ensuring the proper creation, implementation, and enforcement of a security policy.
What is the most important key factor in a security plan?
Senior management approval. Without this, it’s toothless.
What is a strategic plan?
A long term, fairly stable plan defining the organization’s security purpose. Useful for about 5 years if updated annually.
What is a tactical plan?
A midterm plan developed to provide more details on accomplishing the goals of the strategic plan. Useful for about a year, and often prescribes and schedules taks. Includes project, acquisition, hiring, budget, maintenance, support, and system development plans.
What is an operational plan?
A short term, highly detailed plan based on the strategic and tactical plans, valid and useful only for a short time. Includes resource allotments, budgetary requirements, staffing assignments, scheduling, step by step or implementation procedures.
What is security governance?
The collection of practices related to supporting, defining, and directing the security efforts of an organization.
What are the sources of governance?
Some are imposed due to legislative and regulatory compliance needs. Others are imposed by industry guidelines or license requirements.
What are the responsibilities of the senior manager?
Ultimately responsible for the security of the organization
Should be most concerned about the protection of its assets
All activities must be approved by this role
Rarely implements the solutions directly
What are the responsibilities of the security professional?
AKA InfoSec officer or CIRT.
Responsible for following the directives mandated by senior management
Functional responsibility for security, including writing the security policy and implementing it.
Often filled by a team responsible for desigining and implementing security solutions based on an approved security policy.
What are the responsibilities of the data owner?
Responsible for classifying information for placement and protection within the security solution.
Typically a high-level manager ultimately responsible for data protection
Data management is usually delegated to a data custodian
What are the responsibilities of the data custodian?
Responsible for the tasks of implementing the proscribed protection defined by the security policy and senior management.
CIA triad
Backups/testing/deploying security solutions
What are the responsibilities of the user?
Any person who has access to the secured system.
Responsible for understanding and upholding the security policy by following prescribed operational procedures and operating within defined security parameters
What are the responsibilities of the auditor?
Responsible for reviewing and verifiying that the security policy is properly implemented and the security solutions are adequate. Produces compliance and effectiveness reports.
Define “privacy”.
- Active prevention of unauthorized access to information that is personally identifiable
- Freedom from unauthorized access to information deemed personal or confidential
- Freedom from being observed, monitored, or examined without consent or knowledge
What is the CIA Triad?
Confidentiality, Integrity, Availability