CIPM CH 4 Protect Flashcards
Information security management system
A set of processes that provides management with governance capabilities to manage the entire information security program
Identity and access management
Foundational Activities
. Measurement of an accurate inventory of workers in the organization
. Measurement of all these workers access rights to networks, systems, data, applications, and places where business operations systems take place
Access controls
Are used to determine whether and how subjects (usually person) are able to access objects, using the systems and or data,
Logical access controls works two ways:
. Subject access: a logical Access Control uses some means to determine the identity of a subject requesting access
. service access: access control is used to control the types of messages that are allowed to pass through a control port. Logical access control is designed to permit or deny messages of specified types