Domain 1 Flashcards
What is the CIA Triad
- Confidentiality
- Integrity
- Availability
Achieving CIA Best Practices
- Separation of Duties
- Mandatory Vacations
- Job Rotation
- Least Privilege
- Need-to-know
- Dual Control
BIA
Business Impact Analysis
Define RTO
Planned recovery time. The amount of time allocated for a recovery plan to be executed
WRT
Work Recovery Time
Define WRT
The time needed to test and make sure everything is ready to go into live production environment
SLO
Service Level Objective
Define SLO
The level of Service a business needs to recover to in order to meet contractual requirements
RTO
Recovery Time Objective
COOP
Continuation of Operations
Define COOP
Focuses on delivering “something”, even if not optimal, while recovering critical systems to nominal
MTD
Maximum Tolerable Downtime
Define MTD
Amount of time we can be without a critical business function before business can no longer function from pain (pain of loss)
MTO
Maximum Tolerable Outage
Define MTO
The amount of time business can operate in recovery mode. May be limited by resources or constraint of inventory (example fuel in generators)
Steps of BIA
- Inventory and Define Assets (critical assets)
- Learn the business (understand what it does)
- Identify critical business functions
- Total list, critical and not of assets and their function
- Derive Plans - Create different plans for management to select from
Risk Management Constraints
Time and budget
Opposite of CIA Triad (DAD)
Disclosure, Alteration, Destruction
Protection Mechanisms
- Layering (defense in Depth)
- Abstractions
- Encryption
Security Control Categories
- Directive (administrative) -mandated requirements
- Deterrent - Reduces someone’s will to attack
- Preventative - Controls to prohibit activity
- Detective - Recognize hostile activity
- Corrective - Reacts to a situation to stop and restore 5. Recovery - restore operations to known good state
Define Risk Management
Process of identifying, examining, measuring, mitigating, or transferring (sharing) risk
Risk Terminology
Asset - Anything of value to a company
Vulnerability - a weakness; the absence of a safeguard
Threat - Things that could pose a risk to an asset
Threat agent - The entity which carries out attack
Exploit - An instance of compromise
Popular Security Frameworks
ISO 27001/27002 COBIT ITIL RMF CSA STAR
ISO 27001
ISO 27001 is known as the information security management system (ISMS) and is a comprehensive, holistic view of security governance within and organization, mostly focused on policy
ISO 27002
ISO 27002 is a comprehensive list of security controls that can be applied to an organization; the organization uses ISO 27002 to select the controls appropriate to its own ISMS, which the organization designs according to ISO 27001
COBIT
The COBIT framework (currently COBIT 5) is designed as a way to manage and document enterprise IT and IT security functions for an organization. COBIT widely uses a governance and process perspective for resource management and is intended to address IT performance, security operations, risk management, and regulatory compliance.
ITIL
“concentrates on how an organization’s IT environment should enhance and benefit its business goals. ITIL is also mapped to the ISO 20000 standard, perhaps the only non-ISO standard to have this distinction”
RMF
NIST, the U.S. National Institute of Standards and Technology, publishes two methods that work in concert (similar to how ISO 27001 and 27002 function);
Risk Management Framework (RMF), and the applicable list of security and privacy controls that goes along with it (respectively, these documents are Special Publications (SPs) 800-37 and 800-53).
Required to be followed by federal agencies in the United States,
CSA STAR
Cloud Security Alliance (CSA) publishes standards and tools for industry and practitioners, at no charge. The CSA also hosts the Security, Trust, and Assurance Registry (STAR), which is a voluntary list of all cloud service providers who comply with the STAR program framework and agree to publish documentation on the STAR website attesting to compliance
“STAR framework is a composite of various standards, regulations, and statutory requirements from around the world, covering a variety of IT security. Three tiers