Domain 1: Everything Else Flashcards
- When a user cannot deny having performed a certain action on a system.
- Both authentication and integrity are combined.
Nonrepudiation
Users should be granted the minimum amount of access required to do their jobs no more.
Least privilege
Users must know a specific piece of info before accessing it.
Need to know
- Term used to describe an active entity on a system.
- Users and computer programs can be labeled this as well.
Subjects
Term used to describe data on a system
Objects
Multiple safeguards are put into place in order to protect an asset. Safeguards aka controls are measures taken to reduce risks
Defense in Depth
What are some auditing frameworks for the purpose of a security assessment?
SOC1 and SOC2
- Report that covers internal controls over financial reporting.
- Gives your company’s user entities some assurance that their financial information is being handled safely and securely
SOC1
Focuses on implemented security controls in relation to availability security, integrity privacy, and confidentiality
SOC2
A thirty-party is brought in to review the practices of the service provider and make a statement regarding their security posture
Attestation
Documents provided that give written approval to the security company to perform pen test or audit the organization network.
Right to penetration test/right to audit
Process of acquiring products or services from a third party
Procurement
Ensures that the business is continually getting sufficient quality from its third-party vendors
Vendor Governance
What are some steps taken before an acquisition of a company?
Due diligence of acquired company’s current cybersecurity program and assessment of current network security.
When one company is split into two or more companies
Divestitures
What are security concerns relating to divestitures?
The split companies inadvertently maintaining duplicate accounts and passwords
- “protect society, the commonwealth, and the infrastructure.”
- Security professionals are charred with the promotion of safe security practices and improvement of system infrastructure for the public good.
- (ISC)^2 Code of Ethics
First canon of (ISC)^2 Code of Ethics
- “act honorably, honestly, justly, responsibly, and legally.”
- If laws from different jurisdictions are found to be in conflict. Then priority should be given to the jurisdiction in which services are being provided.
- (ISC)^2 Code of Ethics
Second canon of (ISC)^2 Code of Ethics