DOMAIN 1—INFORMATION SECURITY GOVERNANCE (24%) Flashcards
Which of the following steps should be FIRST in developing an information security plan?
A. Perform a technical vulnerabilities assessment.
B. Analyze the current business strategy.
C. Perform a business impact analysis.
D. Assess the current levels of security awareness.
B. Analyze the current business strategy.
B is the correct answer.
Justification:
A. Technical vulnerabilities as a component of risk will be most relevant in the context of threats to achieving the business objectives defined in the business strategy.
B. An information security manager needs to gain an understanding of the current business strategy and direction to understand the organization’s objectives and the impact of the other answers on achieving those objectives.
C. A business impact analysis should be performed prior to developing a business continuity plan, but this would not be an appropriate first step in developing an information security plan because it focuses on availability, which is also primarily relevant in terms of the business objectives that are the basis of the strategy.
D. Without understanding the business strategy, it will not be possible to determine the current level of awareness because to be effective, awareness must include understanding the context and threats to the organization’s business objectives.
Senior management commitment and support for information security can BEST be obtained through presentations that:
A. use illustrative examples of successful attacks.
B. explain the technical risk to the organization.
C. evaluate the organization against good security practices.
D. tie security risk to key business objectives.
D. tie security risk to key business objectives.
D is the correct answer.
Justification:
A. Senior management will not be as interested in examples of successful attacks if they are not tied to the impact on business environment and objectives.
B. Senior management will not be as interested in technical risk to the organization if it is not tied to the impact on business environment and objectives.
C. Industry good practices may be important to senior management to the extent they are relevant to the organization and its business objectives.
D. Senior management wants to understand the business justification for investing in security in relation to achieving key business objectives.
The MOST appropriate role for senior management in supporting information security is the:
A. evaluation of vendors offering security products.
B. assessment of risk to the organization.
C. approval of policy statements and funding.
D. developing standards sufficient to achieve acceptable risk.
C. approval of policy statements and funding.
C is the correct answer.
Justification:
A. Evaluation of vendors is a day-to-day responsibility of the information security manager. In some organizations, business management may be involved in vendor evaluation, but their primary role is setting the organization’s direction, oversight and governance.
B. Assessment of risk is a day-to-day responsibility of the information security manager.
C. Policies are a statement of senior management intent and direction. Therefore, senior management must approve them in addition to providing sufficient funding to achieve the organization’s risk management objectives.
D. The development of standards that meet the policy intent is typically a function of the information security manager.
Which of the following would be the BEST indicator of effective information security governance within an organization?
A. The steering committee approves security projects.
B. Security policy training is provided to all managers.
C. Security training is available to all employees on the intranet.
D. IT personnel are trained in testing and applying required patches.
A. The steering committee approves security projects.
A is the correct answer.
Justification:
A. The existence of a steering committee that approves all security projects would be an indication of the existence of a good governance program. To ensure that all stakeholders impacted by security considerations are involved, many organizations use a steering committee comprised of senior representatives of affected groups. This composition helps to achieve consensus on priorities and trade-offs and serves as an effective communication channel for ensuring the alignment of the security program with business objectives.
B. Security policy training is important at all levels of the organization and also an indicator of good governance. However, it must be guided and approved as a security project by the steering committee to ensure all parts of the organization are aware of the policies.
C. The availability of security training, while beneficial to the overall security program, does not ensure that employees are following the program and have the required level of awareness without a process to enforce awareness and compliance.
D. Even organizations with little overall governance may be effective in patching systems in a timely manner; this is not an indication of effective governance.
Information security governance is PRIMARILY driven by:
A. technology constraints.
B. regulatory requirements.
C. litigation potential.
D. business strategy.
D. business strategy.
D is the correct answer.
Justification:
A. Strategy is the plan to achieve the business objectives of the organization that must be supported by governance. While technology constraints must be considered in developing governance and planning the strategy, it is not the driver.
B. Regulatory requirements must be addressed by governance and may affect how the strategy develops. However, regulatory requirements are not the driver of information security governance.
C. Litigation potential is usually an aspect of liability and is also a consideration for governance and when designing the strategy, but it may be a constraint, not a driver.
D. Business strategy is the main determinant of information security governance because security must align with the business objectives set forth in the business strategy.
What is the MOST essential attribute of an effective key risk indicator (KRI)? The KRI:
A. is accurate and reliable.
B. provides quantitative metrics.
C. indicates required action.
D. is predictive of a risk event.
D. is predictive of a risk event.
D is the correct answer.
Justification:
A. Key risk indicators (KRIs) usually signal developing risk but do not indicate what the actual risk is. In that context, they are neither accurate nor reliable.
B. KRIs typically do not provide quantitative metrics about risk.
C. KRIs will not indicate that any particular action is required other than to investigate further.
D. A KRI should indicate that a risk is developing or changing to show that investigation is needed to determine the nature and extent of a risk.
Investments in information security technologies should be based on:
A. vulnerability assessments.
B. value analysis.
C. business climate.
D. audit recommendations.
B. value analysis.
B is the correct answer.
Justification:
A. Vulnerability assessments are useful, but they do not determine whether the cost of the technology is justified.
B. Investments in security technologies should be based on a value analysis and a sound business case.
C. Demonstrated value takes precedence over the current business because the climate is continually changing.
D. Basing decisions on audit recommendations alone would be reactive in nature and might not address the key business needs comprehensively.
Determining which element of the confidentiality, integrity and availability (CIA) triad is MOST important is a necessary task when:
A. assessing overall system risk.
B. developing a controls policy.
C. determining treatment options.
D. developing a classification scheme.
B. developing a controls policy.
B is the correct answer.
Justification:
A. Overall risk is not affected by determining which element of the triad is of greatest importance because overall risk is constructed from all known risk, regardless of the components of the triad to which each risk applies.
B. Because preventive controls necessarily must fail in either an open or closed state (i.e., fail safe or fail secure), and failing open favors availability while failing closed favors confidentiality— each at the expense of the other—a clear prioritization of the triad components is needed to develop a controls policy.
C. Although it is feasible that establishing a control that bolsters one component of the triad may diminish another, treatment options may be determined without a clear prioritization of the triad.
D. Classification is based on the potential impact of compromise and is not a function of prioritization within the confidentiality, integrity and availability (CIA) triad.
Which of the following is characteristic of centralized information security management?
A. More expensive to administer
B. Better adherence to policies
C. More responsive to business unit needs
D. Faster turnaround of requests
B. Better adherence to policies
B is the correct answer.
Justification:
A. Centralized information security management is generally less expensive to administer due to the economies of scale.
B. Centralization of information security management results in greater uniformity and better adherence to security policies.
C. With centralized information security management, information security is typically less responsive to specific business unit needs.
D. With centralized information security management, turnaround can be slower due to greater separation and more bureaucracy between the information security department and end users.
Successful implementation of information security governance will FIRST require:
A. security awareness training.
B. updated security policies.
C. a computer incident management team.
D. a security architecture.
B. updated security policies.
B is the correct answer.
Justification:
A. Security awareness training will promote the security policies, procedures and appropriate use of the security mechanisms but will not precede information security governance implementation.
B. Updated security policies are required to align management business objectives with security processes and procedures. Management objectives translate into policy; policy translates into standards and procedures.
C. An incident management team will not be the first requirement for the implementation of information security governance and can exist even if formal governance is minimal.
D. Information security governance provides the basis for architecture and must be implemented before a security architecture is developed.
Which of the following individuals would be in the BEST position to sponsor the creation of an information security steering group?
A. Information security manager
B. Chief operating officer
C. Internal auditor
D. Legal counsel
B. Chief operating officer
B is the correct answer.
Justification:
A. Sponsoring the creation of the steering committee should be initiated by someone versed in the strategy and direction of the business. Because a security manager is looking to this group for direction, he/she is not in the best position to oversee the formation of this group.
B. The chief operating officer (COO) is highly placed within an organization and has the most knowledge of business operations and objectives. Sponsoring the creation of the steering committee should be initiated by someone versed in the strategy and direction of the business, such as the COO.
C. The internal auditor is an appropriate member of a steering group but would not oversee the formation of the committee.
D. Legal counsel is an appropriate member of a steering group but would not oversee the formation of the committee.
Which of the following factors is the MOST significant in determining an organization’s risk appetite?
A. The nature and extent of threats
B. Organizational policies
C. The overall security strategy
D. The organizational culture
D. The organizational culture
D is the correct answer.
Justification:
A. Knowledge of the threat environment is constantly changing.
B. Policies are written in support of business objectives and parameters, including risk appetite.
C. Risk appetite is an input to the security strategy because the strategy is partly focused on mitigating
risk to acceptable levels.
D. The extent to which the culture is risk adverse or risk aggressive, along with the objective ability of the organization to recover from loss, is the main factor in risk appetite.
Which of the following attributes would be MOST essential to developing effective metrics?
A. Easily implemented
B. Meaningful to the recipient
C. Quantif iably represented
D. Meets regulatory requirements
B. Meaningful to the recipient
B is the correct answer.
Justification:
A. Ease of implementation is valuable when developing metrics, but not essential. Metrics are most effective when they are meaningful to the person receiving the information.
B. Metrics will only be effective if the recipient can take appropriate action based upon the results.
C. Quantifiable representations can be useful, but qualitative measures are often just as useful.
D. Meeting legal and regulatory requirements may be important, but this is not always essential when
developing metrics for meeting business goals.
Which of the following is MOST appropriate for inclusion in an information security strategy?
A. Business controls designated as key controls
B. Security processes, methods, tools and techniques
C. Firewall rule sets, network defaults and intrusion detection system settings
D. Budget estimates to acquire specific security tools
B. Security processes, methods, tools and techniques
B is the correct answer.
Justification:
A. Key business controls are only one part of a security strategy and must be related to business objectives.
B. A set of security objectives supported by processes, methods, tools and techniques together are the elements that constitute a security strategy.
C. Firewall rule sets, network defaults and intrusion detection system settings are technical details subject to periodic change and are not appropriate content for a strategy document.
D. Budgets will generally not be included in an information security strategy. Additionally, until the information security strategy is formulated and implemented, specific tools will not be identified and specific cost estimates will not be available.
An information security manager can BEST attain senior management commitment and support by emphasizing:
A. organizational risk.
B. performance metrics.
C. security needs.
D. the responsibilities of organizational units.
A. organizational risk.
A is the correct answer.
Justification:
A. Information security exists to address risk to the organization that may impede achieving
its objectives. Organizational risk will be the most persuasive argument for management
commitment and support.
B. Establishing metrics to measure security status will be viewed favorably by senior management after the overall organizational risk is identified.
C. The information security manager should identify information security needs based on organizational needs. Organizational or business risk should always take precedence.
D. Identifying organizational responsibilities will be most effective if related directly to addressing organizational risk.
Which of the following roles would represent a conflict of interest for an information security manager?
A. Evaluation of third parties requesting connectivity
B. Assessment of the adequacy of disaster recovery plans
C. Final approval of information security policies
D. Monitoring adherence to physical security controls
C. Final approval of information security policies
C is the correct answer.
Justification:
A. Evaluation of third parties requesting connectivity is an acceptable practice and does not present any conflict of interest.
B. Assessment of disaster recovery plans is an acceptable practice and does not present any conflict of interest.
C. Because senior management is ultimately responsible for information security, it should approve information security policy statements; the information security manager should not have final approval.
D. Monitoring of adherence to physical security controls is an acceptable practice and does not present any conflicts of interest.
Which of the following situations must be corrected FIRST to ensure successful information security governance within an organization?
A. The information security department has difficulty filling vacancies.
B. The chief operating officer approves security policy changes.
C. The information security oversight committee only meets quarterly.
D. The data center manager has final sign-off on all security projects.
D. The data center manager has final sign-off on all security projects.
D is the correct answer.
Justification:
A. Difficulty in filling vacancies is not uncommon due to the shortage of qualified information security professionals.
B. It is important to have senior management, such as the chief operating officer, approve security policies to ensure they meet management intent and direction.
C. It is not inappropriate for an oversight or steering committee to meet quarterly.
D. A steering committee should be in place to approve all security projects. The fact that the data center manager has final sign-off for all security projects indicates that a steering committee is not being used and that information security is relegated to a subordinate place in the organization. This would indicate a failure of information security governance.
Which of the following requirements would have the LOWEST level of priority in information security?
A. Technical
B. Regulatory
C. Privacy
D. Business
A. Technical
A is the correct answer.
Justification:
A. Information security priorities may, at times, override technical specifications, which then must
be rewritten to conform to minimum security standards.
B. Regulatory requirements are government-mandated and, therefore, not subject to override.
C. Privacy requirements are usually government-mandated and, therefore, not subject to override.
D. The needs of the business should always take precedence in deciding information security priorities.
Which of the following is MOST likely to be discretionary?
A. Policies
B. Procedures
C. Guidelines
D. Standards
C. Guidelines
C is the correct answer.
Justification:
A. Policies define management’s security goals and expectations for an organization. These are defined in more specific terms within standards and procedures.
B. Procedures describe how work is to be done.
C. Guidelines provide recommendations that business management must consider in developing practices within their areas of control; as such, they are discretionary.
D. Standards establish the allowable operational boundaries for people, processes and technology.
Security technologies should be selected PRIMARILY on the basis of their:
A. ability to mitigate business risk.
B. evaluations in trade publications.
C. use of new and emerging technologies.
D. benefits in comparison to their costs.
D. benefits in comparison to their costs.
D is the correct answer.
Justification:
A. The most fundamental evaluation criterion for the appropriate selection of any security technology is its ability to reduce or eliminate business risk but only if the cost is acceptable.
B. The technology’s ability to cost-effectively mitigate risk for a particular organization takes precedence over how it is evaluated in trade publications.
C. While new or emerging technologies may offer potential benefits, the lack of being time tested reduces their acceptability in critical areas and by itself will not be the primary selection basis.
D. Investments in security technologies should be based on their overall value in relation to their cost; the value can be demonstrated in terms of risk mitigation.
Which of the following are seldom changed in response to technological changes?
A. Standards
B. Procedures
C. Policies
D. Guidelines
C. Policies
C is the correct answer.
Justification:
A. Security standards must be revised and updated based on the impact of technology changes.
B. Procedures must be revised and updated based on the impact of technology or standards changes.
C. Policies are high-level statements of management intent and direction, which is not likely to be
affected by technology changes.
D. Guidelines must be revised and updated based on the impact of technology changes.
When creating an effective data-protection strategy, the information security manager must understand the flow of data and its protection at various stages. This is BEST achieved with:
A. a third-party vulnerability assessment.
B. a tailored methodology based on exposure.
C. an insurance policy for accidental data losses.
D. a tokenization system set up in a secure network environment.
B. a tailored methodology based on exposure.
B is the correct answer.
Justification:
A. Vulnerability assessments, third-party or otherwise, do not take into account threat and other factors that influence risk treatment.
B. Organizations classify data according to their value and exposure. The organization can then develop a sensible plan to invest budget and effort where they matter most.
C. An insurance policy is a risk treatment option for the transfer/sharing of risk. Whether it is an appropriate action requires a cost-benefit analysis and a more complete understanding of the risk involved.
D. Tokenization is a technique used to protect data, but whether it is appropriate cannot be known without an understanding of the various exposures to which the data are subject.
Which of the following is characteristic of decentralized information security management across a geographically dispersed organization?
A. More uniformity in quality of service
B. Better adherence to policies
C. Better alignment to business unit needs
D. More savings in total operating costs
C. Better alignment to business unit needs
C is the correct answer.
Justification:
A. Uniformity in quality of service tends to vary from unit to unit.
B. Adherence to policies is likely to vary considerably between various business units.
C. Decentralization of information security management generally results in better alignment to business unit needs because security management is closer to the end user.
D. Decentralization of information security management is generally more expensive to administer due to the lack of economies of scale.
Which of the following is the MOST appropriate position to sponsor the design and implementation of a new security infrastructure in a large global enterprise?
A. Chief security officer
B. Chief operating officer
C. Chief privacy officer
D. Chief legal counsel
B. Chief operating officer
B is the correct answer.
Justification:
A. Although the chief security officer knows what is needed, the sponsor for this task should be someone with far-reaching influence across the organization.
B. The chief operating officer is most knowledgeable of business operations and objectives.
C. The chief privacy officer may not have the knowledge of the day-to-day business operations and overall security requirements to ensure proper guidance.
D. The chief legal counsel will typically have a narrow legal focus on contracts and stock and other regulatory requirements and have little knowledge of overall organizational security requirements.
The MOST important element(s) to consider when developing a business case for a project is the:
A. feasibility and value proposition.
B. resource and time requirements.
C. financial analysis of benefits.
D. alignment with organizational objectives.
A. feasibility and value proposition.
A is the correct answer.
Justification:
A. Feasibility and whether the value proposition makes sense will be major considerations of
whether a project will proceed.
B. Resources and time needed are important but will be a component of the value proposition in terms of costs.
C. Financial analysis of benefits is a component of the value proposition, but there would typically be other benefits that should be proposed.
D. The value proposition would, as a matter of course, have to include alignment with the organization’s objectives.