Domain 1: Security and Risk Management Flashcards
IAAAA
- Identification
- Authentication
- Authorization
- Accountability
- Auditing
The ISC2 Code of Professional Ethics
Cannons:
PAPA
-Protect society, the common good, necessary public trust and confidence, and the infrastructure
-Act honorably, honestly, justly, responsibly, and legally
-Provide diligent and commitment service to principals
-Advance and protect the profession
The ISC2 Code of Professional Ethics Preamble
The safety and welfare of society and the common good, duty to our principals, and to each other, requires that we adhere, and be seen to adhere, to the highest ethical standards of behavior.
Therefore, strict adherence to this Code of Ethics is a condition of certification.
CIA Triad
Confidentiality
Integrity
Availability
Confidentiality
Only authorized subjects should access and read information.
The opposite is disclosure, and the risk to manage is unauthorized disclosure.
Integrity
Ensuring that information is accurate and complete, only authorized subjects should access and change information.
The opposite is alteration, and the risk is to manage unauthorized alteration.
Availability
Information should be available to authorized users when it’s wanted/needed.
The opposite is destruction, and the risk is to manage unauthorized destruction.
Accountability
Actions of an entity may be traced uniquely to that entity.
NIST 800-33
Assurance
Security measures work as intended
NIST 800-33
Authenticity
The proper attribution of the person who created the information
(Parkerian Hexad)
Utility
The usefulness of the information
(Parkerian Hexad)
Possession of Control
The physical state where the information is maintained
(Parkerian Hexad)
M&A Risks
not knowing, “buying a breach”, introduction of new attack vectors, disgruntled employees, etc.
Security Governance
Set of responsibilities, policies, and procedures related to defining, managing, and overseeing security practices at an organization.
Applying security governance principles
• Aligning information security with the company’s business strategy, goals, mission, and objectives.
• Defining and managing organizational processes to involve information security (e.g., acquisitions, divestitures, and governance committees)
• Developing roles and responsibilities throughout the organization.
• Identifying one or more security control frameworks to align the organization with (the book says so anyway).
• Practice due diligence and due care always.