Domain 1 - Security and Risk management Flashcards
Domain one of CISSP
What is the CIA triad?
1) Confidentiality: Protects information and systems from unauthorised access.
2) Integrity: Protects information and systems from unauthorised modification.
3) Availability: Ensures that information and systems are available for authorised users when needed.
What is Governanace? And what does it hope to gurantee?
Governance ensures:
- Stakeholder needs are clearly outlined.
- Agreed objectives are met
- Direction through prioritisation is set.
- Performance against agreed direction & objectives is being monitored
Governance attempts to guarentee:
- Appropriate processes are adhered to.
- Risks identified are appropriately reduced.
- Leadership have visibility of the security program
What is executive managements responsibiltity with respect to governanace?
- Be informed about security
- Set clear direction to drive policies and strategies
- Set priorities
- Assign management responsibilities
- Obtain assurance from internal and external auditors
What is security managements objective and responsibility?
Objectives:
- Enables the vision of the ogranisation, and as the business changes to to should the security management.
- Ensures assets are appropriately protected with controls
- Validates that policies and standards are implemente
Responsibility:
- CISO responsibile for developing the security strategy, overseeing the security program.
- Obtain senior management commitment
- Ensure risk and business impact assessments are completed, regulatory compliance,
- Develop risk mitigation strategies and security metrics
- Advise on information security
What is the difference between Due care and Due Diligence?
Due Care:
- Refers to the idea of what a resonable person would do to with respect to security in that circumstance
- Negilence is when a lack of due care is provided.
Due Dilgence:
- Refers to the proactive approach to avoiding harm and protecting assets
- e.g background checks, penetration testing, backup testing
What makes up an effective Security program? And what are their responsibilites?
-
Committee - Steering committee includes members from all affected groups and involves integrating them into the organisation
- Decides on initiatives and priortisies information security efforts
- reviews and recommends security policies, reviewes and audits security programme, recommends areas for investment
-
Executive mangement - ensures and organisation functions and supporting infrastructure fufil the security directives regulatory compliance.
- Have clear and visibile involvement, and members advise and co-ordinate their involvement
- Roles - All the people that make up a security program, including security professionals, security admins, information and business owners, auditors, technology people, receptionist, end users,
how do we manageme governance risk and regulatory compliance?
- Governance is the delegation of duties, defining accountability, and evaluating the performance.
- Governance risk is the set of processes to analyse risk and mitigation strategies in line with business objectives.
-
Regulatory compliance require the security professionals need to understand the regulations and laws that apply to their organisation based on industry or local law.
- Best achieved by defining these requirements within the security policies, standards, procedures and guidelines.
- Often requires independant audits to attest to their compliance.
What are the principles of ISO 27001?
The ISO 27000 series outlines how an information security management systems hould be built and maintained, and provides a controls framework by:
- Ensures controls are implemented in a structured manner.
- Developed from BS7799 and then taken over by ISO.
- Attempt to compartmentalise, modulaise the neccessary components: 27001 for ISMS requirements, 27005 Risk management, 27033 Network Security, 27035 incident management
- To achieve certification, third party assess compliance against the ISMS requirements laid out in 27001.
What are some of the controls to provide confidentiality?
Controls:
- Strict access control
- Encrypt data at rest (Whole disk, database)
- Encryption of data in transit (IPSec, SSH and etc)
- Training users on proper data protection methods
What are some of the controls to provide integrity?
Sources of Integrity failures: Intentional alteration, user error, software or hardware error, acts of nature.
Controls:
- Hashing
- Non-repudiation/Digital Signatures
- Access control
- Change management
- Configuration management
- Intrusion detection
What are some of the controls to provide availability?
Sources of availbility failures: Malicious attackers, Component failures, application failures, utility failures.
Controls:
- Redundant components. i.e power, RAID
- High Availability
- Fault tolerence
- Patching of OS/Application vulnerabilitie and flaws
What is the relationship between vulnerability, threat, risk, exposure and control?
- Vulnerability is a weakness in a system that allows a particular threat to comprimise security
- Threat is the potential danger associated with the exploitation of a vulnerability.
- Risk is the likelihood that a threat source exploiting a vulnerabilty and the corresponding impact.
- Exposure is an instance of being exposed to losses from exploitation.
- Control is a countermeasure put into place to mitigate or reduce the potential risk.
What are the three types of controls?
-
Administrative: Soft controls or management
- Security documentation, Data classification and labeling, backgroud checks.
-
Technical controls: Software or hardware components
- Firewall, IDS, encryption
-
Physical control: Protect facilities, personel, and resources.
- security guards, locks, fences
What are the six functions of controls?
- Preventative: Avoid and incident from occuring
- Detective: Identifies and incident occuring
- Corrective: Fixes components or systems after an incident.
- Deterrent: Intended to discourage attackers
- Recovery: Bring the environment back up
- Compensating: Alternative measure of control
What are the principles of COBIT?
- Security controls framework.
- Framework for governance and management developed by ISACA
- Five key principles:
- Meeting Stakeholder needs
- Covering the enterprise end to end
- Applying a single integrated framework
- Enabling a holistic approach
- Seperating governance from management
- Ultimately linked to the stakeholders through a series of transforms or cascading goals.
- Specifies 17 enterprise and 17 IT related goals - remove guesswork
What are the principles of NIST SP 800-53?
- Security controls framework.
- Used in the government (US) sector, Cobit commerical sector
- Outlines the controls that agencies need to be compliant with FISMA.
- Control categories to protect CIA include:
- Management
- Operational
- Technical
What is enterprise architecture?
- Conceptual construct to help individuals understand an organisation in digestable chunks.
- When developing an architecture, stakeholders need to be identified, and then “views” need to be developed to provide the information specific to the perspective of the stakeholder.
- Allows both business and technology people to view the same organisation in ways that make sense, reducing confusion, and optimise business functionality.
How does the Zachman Architecture framework work?
- Enterprise Architecture
- Two dimensional model that uses 6 communication interrogatives (What, How, Where, Who, When and Why?) intersecting with different perspectives (executives, developers) to give holistic view.
- Each row should describe the enterprise completely from that perspective.
- Not Security focused.
- Understand an enterprise in a modular fashion
What are the principles of the TOGAF framework?
- Enterprise Architecture model
- Used to develop the following architectures:
- Business
- Data
- Applications
- Technology
- Uses the Architecture Development Method (ADM), which is an iterative and cyclic process that allows requirements to be reviewed and architectures to be updated.
What are the principles of the DoDAF/MODAF framework?
- Enterprise Architecture framework
- Focus on the command, control, communications, surveillance, reconnaissance systems.
- Different types of devices need to communicate using the same protocol and be interoperable with software components but also use the same data elements.
- MODAF developed by the British MOD, another Enterprise architecutre, based on the DODAF
- Get data in the right format to the right people as soon as possible enable
How does Enterprise Security Architecture work?
- Ensure security is aligned with business practices in a cost effective manner.
- Define security strategy in layers of solutions, and processes across and enterprise strategically, tactically, and operationally.
- Goal is to integrate technology-oriented and business centric security process by linking the administrative, technical and physical controls and integrate these processes into the IT infrastructure, business processes and the organisation culture.
How does SABSA work?
- Enterprise Security Architecure
- Layered framework, 1st layer defining business requirements from a security perspective. Each layer decreases in abstraction and increases in detail and moves from policy to implementation.
- Has a lifecycle model of improvement focusing on:
- Strategic Alignment: Legal requirements met.
- Business enablement: core business processes are integrated into security operating model.
- Process enhancement: allow for process management to be redefined and calibrated.
- Security Effectiveness: determine how security solutions are performing.