Domain 1 – Security Management Practices Flashcards
Government Classification Terms:
• Unclassified – Neither sensitive nor classified, public release is acceptable • Sensitive But Unclassified (SBU) – Minor secret, no serious damage if disclosed • Confidential – disclosure could cause damage to National Security • Secret - disclosure could cause serious damage to National Security • Top Secret – Highest Level - disclosure could cause exponentially grave damage to National Security
Public Classification Terms
• Public – similar to unclassified, should not be disclosed but is not a problem if it is • Sensitive – data protected from loss of Confidentiality and integrity • Private – data that is personal in nature and for company use only • Confidential – very sensitive for internal use only - could seriously negatively impact the company
Classification Criteria
• Value - number one criteria, if it is valuable it should be protected • Age – value of data lowers over time, automatic de-classification • Useful Life – If the information is made obsolete it can often be de-classified
Personal Association
If the data contains personal information it should remain classified
Distribution may be required in the event of the following:
• Court Order – may be required by court order • Government Contracts – government contractors may need to disclose classified information • Senior Level Approval – senior executives may approve release
Owner
• May be executive or manager • Owner has final corporate responsibility of the data protection • Makes determination of classification level • Reviews classification level regularly for appropriateness • Delegates responsibility of data protection to the Custodian
Custodian
• Generally IT systems personnel • Running regular backups and testing recovery • Performs restoration when required • Maintains records in accordance with the classification policy
User
• Anyone the routinely uses the data • Must follow operating procedures • Must take due care to protect • Must use computing resources of the company for company purposes only
Policies Standards, Guidelines and Procedures
• Policies are the highest level of documentation • Standards, Guidelines and Procedures derived from policies • Should be created first, but are no more important than the rest
Senior Management Statement – general high-level statement
• Acknowledgment of importance of computing resources • Statement of Support for information security • Commitment to authorize lower level Standards, Guidelines and Procedures
Regulatory Policies
Company is required to implement due to legal or regulatory requirements • Usually very detailed and specific to the industry of the organization • Two main purposes • To ensure the company is following industry standard procedures • To give the company confidence they are following industry standard procedures
Advisory Polices
Not mandated but strongly suggested. • Company wants employees to consider these mandatory. • Advisory Policies can have exclusions for certain employees or job functions
Informative Policies
• Exist simply to inform the reader • No implied or specified requirements
Standards, Guidelines and Procedures
• Contain actual detail of the policy • How the policies should be implemented • Should be kept separate from one another • Different Audiences • Security Controls are different for each policy type • Updating the policy is more manageable
Standards
Specify use of technology in a uniform way, compulsory
Guidelines
similar to standards but not compulsory, more flexible
Procedures
Detailed steps, required, sometimes called “practices”, lowest level
Baselines
baselines are similar to standards, standards can be developed after the baseline is established
Roles and Responsibilities-Senior Management
Has ultimate responsibility for security
Roles and Responsibilities-Infosec Officer
Has the functional responsibility for security
Roles and Responsibilities-Owner
Determines the data classification
Roles and Responsibilities-Custodian
Preserves C.I.A.
Roles and Responsibilities-User
Performs in accordance with stated policy
Roles and Responsibilities-Auditor
Examines Security
Identification of Risk
• Actual threat • Possible consequences • Probable frequency • Likely hood of event
Risk Analysis
• Identification of risks • Benefit - cost justification of counter measures
Risk Analysis Terms
• Asset – Resource, product, data • Threat – Action with a negative impact • Vulnerability – Absence of control • Safeguard – Control or countermeasure
Exposure Factor
% of asset loss caused by threat
SLE
Single Loss Expectancy Expected financial loss for single event
ARO
Annualized Rate of Occurrence represents estimated frequency in which threat will occur within one year
ALE
Annualized Loss Expectancy Annually expected financial loss
Risk Analysis
• Risk analysis is more comprehensive than a Business Impact Analysis • Quantitative – assigns objective numerical values (dollars) • Qualitative – more intangible values (data) • Quantitative is a major project that requires a detailed process plan