Domain 2: Determining Data Security Controls Flashcards
System has been approved to meet the security requirements of the data owner
Certification
Data owner’s acceptance of the certification and of the residual risk
Accreditation
Risk Management framework from Carnegie Mellon University
Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE)
What’s the three phase process for managing risk according to OCTAVE?
Phase 1 - Identify staff knowledge, assets, and threats
Phase 2 - Identify vulnerabilities and evaluate safeguards
Phase 3 - Conduct the risk analysis and develop the risk mitigation strategy
- Internationally agreed-upon standard for describing and testing the security of IT products
- Replaced the TCSEC (US) and ITSEC (Europe)
International Common Criteria
- The system or product that is being evaluated
- International Common Criteria term
Target of Evaluation (ToE)
- Documentation describing the ToE, including the security requirements and operational environment
- International Common Criteria term
Security target
- Independent set of security requirements and objectives for a specific category of products or systems, such as firewalls or intrusion detection systems
- International Common Criteria term
Protection Profile
- The evaluation score of the tested product or system
- International Common Criteria term
Evaluation Assurance Level (EAL)
- Functionally tested
- International Common Criteria Evaluation Assurance Level (EAL)
EAL1
- Structurally test
- International Common Criteria Evaluation Assurance Level (EAL)
EAL2
- Methodically tested and checked
- International Common Criteria Evaluation Assurance Level (EAL)
EAL3
- Methodically, designed, tested and reviewed
- International Common Criteria Evaluation Assurance Level (EAL)
EAL4
- Semi Formally designed and tested
- International Common Criteria Evaluation Assurance Level (EAL)
EAL5
- Semi Formally verified, designed and tested
- International Common Criteria Evaluation Assurance Level (EAL)
EAL6