Domain 2: Governance and Enterprise Risk Management Flashcards
In a hierarchy of organizational priority, which of the following is the least influential?
A. governance
B. enterprise risk management
C. information risk management
D. information security
Answer: D
See page 28 of the Cloud Security Alliance (CSA) Security Guidance v4.
Which of the following is impossible to outsource?
A. information technology management
B. responsibility for governance
C. financial management
D. audit review
Answer: B
Every organization is responsible for its own governance. See page 28 of the Cloud Security Alliance (CSA) Security Guidance v4.
Organizations can, and often do, outsource the business functions listed in the other answers.
Cloud providers try to manage costs and enable capabilities by __________.
A. leveraging economies of scale
B. arbitrating contract breaches
C. facilitating customer service
D. enhancing public perception
Answer: A
According to the Cloud Security Alliance (CSA) Security Guidance v4 (page 28), cloud providers try to leverage economies of scale for these purposes.
The other answers may, in fact, be things that cloud providers also do, but A is the correct answer according to the Guidance.
Two ways a cloud customer can address governance gaps in the contract include __________ and __________ [select two].
A. refuse service
B. adjust internal processes
C. accept risks
D. appeal to regulators
Answer: B and C
See page 29 of the Cloud Security Alliance (CSA) Security Guidance v4.
What is the customer’s only guarantee of any level of service or commitment from the provider?
A. due diligence
B. the contract
C. regulatory supervision
D. physical force
Answer: B
According to the Cloud Security Alliance (CSA) Security Guidance v4 (page 29), the contract is the only guarantee of service and commitment (aside from legal action).
When reviewing external assessments and audits of a potential cloud provider, it is critical that the customer understands the __________.
A. current rate of inflation
B. type of hypervisor currently in use at the cloud data center
C. competitive market
D. scope of the assessment/audit
Answer: D
The customer should know what the assessment/audit actually reviewed, not just which standard was used as the basis for the review. See page 30 of the Cloud Security Alliance (CSA) Security Guidance v4.
The inflation rate is a measure of the soundness of a particular currency, and doesn’t really have anything to do with audits of cloud providers. The type of hypervisor the provider uses isn’t particularly pertinent, as long as the assessment/audit determined whether the appropriate controls were used to secure it (and that those controls are functioning properly). Knowledge of the market isn’t critical when reviewing an assessment/audit.
Which of the following is not typically considered when determining whether a particular auditor/audit firm is trustworthy?
A. past performance
B. number of auditors involved
C. accreditation/credentials/certification
D. reputation
Answer: B
The size of the audit effort (or audit provider) is not typically indicative of whether the audit is meaningful and trustworthy.
All the other answers are, in fact, reasons to trust a particular auditor/firm. See page 30 of the Cloud Security Alliance (CSA) Security Guidance v4.
Which of the following is an assurance program for cloud customers to review assessments of various cloud providers?
A. the CSA Cloud Controls Matrix (CCM)
B. the CSA Security, Trust, and Risk (STAR) Registry
C. the CSA Consensus Assessments Initiative Questionnaire (CAIQ)
D. the CSA Oblique Inference Program (OIP)
Answer: B
The CSA Security, Trust, and Risk program registry is a centralized collection of cloud provider assessments. (See page 30 of the Cloud Security Alliance (CSA) Security Guidance v4.
The CCM and CAIQ are assessment tools used by providers to create content for the STAR Registry. There is no OIP, which I made up.
Which of the following best describes the way risk is managed in the cloud?
A. the Bell-LaPadula Model
B. covert channel
C. the shared responsibilities model
D. total outsource of risk management
Answer: C
Risk management in the cloud is often described as a shared responsibilities model; the provider is responsible for managing certain risks, while the customer is responsible for others. (See page 30 of the Cloud Security Alliance (CSA) Security Guidance v4.)
The Bell-LaPadula model is an access control model. A covert channel is an attack method for observing target activity. Risk management cannot be totally outsourced.
Enterprise risk management in the cloud often depends on __________ and __________ [select two].
A. documentation
B. financial equity
C. public interest
D. good contracts
E. physical distance
Answer: A and D
The Cloud Security Alliance (CSA) Security Guidance v4 (page 30) specifically notes that good contracts and documentation (from the provider) are essential to enterprise risk management in the cloud.
Neither an equity stake, public interest, nor physical distance of the parties significantly affect risk management.
Who determines the amount of risk tolerance an organization should have?
A. regulators
B. senior management
C. cloud providers
D. government officials
Answer: B
Senior management of each organization will determine the risk tolerance (also referred to as “risk appetite” or “risk threshold”) of a particular organization. (See page 31 of the Cloud Security Alliance (CSA) Security Guidance v4.)
Which common cloud service model typically requires a well-negotiated contract between the provider and customer?
A. IaaS
B. PaaS
C. SaaS
D. BaaS
Answer: C
According to the Cloud Security Alliance (CSA) Security Guidance v4 (page 31), SaaS demonstrates the most critical need for a negotiated contract.
IaaS and PaaS models also require contracts, but those models allow the customer some control of the environment. “BaaS” is not a typical cloud computing model (as defined by NIST/ISO).
SaaS providers are typically either __________or __________ companies.
A. very large or very small
B. domestic or foreign
C. technological or administrative
D. inflated or conflated
Answer: A
According to the Cloud Security Alliance (CSA) Security Guidance v4 (page 31), SaaS providers usually are located at each end of the size spectrum.
“Domestic or foreign” literally includes every company on the planet. “Technological or administrative” describes two of the three common types of security controls. “Inflated or conflated” are meaningless words in this context.
Which common cloud service model is the nearest approximation of a traditional data center?
A. IaaS
B. PaaS
C. SaaS
D. QaaS
Answer: A
According to the Cloud Security Alliance (CSA) Security Guidance v4 (page 32), IaaS is the closest approximation of a traditional data center.
QaaS is not a typical service model type, according to the NIST/ISO definition of cloud computing.
What causes the inflexibility of contracts in the public cloud deployment model?
A. hypervisors
B. regulators
C. inversion
D. multitenancy
Answer: D
Because the public cloud serves many different customers, it would be unrealistic for cloud providers to offer unique contracts for every customer (see page 32 of the Cloud Security Alliance (CSA) Security Guidance v4).
Hypervisors and regulators have little to no bearing on whether customers can negotiate cloud contracts. “Inversion” is a meaningless term in this context.