Domain 5 - Information Governance Flashcards
True/False: The primary goal of information security is to protect the fundamental data that powers our systems
and applications
The primary goal of information security is to protect the fundamental data that powers our systems
and applications
This refers to ensuring the use of data and information complies with organizational policies, standards and strategy — including regulatory, contractual, and business objectives.
Information/Data Governance
True/False:Information governance includes the corporate structures and controls we use to ensure we handle data in accordance with our goals and requirements.
True
What are the aspects or factors impacting information/data governance when storing data in the cloud?
- Multi-tenancy
- Shared Security Responsibility
- Jurisdictional boundaries and sovereignty
- Compliance, regulations and privacy policies
- Destruction and removal of data
______ , as the name says, is about who owns the data while _________ refers to who is managing the data
Ownership, Custodianship
What are the governance domains affected by Cloud Computing?
- Information Classification
- Information Management Policies
- Location and Jurisdiction Policies
- Authorisations
- Ownership and Custodianship
- Privacy
- Contractual Controls
- Security Controls
_______ is a sum of regulatory requirements, contractual obligations, and commitments
to customers (e.g. public statements). You need to understand the total requirements and
ensure information management and security policies align.
Privacy
______ is your legal tool for extending governance requirements to a third
party, like a cloud provider
Contractual Controls
_______ are the tool to implement data governance. They change significantly in cloud computing.
Security controls
True/False: Information Lifecycle Management is a fairly mature field, it does map well to the
needs of security professionals
False. Life cycle mamangement doesn’t map well to the needs of security professionals
______ is simply a tool to help understand the security boundaries and controls around data. It’s not meant to be used as a rigorous tool for all types of data. It’s a modeling tool to help evaluate data security at a high level and find focus points.
Data Security Lifecycle
What are the six phases of Data Security Lifecycle?
- Create
- Store
- Use
- Share
- Archive
- Destroy
True/False. The data security lifecycle represents the phases information passes through but doesn’t address its location or how it is accessed.
True
In data security lifecycle, this refers to who and how of accessing data
Entitlement
True/False: Data is accessed and stored in multiple locations, each with its own lifecycle.
True