Domain 5: Summarize elements of effective security governance Flashcards

1
Q

Guidelines

A

Guidelines provide structured recommendations and principles that serve as a framework for guiding decision-making and behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Policies

A

policies create a rigid prescriptive framework of what needs to be done to ensure guidelines are me

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Acceptable use policy

A

An AUP sets the ground rules for how employees and stakeholders can utilize an organization’s resources. It outlines acceptable and unacceptable behaviors, such as appropriate use of email, internet access, and social media, while emphasizing the importance of responsible and ethical use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information security policies

A

Information security policies are policies that define the procedures and controls that protect sensitive information from unauthorized access, data breaches, and cyber threats. They encompass aspects such as access control, data encryption, and password management to ensure data confidentiality, integrity, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Business continuity Plan

A

BCP policies provide a roadmap for organizations to sustain essential operations in the face of disruptions, whether caused by natural disasters, cyberattacks, or other unforeseen events. These policies outline strategies for data backup, disaster recovery, and continuity of critical functions. These policies go together with Continuity-of-Operations Plans (COOPs), outlining strategies for data backup, disaster recovery, and the continuous operation of critical functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Software development cycle

A

An SDLC policy establishes the methodologies and best practices for creating, testing, and deploying software applications. This policy ensures that software projects are managed efficiently, with an emphasis on quality, security, and compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Change Management

A

Change management policies facilitate the adoption of new technologies, processes, or organizational changes. They help maintain stability by defining how changes are proposed, evaluated, and implemented. Effective change management policies minimize disruption and ensure that changes align with strategic objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Software development cycle stages

A

As shown in the diagram, the first stage is software development. It is important to use the most secure programming language for the task at hand

In the next stage of the cycle, the Test block in the diagram, a secure coding freelancer carries out regression testing on the final version of the code to ensure that the application is fit for purpose, meaning the software application meets its intended goals and requirements.

The next phase is Staging, which is the point at which the code becomes an application (though quality assurance must be carried out before it can be rolled out to production). In this stage, the new application is tested with real data in a sandbox environment to ensure that the application meets the original specifications and that all necessary reports are available and complete. Vulnerability scanning is also conducted at this stage, any required changes or patches are applied, and, if quality assurance has been fulfilled, the application is signed off and moved to the next stage.

Finally, in the Production stage, the final block in the diagram, the application is deployed to its end users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Standards

A

Standards provide a common framework for security practices to ensure consistency and alignment with industry best practices and regulatory requirements. Adhering to these standards promotes a security-conscious environment and establishes a foundation for measuring and enhancing security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ISO 27001 Security

A

This is a comprehensive and internationally recognized framework for Information Security Management Systems (ISMSs) that has seen global acceptance, making it a valuable credential for organizations operating on a global scale.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ISO 27002 Guidance on Best Practices

A

ISO 27002 is a collection of security controls and best practices that organizations can implement to secure their information assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ISO 22701 Privacy

A

ISO 27701 is designed to help organizations manage and enhance their privacy practices effectively. It builds upon the foundation of ISO 27001, which is the globally recognized ISMS, a framework for protecting information through policies and controls. It has a privacy-centric approach, recognizing that data privacy is not an afterthought but a fundamental requirement in today’s data-driven world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Privacy Information Management System (PIMS),

A

Is an organizational framework designed to effectively manage and protect individuals’ personal and sensitive information, ensuring compliance with privacy laws and regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ISO/IEC 27017 Cloud Security:

A

ISO/IEC 27017 is the standard for cloud security, focusing on information security controls for cloud services. It provides cloud-specific guidelines for both Cloud Service Providers (CSPs) and cloud service customers and addresses shared security responsibilities between the CSP and the customer to ensure clarity on security measures. The standard also emphasizes risk assessment and management to help organizations identify and mitigate cloud-specific risks effectively. ISO/IEC 27017 aligns with other ISO/IEC standards (such as ISO 27001), streamlining the integration of cloud security into an organization’s broader information security management system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ISO/IEC 27018 Privacy:

A

This is a vital standard for cloud computing, specifically addressing data privacy concerns. It provides guidelines for safeguarding personal data in the cloud, including policies that outline the need for transparency, obtaining consent to access data, data access controls, and secure handling of PII. Compliance with these guidelines instills trust in the organization, assuring customers that their data is protected and all privacy regulations are met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Payment Card Industry Data Security Standard

A

PCI-DSS is a robust security standard designed to safeguard payment card data during transactions. It sets stringent requirements for organizations to protect sensitive financial information, ensuring secure commerce in an evolving digital landscape.

17
Q

Password Managers

A

Password managers allow users to set longer and more complex passwords as they don’t need to remember them, An example of a secure password manager is Bitwarden.

18
Q

Procedures

A

Procedures are a set of documented steps or guidelines designed to standardize and streamline processes within an organization.

19
Q

Playbooks

A

Playbooks are a subset of procedures that are often used in specific contexts such as sales, marketing, disaster recovery, or incident response. They are comprehensive guides that outline actions, strategies, and contingencies for various scenarios. Playbooks equip teams with predefined responses to complex situations to ensure consistency and effective decision-making.

20
Q

Boards

A

: Boards of directors or governing boards are fundamental to governance in numerous organizations, including corporations, non-profits, and educational institutions. These boards are entrusted with setting the strategic direction, overseeing management, and safeguarding stakeholders’ interests. Boards ensure accountability through governance, oversight, transparency, and ethical leadership.

21
Q

Committes

A

Committees are internal task forces within larger governance structures that focus on specific functions or tasks. They play a critical role in breaking down complex governance responsibilities into manageable components. Examples include audit committees, compensation committees, and governance committees. These specialized groups enhance the efficiency and effectiveness of governance by diving deep into specific areas of concern, such as financial compliance, cybersecurity, regulatory compliance, and strategic planning, among others.

22
Q

Centralized and Decentralized
Governments

A

Centralized and decentralized governance structures are at opposite extremes. Centralized governance consolidates decision-making authority at the top, often with a single governing body or individual. In contrast, decentralized governance distributes decision-making across various entities or levels. Finding the right balance between centralization and decentralization depends on the organization’s size, complexity, and objectives. The amount of centralization/decentralization impacts how decisions are made, resources are allocated, and responsibilities are delegated.

23
Q

Data owners

A

Data owners bear the responsibility of safeguarding data and overseeing the enforcement of policies that govern its proper usage to ensure the protection and responsible handling of data.

24
Q

Government Entities

A

: Government entities at various levels are responsible for public governance. These entities (including federal, state, and local governments) create policies, enforce laws, and provide public services. Public governance structures are vital for maintaining law and order, protecting citizens’ rights, and promoting general welfare. They operate within established legal frameworks and democratic principles.

25
Q

Data processor

A

The data processor must handle and process the data on behalf of data controllers. They must adhere to the predetermined instructions and policies set by the controllers and ensure the sanctity of data subject rights and regulatory compliance. They must maintain a record and audit trail for every transaction during data processing so that the auditor can ensure compliance.

25
Q

Data custodian

A

The data custodian is responsible for the secure storage of data in compliance with data privacy regulations such as GDPR, ISO 27701, or HIPAA. The data custodian protects the data by ensuring it is encrypted, stored, and backed up. They implement the organization’s data retention policy and archive data that is outside of the legal data retention regulations

26
Q

Data stewards

A

Data stewards are dedicated to maintaining data quality, diligently identifying and rectifying errors and inconsistencies. They also maintain detailed records and metadata, making data understandable and accessible to users. Beyond quality, they classify data based on sensitivity and collaborate with data custodians to implement the necessary controls for compliance.