Domain 5: Summarize elements of effective security compliance Flashcards

1
Q

Compliance Reporting

A

Compliance reporting is a critical component that ensures organizations adhere to regulatory standards, industry best practices, and internal policies. These reports serve as a roadmap to assess an organization’s security posture, identify vulnerabilities, and drive continuous improvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Internal

A

Internal compliance reporting involves the assessment and measurement of an organization’s adherence to its own security policies, standards, and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Policy adherence

A

Internal compliance reports assess the extent to which employees and systems adhere to these policies and highlight any deviations that need attention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Internal Compliance reporting includes

A

Element

Description

Policy adherence

Internal compliance reports assess the extent to which employees and systems adhere to these policies and highlight any deviations that need attention.

Regular auditing

Consistent audits, both automated and manual, are essential for comprehensive internal reporting. Regular assessments help uncover security weaknesses, non-compliance issues, and areas requiring corrective actions.

Incident response evaluation

Incident response evaluation assesses the efficiency of the incident response plan and identifies areas for improvement.

Risk assessment

Internal reporting includes assessing the risks associated with various assets, processes, and systems to prioritize mitigation efforts.

Employee training

Internal compliance reports often measure the effectiveness of training programs and identify areas where further education is necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

External Compliance

A

External compliance reporting focuses on demonstrating an organization’s adherence to external standards, regulations, and industry-specific requirements. These reports are often shared with regulatory bodies, partners, clients, and other stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Regulatory adherence

A

Compliance with specific regulations, such as the General Data Protection Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA), or PCI DSS, is a primary focus of external reporting. Organizations must provide evidence of compliance with these legal requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

External Compliance

A

Regulatory adherence:
Compliance with specific regulations, such as the General Data Protection Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA), or PCI DSS, is a primary focus of external reporting. Organizations must provide evidence of compliance with these legal requirements.

Third-party audits:
External compliance often involves third-party audits and assessments conducted by independent entities. These audits validate an organization’s adherence to established standards and regulations.

Data privacy and protection:
Reports should emphasize the protection of sensitive data, clearly setting out the measures in place to secure personal and financial information and data breach response plans.

Transparency and accountability:
Organizations should exhibit transparency in their compliance efforts. This includes maintaining clear records of compliance activities, audit results, and corrective actions taken.

Client and partner assurance:
External compliance reports serve to reassure clients, partners, and stakeholders that the organization takes its security obligations seriously. This trust-building aspect is crucial for maintaining strong business relationships.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Non compliance

A

Non-compliance is the act of failing to meet established rules, regulations, or standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Compliance Monitoring

A

Compliance monitoring verifies that organizations adhere to laws, regulations, and standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attestation

A

Attestation and acknowledgment involve the formal recognition and affirmation of an organization’s commitment to compliance. Attestation signifies that an organization acknowledges its responsibilities and will adhere to the prescribed regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Automation

A

Automation has become a game-changer in compliance monitoring. Robust software solutions and tools streamline compliance assessments, data tracking, and reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data rights

A

Data privacy upholds the fundamental right to personal autonomy and empowers individuals to control their own information, ensuring that their personal details, preferences, and choices remain confidential and protected from misuse. By ensuring that personal data is handled securely, data privacy measures mitigate the risks associated with cybercrime and data breaches, shielding individuals from identity theft, fraud, and unauthorized surveillance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Subjects

A

The data subject is anyone whose personal information is being collected and stored, and the rights and protections of the data subject depend on which privacy regulations are applicable to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data controller

A

The data controller’s duties include writing the policies that relate to data collection and processing, adhering to up-to-date regulations for each type of data, and ensuring that data subjects are acknowledged, their permission to use the data is granted, and all necessary procedures related to privacy notices are correctly implemented in their policies, promoting transparency and data protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data Processor

A

the other hand, must handle and process the data on behalf of data controllers, adhere to the predetermined instructions and policies set by the controllers, and ensure the sanctity of data subject rights and regulatory compliance. The data processor is also responsible for keeping a record and an audit trail for every transaction made during data processing so that the auditor can ensure compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data inventory

A

Maintaining a data inventory involves the systematic cataloging of data, including its location, type, and usage. This process allows organizations to meet regulatory requirements, assess data security risks, and demonstrate compliance during audits.

17
Q

Right to be forgotten:

A

Individuals’ right to have their data erased

18
Q

Internal audits

A

are a vital part of an organization’s governance framework, serving several crucial purposes

19
Q

Purpose,process and reporting compliance

A

Purpose: Compliance audits aim to verify that the organization is conducting its activities in accordance with the applicable rules and regulations.
Process: Compliance audits may review financial transactions, operational protocols, and employee activities to assess adherence to regulations.
Reporting: The findings of compliance audits are typically reported to senior management and the audit committee. This information is essential for decision-making and ensuring that the necessary corrective actions are take

20
Q

Purpose,Process,reporting audit

A

Purpose: The audit committee’s primary purpose is to provide oversight, governance, and an additional layer of assurance that the organization’s internal audit function is effective.
Process: The committee meets regularly with internal auditors to review audit plans, discuss findings, and ensure that the organization is addressing identified issues appropriately.
Reporting: The audit committee reports its findings and recommendations to the board of directors, which informs a wide range of strategic decisions that are essential for the organization’s overall performance, sustainability, and adherence to ethical and legal standards. It helps the board of directors make informed choices that align with the company’s mission and goals while maintaining its reputation and integrity.

21
Q

Self assessment

A

Purpose: Self-assessments aim to identify and address internal weaknesses, streamline processes, and foster a culture of self-improvement within the organization.
Process: Internal stakeholders (often with the guidance of internal auditors) assess various aspects of the organization, such as operational efficiency, quality control, and risk management.
Reporting: The outcomes of self-assessments are typically used internally, and the findings help guide decisions aimed at improving internal processes and operations.

22
Q

External audits

A

External audits are a critical aspect of financial oversight, governance, and accountability for organizations across various industries

23
Q

Regulatory

A

Purpose: Regulatory compliance audits confirm that the organization is following the rules and regulations applicable to its industry.
Process: Auditors examine financial records, operational practices, and internal controls to assess the organization’s adherence to specific regulatory requirements.
Reporting: The findings of regulatory compliance audits are reported to both internal management and external stakeholders (including regulatory authorities) to demonstrate compliance and initiate corrective actions if necessary.

24
Q

Detailed Examinations

A

Purpose: Detailed examinations aim to verify the completeness and accuracy of financial records and reduce the risk of financial misstatements or errors.
Process: Auditors review financial statements, transactions, and supporting documentation to ensure that they conform to Generally Accepted Accounting Principles (GAAPs) or International Financial Reporting Standards (IFRSs).
Reporting: The results of detailed examinations are included in audited financial statements, which are made available to shareholders, investors, and the public to provide an accurate representation of the organization’s financial health

25
Q

Assessment

A

Purpose: Assessments are intended to enhance operational efficiency, risk mitigation, and the overall effectiveness of internal controls.
Process: Auditors analyze internal control systems, risk management procedures, and governance structures to ensure they are resilient and aligned with best practices.
Reporting: Assessment findings are communicated to senior management and the board of directors, along with recommendations for improvements to internal controls and risk management practices.

26
Q

Third-Party Audit

A

Purpose: Independent third-party audits establish credibility and trust by providing an impartial evaluation of an organization’s financial statements, operations, and compliance.
Process: Auditors follow a rigorous and standardized audit process, which includes risk assessment, testing, and validation of financial statements and controls.
Reporting: The auditors’ report, issued at the conclusion of the audit, provides an objective opinion on the fairness of the financial statements and the effectiveness of internal controls

27
Q

Physical Pen test

A

Physical: Essentially checking the company’s physical infrastructure, physical penetration testing could be physically hacking into a security system or breaking into the building where servers are kept.

28
Q

Offensive Pen test

A

Offensive: Offensive penetration testing is a simulated attack approach performed by testers (often referred to as “ethical hackers”) to uncover vulnerabilities and weaknesses in an organization’s defenses. This could also be known as the red team in team exercises (see Chapter 25, Explain the processes associated with third-party risk assessment and management).

29
Q

Defensive

A

: Defensive penetration testing, on the other hand, focuses on assessing an organization’s readiness to defend against cyberattacks. It seeks to assess the efficiency of security measures and the effectiveness of incident response procedures. This is your blue team in team exercis

30
Q

Integrated

A

This approach combines various aspects of penetration testing, including an evaluation of both physical and digital security measures, to provide a holistic view of an organization’s security posture.

31
Q

Partially known environment

A

Penetration testers are given limited information about the organization’s systems and infrastructure in a partially known environment. This simulates a scenario where an attacker has acquired some knowledge about the target but not all. These could be the gray hat hackers.

32
Q

Unknown environment

A

In an unfamiliar setting, penetration testers operate without prior information about the organization’s systems, infrastructure, or security protocols. This simulates an attacker with no inside information attempting to breach the organization. These could be black hat hackers.

33
Q

Reconnaissance

A

Reconnaissance is a useful tool in the armory of penetration testers to help assess their target and any potential vulnerabilities that they can exploit. Reconnaissance comes in two varieties: active and passive.

34
Q

Passive reconnaissance

A

Passive reconnaissance aims to gather initial data about the target without alerting or engaging with its systems.

35
Q

Active Reconnaissance

A

active reconnaissance is focused on discovering vulnerabilities and potential points of attack within the target’s systems or network infrastructure

36
Q

Adware

A

Automatically displays or downloads advertising material

37
Q

California Consumer Privacy Act

A

California legislation empowering consumer data rights and privacy.

38
Q

ECDSA

A

ECDSA does the same thing as any other digital signing signature, but more efficiently.

39
Q

Boards

A

Boards of directors or governing boards are fundamental to governance in numerous organizations, including corporations, non-profits, and educational institutions. These boards are entrusted with setting the strategic direction, overseeing management, and safeguarding stakeholders’ interests.