Domain 6 Flashcards

1
Q

What occurs when a customer is dissuaded from leaving a provider even when it’s the best decision?

A

Vendor lock-in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s an industry standard that provides guidance for eDiscovery programs?

A

ISO 27050

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What provides industry standard guidance for information privacy programs?

A

ISO 27701

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who is the entity that uses the data on behalf of the owner/controller?

A

Data processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Who is the person the PII describes?

A

Data subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Who is the entity that creates the PII?

A

Data owner/controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Who are entities that regulate the use of PII?

A

Regulators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is it proper to script a testimony in court?

A

No, but coaching is okay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is deploying a firewall a risk mitigation strategy?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

________ is a strategy where an organization decides to accept the potential risks and associated outcomes of a particular security threat rather than avoiding or mitigating it

A

Risk acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a metric that indicates the degree to which your organization requires its information to be protected against confidentiality leaks or compromised data integrity?

A

Risk tolerance - how much risk you can tolerate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is when an org completely avoids the activity that carries the potential risk.

A

Risk avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This is when you transfer the risk to another party when accepting or avoiding the risk yourself is not feasible

A

Risk transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If the risk then happens, the responsibility or loss will not fall solely on one party.

A

Risk sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the act of adding extra resources, time, or personnel to mitigate the potential impact of a risk.

A

Risk buffering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Involves creating a contingency plan or “Plan B” for certain risks.

A

Risk strategizing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This is the performance of tests (usually many tests) to verify that a project is secure and functions as intended.

A

Risk testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This allows an organization to determine the potential financial implications of a risk event.

A

Risk quantification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This is the implementation of risk controls to mitigate potential hazards or bad outcomes that may arise during a project or with an enterprise.

A

Risk reduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This uses digital tools and technologies to transform how businesses recognize, evaluate, control, and reduce risks.

A

Risk digitization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What function tests the effectiveness of controls?

A

Audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

This is when you communicate a change in privacy practices to customers.

A

Notice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

This is when you offer customers an opportunity to opt out of use of their data.

A

Choice and consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

This principle says individuals should be able to review and update their personal information.

A

Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

T/F: SOX is applicable to all companies.

A

False, only publicly traded companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What protects your personal student information?

A

FERPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What happens when an org decides that taking no action is the most beneficial route to managing a risk?

A

Risk acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What standard applies only to financial institutions but regulates privacy of customers financial info?

A

GLBA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What’s the proper course of action when records are not available?

A

Write a statement of scope limitation that describes issue and impact on the audit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What prohibits entities w/in a country that has no nationwide privacy laws from gathering or processing privacy data belonging to EU citizens?

A

GDPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  1. Their country has no laws that comply w/ EU laws
  2. Entity creates contractual language that complies w/ EU laws and has language approved by each EU country from which the entity wishes to gather citizen data.
  3. Entity voluntarily subscribes to its own nation’s privacy shield program
A

Conditions that allow gathering/processing privacy data for EU citizens for GDPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What’s used to capture the impact on intangible factors such as customer confidence, employee morale, and reputation in a BIA?

A

Qualitative tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are audit standards for service providers?

A

SAS 70 and SSAE 18

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

_________ are how SSAE 18 audits are conducted.

A

SOC reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What’s the way to verify that an organization is following some specific best practices before you outsource a business function to that organization.

A

SOC (service organization controls) report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What report is based on the Trust Services Criteria (formerly known as the Trust Service Principles) established by the AICPA and focuses on:

Security
Availability
Processing integrity
Confidentiality
Privacy

A

SOC 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What report evaluates the management’s description of a service organization’s system and the suitability of the design and operating effectiveness of controls over an extended period of time.

A

SOC2 Type2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What report evaluates the management’s description of a service organization’s system and the suitability of the design of controls at a specific point in time.

A

SOC2 Type1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is the current AICPA audit standard?

A

SSAE 18

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What law helps ensure public companies engage in non-deceptive business accounting practices.

A

SOX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What requires publicly traded companies doing business in the U.S. to establish financial reporting standards, including safeguarding data, tracking attempted breaches, logging electronic records for auditing, and proving compliance.

A

SOX compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Does digital forensics include creation of data?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

This includes reviewing the organization’s current position/performance as revealed by an audit against a given standard.

A

Gap analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

This is a method of assessing the performance of a business unit to determine whether business requirements or objectives are being met

A

Gap analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What’s a good tool for analyzing financial risk?

A

Quantitative risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What’s a good tool for intangible risks?

A

Qualitative risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What describes privacy requirements for cloud providers, including annual audit mandate?

A

ISO 27018

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What does NIST SP 800-37 describe?

A

Risk management framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

SSN, DL#, state ID#, credit/debit #, bank acct #, medical records, health insurance info are all covered by _____.

A

California’s data breach notification law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What gives a customer better assurance of not being constrained to a given provider?

A

When the customer can ensure their data will not be ported to a proprietary data format or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

T/F: A platform-agnostic data set is less portable and more subject to vendor lock in.

A

False, it’s more portable and less subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

The ease and speed at which a customer can access their own data can influence:

A

How readily the data might be moved to another provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What’s the greatest motivating factor for a provider to meet SLAs?

A

financial penalties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What’s the quantitative analysis of all risks facing an organization and their potential impact?

A

Org’s risk profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What’s the amount of risk an org is willing to accept?

A

Risk appetite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

T/F: Risk appetite is a conceptual target, whereas risk profile is an assessment of the actual situation.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What addresses the privacy aspect of cloud computing for consumers and was the first international set of privacy controls in the cloud?

A

ISO 27018

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What documents a relationship b/w two orgs?

A

memorandum of agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is required to prevent possible destruction of pertinent evidence?

A

litigation hold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

PHI is a form of PII that includes _____.

A

health info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What’s the risk that a vendor will not be able to continue operations and a shutdown will adversely impact customers?

A

Vendor viability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is it called when a vendor prevents a customer from gaining access to their info?

A

vendor lockout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What lowers the probability or impact of risk occuring?

A

Risk mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What addresses issues of data confidentiality?

A

NDAs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Forbids the transfer of data to countries that lack adequate privacy protections

A

GDPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Requires CSPs to hand over data to aid in investigation of serious crimes, even if stored in another country.

A

Clarifying Lawful Overseas Use of Data (CLOUD) Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

US companies can’t export to Cuba, Iran, North Korea, Sudan, and Syria.

A

Computer export controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Dept of Commerce details limitations on export of encryption products outside the US.

A

Encryption export controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

The basis for privacy rights is in the Fourth Amendment to the U.S. Constitution.

A

Privacy US

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Legal rules that are created by government entities, such as legislatures/congress.

A

Laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Rules that are created by governmental agencies.

A

Regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Dictate a reasonable level of performance. They can be created by an organization for its own purposes (internal) or come from industry bodies or trade groups (external).

A

Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

A set of guidelines helping organizations improve their security posture.

A

Frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

7 articles of constitution

A

I - legislative
II - executive
III - judicial
IV - defines relationship b/w state/fed gov
V - amending constitution
VI - constitution is supreme law of land
VII - establishes federal gov

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Interpretations made by courts over time establish a body of law that other courts may refer to when making their own decisions.

A

case law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Is a set of judicial precedents passed down as case law through many generations.

A

common law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

_____ means “responsible or answerable in law; legally obligated”.

A

Liable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Occurs when one person claims that another person has failed to carry out a legal duty that they were responsible for.

A

Civil liability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Civil cases are brought to court by one party, called the _____, who is accusing another party of a violation, called the _____.

A

claimant / respondent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Are another form of civil violation that do not involve a contract but instead, involve harm to one party caused by the actions of another party.

A

torts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Is a commonly occurring tort that occurs when one party causes harm to another party by their action or lack of action.

A

negligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

The person accused of negligence must have an established responsibility to the accuser.

A

duty of care

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

The basis for privacy rights is in the _____ to the U.S. Constitution.

A

Fourth Amendment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Cuba, Iran, North Korea, Sudan, and Syria are all countries the ______.

A

US can’t export to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

_____ are the legal rules that are created by government entities, such as legislatures/congress.

A

Laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

_____ are the rules that are created by governmental agencies.

A

Regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

_____ dictate a reasonable level of performance.

A

Standards - they can be internal or external

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

_____ are a set of guidelines helping organizations improve their security posture.

A

Frameworks

89
Q

_____ policies, procedures, and regulations that govern the daily operations of government and government agencies.

A

Administrative law - HIPPA

90
Q

Article I establishes the _____ branch.

A

legislative

91
Q

Article II establishes the _____ branch.

A

executive

92
Q

Article III establishes the _____ branch.

A

judicial

93
Q

Article IV defines the relationship between the _____

A

federal government and state governments

94
Q

Article V creates a process for _____

A

amending the Constitution

95
Q

Article VI contains the supremacy clause, establishing that _____

A

the Constitution is the supreme law of the land.

96
Q

Article VII sets forth the process for _____

A

the initial establishment of the federal government.

97
Q

Treated as private disputes between parties and handled in civil court.

A

Contract law

98
Q

_____ occurs when one person claims that another person has failed to carry out a legal duty that they were responsible for.

A

Civil liability

99
Q

Civil cases are brought to court by one party, called the _____, who
is accusing another party of a violation, called the _____.

A

claimant / respondent

100
Q

Another form of civil violation that do not involve a contract but
instead, involve harm to one party caused by the actions of another party.

A

torts

101
Q

A commonly occurring tort that occurs when one party causes harm to another party by their action or lack of action.

A

negligence

102
Q

The accuser must have suffered some type of harm, be it financial, physical, emotional, or reputational.

A

damages

103
Q

A reasonable person must be able to conclude that the injury caused to the accuser must be a result of the breach of duty by the accused.

A

causation

104
Q

All of the following rest with:
Responsibility for compliance with laws and regulations
Researching and planning response in case of conflicting laws
Ensuring necessary audit and incident response data islogged and retained
Any additional due diligence and due care

A

the customer

105
Q

An international organization comprised of 38 member states from around the world, publishes guidelines on data privacy.

A

OECD - org for economic co-operation and development

106
Q

Comprised of 21 member economies in the Pacific Rim. Incorporates many standard privacy practices into their guidance, such as preventing harm, notice, consent, security, and accountability.

A

asia-pacific economic cooperation privacy framework

107
Q

Mandates privacy for individuals, defines companies’ duties to protect personal data, and prescribes punishments for companies violating these laws. Includes mandatory notification timelines in the event of data breach.

A

GDPR

108
Q

1996 U.S. law regulates the privacy and control of health information data.

A

HIPPA

109
Q

An industry standard for companies that accept, process, or receive payment card transactions.

A

PCI DSS

110
Q

Exists to solve the lack of an US equivalent to GDPR, which impacts rights and obligations around data transfer.

A

Privacy Shield

111
Q

Law was enacted in 2002 and sets requirements for U.S. public companies to protect financial data when stored and used.

A

SOX

112
Q

____ are required by law.

A

statutory requirements

113
Q

_____ may also be required by law but refer to rules issued by a regulatory body that is appointed by a government entity .

A

regulatory requirements

114
Q

_____ are required by a legal contract between private parties. These agreements often specify a set security controls or a compliance framework that must be implemented by a vendor

A

contractual requirements

115
Q

3 important considerations to include in maintaining ____ are 1) vendor selection, 2) architecture, 3) due care obligations

A

chain of custody

116
Q

When considering a cloud vendor, eDiscovery should be considered as a ____ during the selection and contract negotiation phases.

A

security requirement

117
Q

The burden of recording and preserving potential evidence is the responsibility of _____.

A

customer

118
Q

_____ provide guidance on best practices for collecting digital evidence and conducting forensics investigations in the cloud.

A

ISO/IEC and CSA

119
Q

Addresses common issues and solutions needed to address Digital Forensics and Incident Response (DFIR) in cloud environments.

A

NIST 8006

120
Q

Guide for digital evidence analysis.

A

ISO 27042

121
Q

Guide for incident investigation principles and processes

A

ISO 27043

122
Q

In any cloud computing environment, the legal responsibility for
data privacy and protection rests with _____

A

the cloud consumer

123
Q
  • Transferring entity (the data owner) must ensure that the receiver of the data holds and processes it in accordance with the principles of Australian privacy law.
  • Data owner (controller) is responsible for data privacy commonly achieved through contracts that require recipients to maintain or exceed the data owner’s privacy standards
A

Australian Privacy Act

124
Q

The ____ remains responsible for any data breaches by or on behalf of the recipient entities in Australia.

A

entity transferring the data out

125
Q

A national level law that restricts how commercial businesses may collect, use, and disclose personal information and covers information about an individual that is identifiable to that specific individual.

A

Personal Information Protection and Electronic Documents Act (PIPEDA)

126
Q

The right to be informed
The right of access
The right to rectification
The right to erasure (the right to be forgotten)
The right to restrict processing
The right to data portability
The right to object
Rights in relation to automated decision making and profiling

A

GDPR

127
Q

Deals with the handling of data while maintaining privacy and rights of an individual.It is international as it was created by the EU, which has 27 different countries as members, and applies to ANY company with customers in the EU. Includes a 72 hour notification deadline in the case of data breach

A

GDPR

128
Q

Focuses on services of banks, lenders, and insurance and severely limits services they can provide and the information they can share with each other

A

GLBA

129
Q
  • The Financial Privacy Rule, which regulates the collection and disclosure of private financial information
  • The Safeguards Rule, which stipulates that financial institutions must implement security programs to protect such information
  • The Pretexting provisions, which prohibit the practice of pretexting (accessing private information using false
A

3 main sections of GLBA

130
Q

An international agreement between the United States (U.S.) and the European Union that allows the transfer of personal data from the European Economic Area (EEA) to the U.S. by U.S. based companies.

A

Privacy Shield

131
Q

Notice
Choice
Security
Access
Accountability for onward transfer
Data integrity and purpose limitation
Recourse, enforcement, and liability

A

7 principles of privacy shield agreement

132
Q

Created privacy protection for electronic communications like email or other digital communications stored on the Internet and extends the Fourth Amendment of the U.S. Constitution to the electronic realm

A

The Stored Communication Act (SCA) of 1986

133
Q

Details the people’s “right to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures”

A

4th amendment

134
Q

Under HIPAA, PHI may be stored by cloud service providers as long as

A

the data is adequately protected

135
Q
  • Aids in evidence collection in investigation of serious crimes
  • Created in 2018 due to the problems that FBI faced in forcing Microsoft to hand over data stored in Ireland.
  • Requires U.S. based companies to respond to legal requests for data no matter where the data is physically located.
A

Clarifying Lawful Overseas Use of Data (CLOUD) Act

136
Q
  • Was published in July 2014 as a component of the ISO 27001 standard.
  • Adherence to these privacy requirements enables customer trust in the CSP.
  • Major CSPs such as Microsoft, Google, and Amazon all maintain
A

ISO 27018

137
Q

Consent: Personal data obtained by a CSP may not be used for marketing purposes unless expressly permitted by the subject. A customer should be permitted to use a service without requiring this consent.
Control: Customers shall have explicit control of their own data and how that data is used by the CSP.
Transparency: CSPs must inform customers of where their data resides AND any subcontractors that may process personal data.
Communication: Auditing should be in place, and any incidents should be communicated to customers.
Audit: Companies (CSP, in this case) must subject themselves to an independent audit on an annual basis.

A

ISO 27018

138
Q

Widely incorporated into the SOC 2 framework as an optional criterion. Organizations that pursue a SOC 2 audit can include these privacy controls if appropriate. Similar to ISO 27018, which is an optional extension of the controls defined in ISO 27002. An audit of these controls results in a report that can be shared with customers or potential customers, who can use it to assess a service provider’s ability to protect sensitive data.

A

Generally Accepted Privacy Principles (GAPP)

139
Q
  1. Management - The organization defines, documents, communicates, and assigns accountability for its privacy policies and procedures.
  2. Notice - The organization provides notice of its privacy policies and procedures. The organization identifies the purposes for which personal information is collected, used, and retained.
  3. Choice and consent - The organization describes the choices available to the individual, and secures implicit or explicit consent regarding the collection, use, and disclosure of the personal data.
  4. Collection - Personal information is collected only for the purposes identified in the notice provided to the individual.
  5. Use, retention, and disposal - The personal information is limited to the purposes identified in the notice the individual consented to.
  6. Access - The organization provides individuals with access to their personal information for review or update.
  7. Disclosure to third parties - Personal information is disclosed to third parties only for the identified purposes and with implicit or explicit consent of the individual.
  8. Security for privacy - Personal information is protected against both physical and logical unauthorized access.
  9. Quality - The organization maintains accurate, complete, and relevant personal information that is necessary for the purposes identified.
  10. Monitoring and enforcement - The organization monitors compliance with its privacy policies and procedures. It also has procedures in place to address privacy related complaints and disputes.
A

Generally Accepted Privacy Principles (GAPP)

140
Q

This is designed to identify the privacy data being collected, processed, or stored by a system, and assess the effects of a data breach

A

A privacy impact assessment (PIA)

141
Q

assessment scope, data collection methods, and plan for data retention

A

Things you need to define to conduct a PIA

142
Q

A methodical examination of an environment to ensure compliance with regulations and to detect abnormalities, unauthorized occurrences, or outright crimes.

A

auditing

143
Q

Auditing is a _____ control.

A

detective

144
Q

Security audits and effectiveness reviews are key elements in displaying _____.

A

due care

145
Q

Acts as a “trusted advisor” to the organization on risk, educating stakeholders, assessing compliance

A

internal auditor

146
Q

Can provide more continuous monitoring of control effectiveness and policy compliance

A

internal audit

147
Q

Audits of controls over the hypervisor will usually be the purview of the _____

A

CSP

148
Q

VMs deployed on top of hardware are usually owned by the _____

A

customer

149
Q

This is a set of standards defined by the AICPA (American Institute of CPAs). Designed to enhance the quality and usefulness of System and Organization Control (SOC) reports. Includes audit standards and suggested report formats to guide and assist auditors.

A

SSAE 18

150
Q

Deals mainly with financial controls and are used primarily by CPAs auditing financial statements

A

SOC1

151
Q

Report that assesses the design of security processes at a specific point in time

A

SOC2Type1

152
Q

Assesses how effective those controls are over time by observing operations for at least six months. Often require an NDA due to sensitive contents.

A

SOC2Type2

153
Q

Contain only the auditor’s general opinions and non sensitive data, is publicly shareable

A

SOC3

154
Q

Who issues ISAE

A

International Auditing and Assurance Standards Board

155
Q

The ISAE 3402 standard is roughly equivalent to the _____ reports in the SSAE

A

SOC 2

156
Q
  • Can be used by cloud service providers, cloud customers, or auditors and consultants
  • Designed to demonstrate compliance to a desired level of assurance
  • STAR consists of two levels of certification, which provide increasing levels of assurance
A

Security Trust Assurance and Risk (STAR) certification program comes from CSA

157
Q

This is a complimentary offering that documents the security controls provided by the CSP

A

STAR Level 1 self-assessment

158
Q

This requires the CSP to engage an independent auditor to evaluate the CSP’s controls against the CSA standard

A

STAR Level 2 third party audit

159
Q

Determining the scope of an audit is usually a joint activity performed by

A

the organization being audited and their auditor.

160
Q

Document and define audit program objectives
Gap analysis or readiness assessment
Define audit objectives and deliverables
Identifying auditors and qualifications

A

audit planning activities

161
Q

Audit fieldwork:
Audit reporting:
Audit follow up:

A

audit phases

162
Q

Quantify risk
Develop and execute risk mitigation strategies
Provide formal reporting on status of mitigation efforts

A

ISMS functions

163
Q

A process of matching applicable controls with the organization’s specific circumstances to which they apply.

A

Tailoring

164
Q

A set of standardized definitions for employees that describe how they are to make use of systems or data.

A

Functional policy

165
Q

Acceptable use
Email use
Passwords and access management
Incident response
Data classification
Network services
Vulnerability scanning
Patch management

A

Functional policies example

166
Q

Policies related to proper use of company resources, like expense reimbursements and travel

A

Organizational policies

167
Q

regulates organizations involved in power generation and distribution.

A

NERC/CIP - north american electric reliability corporation critical infrastructure protection

168
Q

the act of picking a subset of the system’s physical infrastructure to inspect.

A

sampling

169
Q

Whether a supplier has a risk management program in place, and if so whether the risks identified by that program are being adequately mitigated are primary focus areas in _____.

A

SCRM

170
Q

T/F: Unlike traditional risk management activities, SCRM in a CSP scenario often requires customers to take an indirect approach –reviewing audit reports.

A

True

171
Q

Describes the risk present in the organization based on all the identified risks and any associated mitigations in place.

A

Risk profile

172
Q

Describes the amount of risk an organization is willing to accept without mitigating.

A

Risk appetite

173
Q

Regulated industries will be more apt to:

A

mitigation , transference , and avoidance

174
Q

Smaller orgs and startups will be more apt to simply _____ risks to avoid cost of treatment.

A

accept

175
Q

Anyone who processes personal data on behalf of the data controller.

A

data processor

176
Q

The person or entity that controls processing of the data.

A

data controller

177
Q

Ensures the organization complies with data regulations.

A

data protection officer (dpo)

178
Q

The individual or entity that is the subject of the personal data.

A

data subject

179
Q

Usually a member of senior mgmt. CAN delegate some day
to day duties. CANNOT delegate total responsibility.

A

data owner

180
Q

Usually someone in the IT dept. DOES implement controls for data owner. DOES NOT decide what controls are needed.

A

data custodian

181
Q

It is a crime to destroy, change, or hide documents to prevent their use in official legal processes.

A

SOX Section 802

182
Q

Companies must keep audit related records for a minimum of five years.

A

SOX Section 804

183
Q

States that a data controller “must be able to demonstrate that personal data are processed in a manner transparent to the data subject.” The obligations for transparency begin at the data collection stage and apply “throughout the lifecycle of processing.” Stipulates that communication to data subjects must be “concise, transparent, intelligible and easily accessible, and use clear and plain language.”

A

GDPR Article 12

184
Q

The practice of modifying risk, usually to lower it. Typically begins with identifying and assessing risks by measuring the likelihood and impact. Risks most likely to occur and impactful would be prioritized.

A

risk treatment

185
Q

Deliberately choosing to take no other risk management strategy and to simply continue operations as normal in the face of the risk.

A

risk acceptance

186
Q

Cyber insurance is an example of _____

A

risk transference

187
Q

applying security controls is

A

risk mitigation

188
Q

Where the organization changes business practices to completely eliminate the potential that a risk will materialize.

A

risk avoidance

189
Q

Risk treatments for countering and minimizing loss or unavailability of services or apps due to vulnerabilities

A

security controls

190
Q

safeguards are _____, countermeasures are ______

A

proactive / reactive

191
Q

“Cloud Computing Synopsis and Recommendation

A

NIST 800-146

192
Q

____contains several standards related to building and running a risk management program.

A

ISO 31000

193
Q

Produces useful resources related to cloud specific risks that organizations should be aware of and plan for when designing cloud computing systems. This guide identifies various categories of risks and recommendations for organizations to consider when evaluating cloud computing. These include research recommendations to advance the field of cloud computing, legal risks, and security risks.

A

ENISA

194
Q

patching levels
time to deploy patches
intrusion attempts
mean time to detect (mttd)
mean time to contain (mttc)
mean time to resolve (mttr)

A

metrics for cyber risk management

195
Q

Metrics that deviate from expected parameters are _____ and should be reviewed

A

no longer effective

196
Q

Designing a supply chain risk management (SCRM) program to
assess CSP or vendor risks is a _____practice. Actually performing the assessment is an example of _____.

A

due diligence / due care

197
Q

Enables an objective evaluation to validate that a particular product or system satisfies a defined set of security requirements. Assures customers that security products they purchase have been thoroughly tested by independent third-party testers and meets customer requirements. The certification of the product only certifies product capabilities.

A

ISO/IEC 15408-1

198
Q

defines how robust the security capabilities are in the evaluated product

A

evaluation assurance level (EAL) - associated with ISO 15408-1

199
Q

ENISA has published a standard for certifying the cybersecurity
practices present in cloud environments. The framework, _____ defines a set of evaluation criteria for various cloud service and deployment models. The goal is producing security evaluation results that allow comparison of the security posture across different cloud providers.

A

EU Cybersecurity Certification Scheme on Cloud Services (EUCS)

200
Q

supply chain
vendor mgmt
system integration

A

third party risks

201
Q

This is defined as any contract that two or more parties enter into as a service agreement that should address compliance and process requirements the customer is passing along to CSP

A

MSA

202
Q

Stipulate performance expectations such as maximum downtimes and often include penalties if the vendor doesn’t meet expectations.

A

SLAs

203
Q

Are SLAs legally binding?

A

Yes

204
Q

Uptime guarantees
SLA violation penalties
SLA violation penalty exclusions and limitations
Suspension of service clauses
Provider liability
Data protection and management
Disaster recovery and recovery point objectives
Security and privacy notifications and timeframes

A

SLA terms

205
Q

Legal document usually created after an MSA has been executed and governs a specific unit of work. MSA may document services and prices, and this covers requirements, expectations, and deliverables for a project.

A

SoW

206
Q

MSA focus is ___, SOW focus is ___.

A

overall and ongoing / limited and specific

207
Q

In many cases, vendor management will include activities related to _____ risks.

A

operational

208
Q

Does security team conduct vendor viability assessment?

A

No, b/c it’s operational

209
Q

A _____ is a specific article of related information that specifies the agreement between the contracting parties.

A

contract clause

210
Q

This is an area where legal counsel must be consulted

A

litigation

211
Q

Any customer compliance requirements that flow to the provider must be _____.

A

documented and agreed upon in the contract.

212
Q

_____ is designed to help an organization reduce the financial impact of risk by transferring it to an insurance carrier.

A

Cyber risk insurance

213
Q

Investigation
Direct business losses
Recovery costs
Legal notifications
Lawsuits
Extortion
Food and related expenses

A

things cyber risk insurance covers

214
Q

Direct monetary losses associated with downtime or data recovery, overtime for employees, and, oftentimes, reputational damages to the organization.

A

Direct business losses

215
Q

These may include costs associated with replacing hardware or provisioning temporary cloud environments during contingency operations.

A

Recovery costs

216
Q

Provides a set of practices and guidance for managing cybersecurity risks in supplier relationships. This standard is particularly useful for organizations that use ISO 27001 for building an ISMS or ISO 31000 for risk management

A

ISO 27036:2021

217
Q

Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations

A

NIST SP 800-161

218
Q

An overview of the ICT supply chain risks and challenges, and vision for the way forward, published in 2015

A

ENISA publication “Supply Chain Integrity”

219
Q

Key Practices in Cyber Supply Chain Risk Management: Observations from Industry

A

NIST IR 8276