Domain 6 Flashcards
IT Security Audit
These audits aim to evaluate security controls, identify vulnerabilities, and ensure compliance with regulatory requirements.
Quantitative risk assessment
qualitative risk assessment
Quantitative risk assessment excels at analyzing financial risk,
while qualitative risk assessment is a good tool for intangible risks.
Combining the two techniques provides a well-rounded risk picture.
ISO 27018
ISO 27018 describes privacy requirements for cloud providers
Risk management standards
ISO 31000, NIST 800-37, and the Control Objectives for Information Technology (COBIT) are all relevant risk management standards.
The Communications Assistance to Law Enforcement Act (CALEA)
The Communications Assistance to Law Enforcement Act (CALEA) requires that all communications carriers make wiretaps possible for law enforcement officials who have an appropriate court order.
National privacy law
PIPEDA
GDPR
Canada:
has a comprehensive law titled the Personal Information Protection and Electronic Documents Act (PIPEDA).
France and Germany are both members of the European Union and are subject to the comprehensive General Data Protection Regulation (GDPR)
ISAE 3402 : International Standard on Assurance Engagements
ISAE 3410 - Assurance Engagements on Greenhouse Gas Statements
SSAE 16 (US - Outdated)
SSAE 18 (US)
A. ISAE 3402 provides international guidance on the assessment of service providers and is the appropriate standard to use in this situation. SSAE 18 is the equivalent document for assessments performed within the United States. SSAE 16 is an outdated version of that standard and has been superseded by SSAE 18. ISAE 3410 covers greenhouse gas emission statements and is completely irrelevant to this scenario.
Binding corporate rules
Privacy Shield
Standard contractual clauses
Safe harbor
Binding corporate rules:
If the data were being shared internally within a company, binding corporate rules would also be an option
Standard contractual clauses:
The European Union provides standard contractual clauses that may be used to facilitate data transfer. That would be the best choice in a case where two different companies are sharing data.
NERC/CIP
HIPAA
HITECH
PCI DSS
The North American Electric Reliability Corporation’s Critical Infrastructure Program (NERC/CIP) provides security standards for electric utilities and other elements of critical infrastructure.
The Health Insurance Portability and Accountability Act (HIPAA) and
the Health Information Technology for Electronic and Clinical Health (HITECH) Act govern personal health information.
The Payment Card Industry Data Security Standard (PCI DSS) governs credit and debit card records.
Laws:
The Doctrine of Proper Law
Tort law
Common law
criminal law
The Doctrine of Proper Law is used when a dispute occurs over which jurisdiction will hear a case.
Tort law refers to civil liability suits.
Common law refers to laws regarding marriage, and
criminal law refers to violations of state or federal criminal code.