Domain 6 Legal and Compliance Flashcards
FISMA
With any system that interacts with federal agencies in any way there are extensive requirements under FISMA for compliance with security controls required by the federal government
eDiscovery in the Cloud
determined by contractual requirements between the cloud customer and the cloud provider as well as largely driven by the cloud model employed
ISC/IEC 27050
Strives to establish an international accepted state for eDiscovery process and best practices
Gramm-Leach-Blilley Act GLBA
- Focuses on PII as it relates financial institutions
- Institutions must provide all users and customers a written copy of their privacy policies and practices, including with whom and for what reasons their information may be shared
Safe Harbor
- A way to bridge the gap between EU and USA privacy regulations
- Voluntary on behalf of the organization
SOX
Regulates accounts and financial practices
General Data Protection Regulation - GDPR
- Aims to strengthen and expand on personal and privacy protections
- Adds official restrictions on the exporting of data outside of the EU
Directive 95/46 EC
declared data privacy a human right.
Russia
Processing and storage of personal information or data on Russian citizens must be done from systems and databases that are physically located in Russia federation
Privacy
- Use to be considered part of confidentiality
- related to an individual’s control over their own information and activities
Cloud Control Matrix
- provides a detailed approach and framework for cloud customers with a focus on controls that are pertinent and applicable to a cloud environment.
SSAE 16
- focused on auditing methods
- SOC reports
- Replaced SAS 70
SOC 1
- internal controls as the relate to financial reporting
- Type 1 - policies and procedures at a point in time
- Type 2 - policies and procedures over a period in time (6 month minimum)
SOC 2
- Meant to be internal
- Type 1 - report on the suitability of design and controls
- Type 2 - report on the effectiveness of the design and application of security controls
- 5 principles .Availability .Confidentiality .Processing integrity .Privacy .Security
SOC 3
Meant for external , general use.