Domain 6 Security Assessment and Testing Flashcards

1
Q

Internal assessments:

A

Internal assessments are carried out within an organization, utilizing the in-depth knowledge of the company’s personnel regarding its systems, processes, and infrastructure. Leveraging this expertise allows organizations to conduct regular, cost-effective evaluations of their security posture. Such assessments facilitate the swift identification and remediation of vulnerabilities, ultimately fortifying the organization’s security. For example, a corporation’s IT department might undertake a network vulnerability assessment to uncover outdated software and security gaps that have not been patched. The organization then has the opportunity to prioritize and address these vulnerabilities, taking action to prevent potential exploitation from malicious actors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

External assessments:

A

External assessments are conducted by independent security specialists or companies without affiliation to the assessed organization. The impartial perspective provided by external assessments is valuable for identifying weaknesses in an organization’s security infrastructure that internal personnel may overlook due to familiarity with the systems and processes. For example, a financial institution might hire a third-party firm to perform a penetration test. This involves simulating real-world attacks to identify weaknesses in the organization’s security controls. The financial institution can gain an unbiased view of its security posture and implement necessary improvements to safeguard against potential threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Third-party assessments:

A

Third-party assessments involve evaluating the security posture of an organization’s vendors, suppliers, or partners, who may have access to sensitive information or systems. These assessments help organizations manage the risks of sharing sensitive data and ensure their partners maintain a strong security posture. Consider a company that plans to use a cloud service provider to store sensitive customer data. Before entrusting the provider with this critical information, the company should conduct a thorough security assessment to ensure that the provider has robust security measures in place to protect the data. By doing so, the company can minimize the risk of data breaches and maintain the trust of its customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security Control Testing Approaches

A

Effective security control testing is fundamental for organizations to identify vulnerabilities, validate their security controls, and maintain a strong security posture. Employing various security control testing methods helps organizations detect potential weaknesses from multiple angles, ensuring a comprehensive evaluation of their security infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vulnerability assessment:

A

A vulnerability assessment is a systematic process of identifying, analyzing, and prioritizing vulnerabilities within an organization’s systems, networks, and applications. Conducting vulnerability assessments allows organizations to discover potential security gaps and prioritize remediation efforts based on the severity of the vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Penetration testing:

A

Penetration testing, often referred to as ethical hacking, involves simulating real-world cyberattacks to identify potential weaknesses in an organization’s security controls. This proactive approach helps organizations uncover vulnerabilities that might be exploited by malicious actors and address them before they can be used in a real attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Log reviews:

A

Log reviews involve the examination of system, network, and application logs to identify unusual activity or security events. Regularly reviewing logs enables organizations to detect potential security incidents early and initiate appropriate response measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Synthetic transactions:

A

Synthetic transactions involve automated tests to simulate user interactions with applications or systems, mimicking real-world usage patterns. This approach helps organizations monitor the performance and availability of their services and detect potential security issues that may arise during normal operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Code review and testing:

A

Code review involves examining source code to identify potential security flaws, such as injection vulnerabilities, insecure configurations, and weak cryptographic implementations. Both manual and automated code review methods can be employed to ensure that an application’s code adheres to secure coding practices and industry standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Misuse case testing:

A

Misuse case testing focuses on how a malicious user can abuse or exploit an application or system. Creating and testing misuse cases allows organizations to identify potential attack vectors and implement appropriate security measures to mitigate risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Test coverage analysis:

A

Test coverage analysis involves measuring how much an organization’s testing efforts cover its systems, networks, and applications. Conducting test coverage analysis enables organizations to identify gaps in their testing efforts and prioritize areas that require additional attention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Interface testing:

A

Interface testing validates the interactions between various system components, such as APIs, network connections, and user interfaces. This testing method helps organizations ensure that data is exchanged correctly between components and identify and address potential security issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Breach attack simulations:

A

Breach attack simulations use automated tools to emulate cyberattacks on an organization’s systems and networks. This approach enables organizations to evaluate the effectiveness of their security controls and incident response plans in a controlled environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Compliance checks:

A

Compliance checks involve evaluating an organization’s adherence to industry regulations, standards, and best practices. Conducting compliance checks enables organizations to ensure that they meet their legal and contractual obligations and maintain a strong security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Gathering Security Process Data

A

Collecting security process data is vital to maintaining an organization’s security posture, ensuring both technical and administrative aspects are addressed effectively. Gathering this data enables organizations to make informed decisions, optimize security processes, and demonstrate adherence to industry standards and regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Account management:

A

Account management data includes user account creation, modification, and termination information. Collecting this data ensures that access to sensitive information and systems is granted only to authorized users and that access rights are revoked when no longer needed.

17
Q

Management review and approval:

A

Management review and approval data encompass records of management decisions related to security policies, procedures, and controls. This data demonstrates an organization’s commitment to security and ensures that key stakeholders are involved in critical security decisions.

18
Q

Key performance and risk indicators:

A

Key performance indicators (KPIs) and key risk indicators (KRIs) are metrics used to evaluate the effectiveness of an organization’s security controls and processes. Tracking KPIs and KRIs allows organizations to identify trends, measure progress, and make data-driven decisions to enhance their security posture.

19
Q

Backup verification data:

A

Backup verification data consists of records confirming that an organization’s data backups have been completed and are recoverable. Collecting this data ensures that critical data can be restored during data loss, system failure, or a security incident.

20
Q

Training and awareness:

A

Training and awareness data includes records of security awareness and training programs employees attend. Collecting this data ensures that employees have the knowledge and skills to protect sensitive information and maintain a strong security posture.

21
Q

Disaster recovery (DR) and business continuity (BC):

A

Disaster recovery and business continuity data consist of records related to an organization’s DR and BC plans, including testing results, updates, and revisions. Gathering this data helps organizations ensure that their DR and BC plans are effective and up to date, enabling them to minimize downtime and continue operations in the event of a disaster or security incident.

22
Q

Analyzing Test Output and Facilitating Security Audits

A

Analyzing test output and generating reports are crucial to maintaining and improving an organization’s security posture. Conducting thorough analyses and facilitating security audits enable organizations to identify vulnerabilities, implement remediation measures, and maintain compliance with industry regulations.

23
Q

Remediation:

A

Remediation involves the process of addressing identified vulnerabilities or security weaknesses. After analyzing test output and generating a report, organizations should prioritize and implement remediation measures to mitigate risks and enhance their security posture. These measures may include patching software, updating configurations, or implementing new security controls.

24
Q

Exception handling:

A

Exception handling: Exception handling involves managing deviations or noncompliance instances identified during security testing or audits. Organizations must have a well-defined exception handling process to address these issues, including documenting exceptions, evaluating risks, and implementing compensating controls when necessary.

25
Q

Ethical disclosure:

A

Ethical disclosure responsibly reports security vulnerabilities or weaknesses discovered during testing or audits. Organizations should have a clear ethical disclosure policy, including notifying affected parties, coordinating with vendors, or reporting vulnerabilities to industry organizations.

26
Q

Conducting and Facilitating Security Audits

A

Security audits help organizations evaluate their security posture, identify vulnerabilities, and maintain compliance with industry standards and regulations. Conducting or facilitating security audits is essential to ensuring the effectiveness of an organization’s security controls.

27
Q

Internal audits:

A

Internal audits are conducted within an organization, utilizing the in-depth knowledge of the company’s personnel regarding its systems, processes, and infrastructure. Organizations can identify vulnerabilities and inefficiencies through internal audits, enabling them to implement improvements and maintain a strong security posture.

28
Q

External audits:

A

External audits are performed through independent security specialists or companies without affiliation to the organization being audited. The impartial perspective provided through external audits is valuable for identifying weaknesses in an organization’s security infrastructure that internal personnel may overlook due to familiarity with the systems and processes.

29
Q

Third-party audits:

A

Third-party audits involve the evaluation of an organization’s vendors, suppliers, or partners, who may have access to sensitive information or systems. These audits help organizations manage the risks of sharing sensitive data and ensure their partners maintain a strong security posture.

30
Q

ISO/IEC 27001

A

ISO/IEC 27001 is a globally recognized standard that outlines the requirements for an Information Security Management System (ISMS). It emphasizes the importance of risk management and continuous improvement in implementing security controls. For example, a multinational corporation operating in various countries might adopt ISO/IEC 27001 to ensure its security practices are consistent across all regions. This standard is particularly suitable for international organizations that want to demonstrate their commitment to information security to stakeholders, clients, and regulators.

31
Q

NIST Special Publication 800-53

A

NIST Special Publication 800-53 is a comprehensive set of security controls developed by the National Institute of Standards and Technology (NIST) in the United States. It is specifically designed for federal information systems. A US government agency, for instance, must adhere to these controls to ensure the security and integrity of its information systems. This framework is most suitable for US federal organizations or those working closely with the US government, as it aligns with federal regulations and standards.

32
Q

Center for Internet Security (CIS):

A

CIS Controls, developed by the CIS, is a set of prioritized best practices to improve cybersecurity defenses. Small- to medium-sized businesses might find CIS Controls particularly beneficial as a practical and cost-effective way to identify and mitigate common cybersecurity threats. This framework is ideal for organizations looking for a hands-on, actionable approach to cybersecurity, especially those with limited resources.

33
Q

Control Objectives for Information and Related Technologies (COBIT):

A

COBIT is a framework that integrates governance and management practices for information technology (IT). It helps organizations align their IT processes with business goals and governance requirements. A financial institution, for example, might use COBIT to ensure that its IT operations comply with regulatory requirements and support its business objectives. COBIT is suitable for organizations that must tightly align IT processes with business strategies and regulatory compliance.

34
Q

Factor Analysis of Information Risk (FAIR):

A

FAIR is a unique framework providing a quantitative risk management approach. It helps organizations understand, analyze, and quantify information risk in financial terms. An insurance company might use FAIR to assess cybersecurity risk in monetary terms, providing a clear financial perspective on potential risks. FAIR is ideal for organizations that require a quantitative, financially oriented approach to risk management, especially in industries like finance and insurance.

35
Q

System and Organization Controls (SOC):

A

SOC reports are vital for service providers needing to demonstrate control effectiveness to clients or regulatory bodies. These reports ensure control environments related to data retrieval, storage, processing, and transfer.

36
Q

SOC 1:

A

Focuses on controls related to financial reporting. It is often used by financial service providers or organizations that must comply with financial regulations.

37
Q

SOC 2:

A

This type is particularly relevant to the CISSP exam and focuses on controls related to security, availability, processing integrity, confidentiality, and customer data privacy. SOC 2 suits technology and cloud computing companies that handle sensitive customer information.

38
Q

SOC 3:

A

Similar to SOC 2 but with a public-facing report, SOC 3 is used when an organization wants to demonstrate its commitment to security controls without disclosing the details of the controls. For example, a cloud service provider might undergo a SOC 2 assessment to assure clients that robust controls are in place for data security and privacy. SOC assessments suit service providers in various industries, particularly those handling sensitive client data.