Domaine 5 : Gestion et supervision des programmes de sécurité Flashcards
What is the purpose of security standards?
Establish formalized procedures to ensure consistent security practices across an organization and reduce risk by providing clear guidelines for handling various security-related situations.
Security standards help organizations maintain a uniform approach to security and mitigate potential threats.
What do password policies define?
Requirements for password complexity, length, and expiration, as well as procedures for password resets and the use of password managers.
Effective password policies are crucial for maintaining security and preventing unauthorized access.
What do authentication standards mandate?
Centralized authentication methods (e.g., LDAP, Active Directory) over local accounts and ensure consistent authentication mechanisms across all systems.
Centralized authentication enhances security by simplifying user management and access control.
What do access control standards determine?
How access rights are granted, reviewed, and revoked, and may require management approval or training before granting access to sensitive data.
Proper access control is essential for protecting sensitive information and ensuring that only authorized personnel have access.
What measures are included in physical security standards?
ID badges and electronic door locks to control physical access and differentiate access levels for employees, contractors, and guests.
Physical security is a critical aspect of overall organizational security, protecting facilities from unauthorized access.
What do encryption standards specify?
Approved encryption algorithms and key management practices, differentiating standards for data at rest and data in transit.
Encryption is vital for protecting sensitive information from unauthorized access and ensuring data integrity.
What is the benefit of using established frameworks?
Adopting industry-recognized standards from organizations like ISO and NIST to ensure compliance with widely accepted security practices.
Established frameworks provide a solid foundation for developing security policies and practices.
Why is security awareness important?
Educating users is crucial in preventing security breaches.
Awareness programs help users recognize and respond to potential threats.
What are phishing simulations used for?
Conducting simulated phishing attacks to train users in identifying malicious emails.
Helps in assessing the effectiveness of security awareness training.
What is the goal of training users to recognize anomalous behavior?
To detect unusual activities that may indicate a security incident.
Encourages prompt reporting of suspicious behavior.
What should reporting mechanisms include?
Clear procedures for reporting security incidents.
Ensures users know how and where to report potential threats.
What is the importance of regular training and updates?
Providing ongoing education to keep users informed about emerging threats.
Updating training materials to reflect the latest security best practices.
What is the primary purpose of audits and assessments?
Evaluate the effectiveness of security controls and policies, identify vulnerabilities and areas for improvement
What are internal audits?
Conducted by the organization’s own staff to assess compliance and effectiveness
What are external audits?
Performed by third parties to provide an unbiased evaluation
What is the purpose of risk assessments?
Identify potential threats and the likelihood of their occurrence
What is a vulnerability assessment?
Scan systems to detect known vulnerabilities
What is penetration testing?
Simulate attacks to test the robustness of security measures
Why are compliance and standards important in audits?
Ensure adherence to industry standards and regulatory requirements
Name three common frameworks for compliance.
- ISO 27001
- NIST
- PCI DSS
What should be maintained during reporting and documentation?
Detailed records of findings, methodologies, and remediation steps
What is the purpose of reports in audits?
Inform stakeholders and guide future security strategies
Fill in the blank: Internal audits are conducted by the organization’s own _______.
staff
True or False: External audits are performed by the organization’s own staff.
False