Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture Flashcards

1
Q

Regulations, standards, and legislation

A

General Data Protection Regulation (GDPR)
National, territory, or state laws
Payment Card Industry Data Security Standard (PCI DSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

General Data Protection Regulation (GDPR)

A

Provisions and requirements protecting the personal data of European Union (EU) citizens. Transfers of personal data outside the EU Single Market are restricted unless protected by like-for-like regulations, such as the US’s Privacy Shield requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

National, territory, or state laws

A

Compliance issues are complicated by the fact that laws derive from different sources. For example, the GDPR does not apply to American data subjects, but it does apply to American companies that collect or process the personal data of people in EU countries. In the US, there are national federal laws, state laws, plus a body of law applying to US territories (Puerto Rico, the US Virgin Islands, Guam, and American Samoa). Federal laws tend to focus either on regulations like FISMA for federal departments or as “vertical” laws affecting a particular industry. Examples of the latter include the Gramm–Leach–Bliley Act (GLBA) for financial services, and the Health Insurance Portability and Accountability Act (HIPAA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Payment Card Industry Data Security Standard (PCI DSS)

A

Compliance issues can also arise from industry-mandated regulations. For example, the Payment Card Industry Data Security Standard (PCI DSS) defines the safe handling and storage of financial information (pcisecuritystandards.org/pci_security).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key frameworks

A

Center for Internet Security (CIS)
National Institute of Standards and Technology (NIST) RMF/CSF

International Organization for Standardization (ISO) 27001/27002/27701/31000

SSAE SOC 2 Type I/II
Cloud security alliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Center for Internet Security (CIS)

A

A not-for-profit organization (founded partly by SANS). It publishes the well-known “Top 20 Critical Security Controls” (or system design recommendations).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

National Institute of Standards and Technology (NIST) RMF/CSF

A

The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is a relatively new addition to the IT governance space and distinct from other frameworks by focusing exclusively on IT security, rather than IT service provision more generally (nist.gov/cyberframework). It is developed for a US audience and focuses somewhat on US government, but its recommendations can be adapted for other countries and types of organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

International Organization for Standardization (ISO) 27001/27002/27701/31000

A

The International Organization for Standardization (ISO) has produced a cybersecurity framework in conjunction with the International Electrotechnical Commission (IEC). The framework was established in 2005 and revised in 2013. Unlike the NIST framework, the ISO 27001 Information Security Management standard must be purchased (iso.org/standard/54534.html). ISO 27001 is part of an overall 27000 series of information security standards, also known as 27K. Of these, 27002 classifies security controls, 27017 and 27018 reference cloud security, and 27701 focuses on personal data and privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SSAE SOC 2 Type I/II

A

The Statements on Standards for Attestation Engagements (SSAE) are audit specifications developed by the American Institute of Certified Public Accountants (AICPA). These audits are designed to assure consumers that service providers—notably cloud providers, but including any type of hosted or third-party service—meet professional standards (aicpa.org/interestareas/frc/assuranceadvisoryservices/serviceorganization-smanagement.html). Within SSAE No. 18 (the current specification), there are several levels of reporting:

Service Organization Control (SOC2)— evaluates the internal controls implemented by the service provider to ensure compliance with Trust Services Criteria (TSC) when storing and processing customer data. TSC refers to security, confidentiality, integrity, availability, and privacy properties. An SOC2 Type I report assesses the system design, while a Type II report assesses the ongoing effectiveness of the security architecture over a period of 6-12 months. SOC2 reports are highly detailed and designed to be restricted. They should only be shared with the auditor and regulators and with important partners under non disclosure agreement (NDA) terms.
SOC3—a less detailed report certifying compliance with SOC2. SOC3 reports can be freely distributed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud security alliance

A

Cloud control matrix

Reference architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cloud control matrix

A

Cloud controls matrix (cloudsecurityalliance.org/research/working-groups/cloud-controls-matrix)—lists specific controls and assessment guidelines that should be implemented by CSPs. For cloud consumers, the matrix acts as a starting point for cloud contracts and agreements as it provides a baseline level of security competency that the CSP should meet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Reference architecture

A

Enterprise reference architecture (ea.cloudsecurityalliance.org)—best practice methodology and tools for CSPs to use in architecting cloud solutions. The solutions are divided across a number of domains, such as risk management and infrastructure, application, and presentation services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Benchmarks/secure configuration guides

A

Platform/vendor-specific guides

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Platform/vendor-specific guides

A

Web server
OS
Application server
Network infrastructure devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Web server

A

A web application is a particular type of client/server architecture. A web application leverages existing technologies to simplify development. The application uses a generic client (a web browser), and standard network protocols and servers (HTTP/HTTPS). The specific features of the application are developed using code running on the clients and servers. Web applications are also likely to use a multi-tier architecture, where the server part is split between application logic and data storage and retrieval. Modern web applications may use even more distributed architectures, such as microservices and serverless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OS

A

Operating system (OS) best practice configuration lists the settings and controls that should be applied for a computing platform to work in a defined roles, such as client workstation, authentication server, network switch/router/firewall, web/application server, and so on.

Most vendors will provide guides, templates, and tools for configuring and validating the deployment of network appliances, operating systems, web servers, and application/database servers. The security configurations for each of these devices will vary not only by vendor but by device and version as well. The vendor’s support portal will host the configuration guides (along with setup/install guides and software downloads and updates) or they can be easily located using a web search engine.

17
Q

Application server

A

Most application architectures use a client/server model. This means that part of the application is a client software program, installed and run on separate hardware to the server application code. The client interacts with the server over a network. Attacks can therefore be directed at the local client code, at the server application, or at the network channel between them. As well as coding issues, the applications need to take account of platform issues. The client application might be running in a computing host alongside other, potentially malicious, software. Code that runs on the client should not be trusted. The server-side code should implement routines to verify that input conforms to what is expected.

18
Q

Network infrastructure devices

A

Most vendors will provide guides, templates, and tools for configuring and validating the deployment of network appliances, operating systems, web servers, and application/database servers. The security configurations for each of these devices will vary not only by vendor but by device and version as well. The vendor’s support portal will host the configuration guides (along with setup/install guides and software downloads and updates) or they can be easily located using a web search engine.

There is also detailed guidance available from several organizations to cover both vendor-neutral deployments and to provide third-party assessment and advice on deploying vendor products. Apart from the CIS controls, some notable sources include:

Department of Defense Cyber Exchange provides Security Technical Implementation Guides (STIGs) with hardening guidelines for a variety of software and hardware solutions (public.cyber.mil).
National Checklist Program (NCP) by NIST provides checklists and benchmarks for a variety of operating systems and applications (nvd.nist.gov/ncp/repository).