Explain the importance of policies to organizational security Flashcards
Personnel
Acceptable use policy Job rotation Mandatory vacation Separation of duties Least privilege Clean desk space Background checks Non-disclosure agreement (NDA) Social media analysis Onboarding Offboarding User training
Acceptable use policy
Job rotation
Mandatory vacation
Separation of duties
Least privilege
Clean desk space
Clean desk space
Background checks
Non-disclosure agreement (NDA)
Social media analysis
Onboarding
Offboarding
User training
Gamification
Capture the flag
Phishing campaigns
Gamification
Capture the flag
Phishing campaigns
Phishing simulations
Computer-based training (CBT)
Role-based training
Phishing simulations
Computer-based training (CBT)
Role-based training
Diversity of training techniques
Third-party risk management
Vendors Supply chain Business partners Service level agreement (SLA) Memorandum of understanding (MOU) Master services agreement (MSA) Business partnership agreement (BPA) End of life (EOL) End of service life (EOSL) NDA
Vendor
Supply chain
Business partners
Service level agreement (SLA)
Memorandum of understanding (MOU)
Master services agreement (MSA)
Business partnership agreement (BPA)
End of life (EOL)
End of service life (EOSL)
NDA
Data
Classification
Governance
Retention
Classification
Governance
Retention
Credential policies
Personnel Third-party Devices Service accounts Administrator/root accounts
Personnel
Third-party
Devices
Service accounts
Administrator/root accounts
Organizational policies
Change management
Change control
Asset management
Change management
Change control
Asset management