Governance and Compliance Flashcards

1
Q

■ Part of the GRC triad
■ Strategic leadership, structures, and processes ensuring IT aligns with business objectives
■ Involves risk management, resource allocation, and performance measurement

The purpose is to:
■ Establishes a strategic framework aligning with objectives and regulations
■ Defines rules, responsibilities, and practices for achieving goals and managing IT resources

A

Governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

● Elected by shareholders to oversee organization management
● Responsible for setting strategic direction, policies, and major decisions

A

Boards

(Governance Structures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

● Subgroups of boards with specific focuses
● Allows detailed attention to complex areas

A

Committees

(Governance Structures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

● Play roles in governance, especially for public and regulated organizations
● Establish laws and regulations for compliance

A

Government Entities

(Governance Structures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

○ Decision-making authority at top management levels
○ Ensures consistent decisions and clear authority
○ Slower response to local/departmental needs

A

Centralized Strcutures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

○ Decision-making authority distributed throughout the
organization
○ Enables quicker decisions and local responsiveness
○ Potential for inconsistencies

A

Decentralized Structures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

■ Document that outlines the do’s and don’ts for users when interacting with an organization’s IT systems and resources
■ Defines appropriate and prohibited use of IT systems/resources
■ Aims to protect organizations from legal issues and security threats

A

Acceptable Use Policy (AUP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

■ Cornerstone of an organization’s security
■ Outlines how an organization protects its information assets from threats, both internal and external
■ Ensures confidentiality, integrity, and availability of data

These policies cover a range of areas
● Data Classification
● Access Control
● Encryption
● Physical Security

A

Information Security Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

■ Ensures operations continue during and after disruptions
■ Focuses on critical operation continuation and quick recovery
■ Includes strategies for power outages, hardware failures, and disasters

A

Business Continuity Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

■ Focuses on IT systems and data recovery after disasters
■ Outlines data backup, restoration, hardware/software recovery, and alternative locations

A

Disaster Recovery Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

■ Addresses detection, reporting, assessment, response, and learning from security incidents
■ Specifies incident notification, containment, investigation, and prevention steps
■ Minimizes damage and downtime during incidents

A

Incident Response Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

■ Guides software development stages from requirements to maintenance
■ Includes secure coding practices, code reviews, and testing standards
■ Ensures high-quality, secure software meeting user needs

A

Software Development Lifecycle (SDLC) Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

■ Governs handling of IT system/process changes
■ Ensures controlled, coordinated change implementation to minimize disruptions
■ Covers change request, approval, implementation, and review processes

A

Change Management Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

■ Provides a framework for implementing security measures, ensuring that all aspects of an organization’s security posture are addressed

A

Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

■ Define password complexity and management
■ Include length, character types, regular changes, and password reuse rules
■ Emphasize password hashing and salting for security

A

Password Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

■ Determine who has access to resources within an organization
■ Enforce principles of least privilege and separation of duties

Include access control models like
● Discretionary Access Control (DAC)
● Mandatory Access Control (MAC)
● Role Based Access Control (RBAC

A

Access Control Standards

17
Q

■ Cover physical measures to protect assets and information
■ Include controls like perimeter security, surveillance systems, and access control mechanisms
■ Address environmental controls and secure areas for sensitive information

A

Physical Security Standards

18
Q

■ Systematic sequences of actions or steps taken to achieve a specific outcome in an organization
■ Ensures consistency, efficiency, and compliance with standards

A

Procedures

18
Q

■ Ensure data remains secure and unreadable even if accessed without authorization
■ Include encryption algorithms like AES, RSA, and SHA-2
■ Depends on the use case and balance between security and performance

A

Encryption Standards

19
Q

■ Systematic approach to handling organizational changes
■ It aims to implement changes smoothly and successfully with minimal disruption

A

Change Management

20
Q

■ Detailed guides for specific tasks or processes
■ They provide step-by-step instructions for consistent and efficient execution
■ Used in various situations, from cybersecurity incidents to customer complaints
■ Include resource requirements, steps to be taken, and expected outcomes

A

Playbooks

21
Q

■ Onboarding integrates new employees into the organization
■ Offboarding manages the transition when an employee leaves

A

Onboarding and Offboarding Procedures

22
Q

■ Organizations must comply with various regulations, depending on industry and location
■ Non-compliance leads to penalties, sanctions, and reputational damage

Regulations cover areas such as
● Data Protection
● Privacy
● Environmental Standards
● Labor Laws

A

Regulatory Considerations

23
Q

■ Complement regulatory considerations, encompassing contract, intellectual
property, and corporate law
■ Employment laws address minimum wage, overtime, safety, discrimination, and benefits
■ Litigation risks include breach of contract, product liability, and employment disputes
■ Robust legal strategies and resources are needed to manage legal risks

A

Legal Considerations

24
Q

■ Refer to industry-specific standards, practices, and ethical guidelines
■ Not legally binding but influence customer, partner, and regulator expectations
■ Non-adoption may lead to competitive disadvantages and stakeholder criticism

A

Industry Considerations

25
Q

■ Geographical regulations impact organizations at local, regional, national, and global levels
■ Local considerations include city ordinances, zoning laws, and operational restrictions
■ Conflict of laws between jurisdictions is a significant challenge
■ Navigating these differences requires deep legal knowledge and flexibility in governance

A

Geographical Considerations

26
Q

■ Ensures adherence to laws, regulations, guidelines, and specifications
■ Includes compliance reporting and compliance monitoring

A

Compliance

27
Q

■ Systematic process of collecting and presenting data to demonstrate adherence to compliance requirements
■ Two Types (Internal and External)

A

Compliance Reporting

28
Q

■ Regularly reviews and analyzes operations for compliance
■ Includes due diligence and due care, attestation and acknowledgement, and internal and external monitoring

A

Compliance Monitoring

29
Q

● Identifying compliance risks through thorough review

A

Due Diligence

30
Q

● Mitigating identified risks

A

Due Care

31
Q

● Formal declaration by a responsible party that the organization’s
processes and controls are compliant

A

Attestation

32
Q

● Strict measures by regulatory bodies to enforce compliance
● Range from restrictions to bans

A

Sanctions