Governance and Compliance Flashcards
■ Part of the GRC triad
■ Strategic leadership, structures, and processes ensuring IT aligns with business objectives
■ Involves risk management, resource allocation, and performance measurement
The purpose is to:
■ Establishes a strategic framework aligning with objectives and regulations
■ Defines rules, responsibilities, and practices for achieving goals and managing IT resources
Governance
● Elected by shareholders to oversee organization management
● Responsible for setting strategic direction, policies, and major decisions
Boards
(Governance Structures)
● Subgroups of boards with specific focuses
● Allows detailed attention to complex areas
Committees
(Governance Structures)
● Play roles in governance, especially for public and regulated organizations
● Establish laws and regulations for compliance
Government Entities
(Governance Structures)
○ Decision-making authority at top management levels
○ Ensures consistent decisions and clear authority
○ Slower response to local/departmental needs
Centralized Strcutures
○ Decision-making authority distributed throughout the
organization
○ Enables quicker decisions and local responsiveness
○ Potential for inconsistencies
Decentralized Structures
■ Document that outlines the do’s and don’ts for users when interacting with an organization’s IT systems and resources
■ Defines appropriate and prohibited use of IT systems/resources
■ Aims to protect organizations from legal issues and security threats
Acceptable Use Policy (AUP)
■ Cornerstone of an organization’s security
■ Outlines how an organization protects its information assets from threats, both internal and external
■ Ensures confidentiality, integrity, and availability of data
These policies cover a range of areas
● Data Classification
● Access Control
● Encryption
● Physical Security
Information Security Policies
■ Ensures operations continue during and after disruptions
■ Focuses on critical operation continuation and quick recovery
■ Includes strategies for power outages, hardware failures, and disasters
Business Continuity Policy
■ Focuses on IT systems and data recovery after disasters
■ Outlines data backup, restoration, hardware/software recovery, and alternative locations
Disaster Recovery Policy
■ Addresses detection, reporting, assessment, response, and learning from security incidents
■ Specifies incident notification, containment, investigation, and prevention steps
■ Minimizes damage and downtime during incidents
Incident Response Policy
■ Guides software development stages from requirements to maintenance
■ Includes secure coding practices, code reviews, and testing standards
■ Ensures high-quality, secure software meeting user needs
Software Development Lifecycle (SDLC) Policy
■ Governs handling of IT system/process changes
■ Ensures controlled, coordinated change implementation to minimize disruptions
■ Covers change request, approval, implementation, and review processes
Change Management Policy
■ Provides a framework for implementing security measures, ensuring that all aspects of an organization’s security posture are addressed
Standards
■ Define password complexity and management
■ Include length, character types, regular changes, and password reuse rules
■ Emphasize password hashing and salting for security
Password Standards