Governance and Compliance Flashcards

1
Q

Governance

A

Overall management of IT infrastructure, policies, procedures, and operations

Part of the GRC triad (Governance, Risk, and Compliance)

Strategic leadership, structures, and processes ensuring IT aligns with business objectives

Involves risk management, resource allocation, and performance measurement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Framework

A

Aligns with organizational objectives and regulatory requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Governance and Compliance - crucial aspects

A

Risk Management
 Identify, assess, and manage potential risks

Strategic Alignment
 Ensure IT strategy aligns with business objectives

Resource Management
 Efficient and effective use of IT resources

Performance Measurement
 Mechanisms for measuring and monitoring the
performance of IT processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Importance of compliance

A

Legal Obligations
 Non-compliance leads to penalties (fines, sanctions)

Trust and Reputation
 Compliance enhances reputation and fosters trust

Data Protection
 Prevents breaches and protects privacy

Business Continuity
 Ensures operation in disasters or disruptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Governance structure

A

1: Boards
 Elected by shareholders to oversee organization
management
 Responsible for setting strategic direction, policies, and major decisions

2: Committees
 Subgroups of boards with specific focuses
 Allows detailed attention to complex areas

3: Government Entities
 Play roles in governance, especially for public and
regulated organizations
 Establish laws and regulations for compliance

4: Centralized and Decentralized Structures

Centralized
 Decision-making authority at top management levels
 Ensures consistent decisions and clear authority
 Slower response to local/departmental needs

Decentralized
 Decision-making authority distributed throughout the
organization
 Enables quicker decisions and local responsiveness
 Potential for inconsistencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Policies are High-level guidelines indicating organizational commitments. They cover

A

 Acceptable Use Policies
 Information Security Policies
 Business Continuity
 Disaster Recovery
 Incident Response
 Change Management
 Software Development Lifecycle (SDLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Standards are specific, mandatory actions or rules adhering to policies. They cover

A

 Password Standards
 Access Control Standards
 Physical Security Standards
 Encryption Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Procedures are step-by-step instructions ensure consistency and compliance. They cover

A

 Change Management Procedures
 Onboarding and Offboarding Procedures
 Playbooks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Compliance covers

A

1: Monitoring and Reporting
 Concepts like due diligence, due care, attestation, and
acknowledgment

2: Internal and External Compliance
 Differentiating factors

3: Automation in Compliance
 Utilizing automation in the compliance process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Consequences of Non-compliance

A

 Fines, Sanctions
 Legal penalties
 Reputational Damage
 Impact on trust and reputation
 Loss of License, Contractual Impacts
 Severe consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Purpose of Governance

A

 Establishes a strategic framework aligning with
objectives and regulations
 Defines rules, responsibilities, and practices for
achieving goals and managing IT resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Governance influence on IT Components

A

 Shapes guidelines for recommended approaches in
handling situations
 Drives policy development, outlining organizational
commitments (e.g., data protection)
 Impacts standards, defining mandatory rules for policy
adherence
 Ensures procedures align with objectives, providing
task-specific guidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Organizational Governance

A

 Complex, multifaceted concept essential for successful
organization operation
 Comprises various components, each with unique
functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Acceptable Use Policy (AUP)

A

 Document that outlines the do’s and don’ts for users
when interacting with an organization’s IT systems and
resources
 Defines appropriate and prohibited use of IT
systems/resources
 Aims to protect organizations from legal issues and
security threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Information Security Policies & what 5 areas do they cover

A

 Cornerstone of an organization’s security
 Outlines how an organization protects its information
assets from threats, both internal and external

These policies cover a range of areas
1 Data Classification
2 Access Control
3 Encryption
4 Physical Security
5 Ensures confidentiality, integrity, and availability of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Business Continuity Policy

A

 Ensures operations continue during and after
disruptions
 Focuses on critical operation continuation and quick
recovery
 Includes strategies for power outages, hardware
failures, and disasters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Disaster Recovery Policy

A

 Focuses on IT systems and data recovery after disasters
 Outlines data backup, restoration, hardware/software
recovery, and alternative locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Incident Response Policy

A

 Addresses detection, reporting, assessment, response,
and learning from security incidents
 Specifies incident notification, containment,
investigation, and prevention steps
 Minimizes damage and downtime during incidents

19
Q

Software Development Lifecycle (SDLC) Policy

A

 Guides software development stages from
requirements to maintenance
 Includes secure coding practices, code reviews, and
testing standards
 Ensures high-quality, secure software meeting user
needs

20
Q

Change Management Policy

A

 Governs handling of IT system/process changes
 Ensures controlled, coordinated change
implementation to minimize disruptions
 Covers change request, approval, implementation, and
review processes

21
Q

Standards

A

Provides a framework for implementing security measures, ensuring that all aspects of an organization’s security posture are addressed

22
Q

Password Standards

A

 Define password complexity and management
 Include length, character types, regular changes, and
password reuse rules
 Emphasize password hashing and salting for security

23
Q

Access control standards and its models

A

Determine who has access to resources within an organization

Access control models:
 Discretionary Access Control (DAC)
 Mandatory Access Control (MAC)
 Role Based Access Control (RBAC)
 Enforce principles of least privilege and separation of
duties

24
Q

Physical security standards

A

 Cover physical measures to protect assets and
information
 Include controls like perimeter security, surveillance
systems, and access control mechanisms
 Address environmental controls and secure areas for
sensitive information

25
Q

Encryption Standards

A

 Ensure data remains secure and unreadable even if
accessed without authorization
 Include encryption algorithms like AES, RSA, and SHA-2
 Depends on the use case and balance between security
and performance

26
Q

Procedures

A

 Systematic sequences of actions or steps taken to
achieve a specific outcome in an organization
 Ensures consistency, efficiency, and compliance with
standards

27
Q

Change Management and its 5 key stages

A

 Systematic approach to handling organizational
changes
 It aims to implement changes smoothly and
successfully with minimal disruption

Key Stages
1 Identifying the need for change
2 Assessing impacts
3 Developing a plan
4 Implementation
5 Post-change review

28
Q

Onboarding and Offboarding procedures

A

Onboarding integrates new employees into the organization
 ensures productivity and engagement
 Includes orientation, training, and integration activities

Offboarding manages the transition when an employee leaves
 Tasks include property retrieval, access disabling, and
exit interviews

29
Q

Playbooks

A

 Detailed guides for specific tasks or processes
 They provide step-by-step instructions for consistent
and efficient execution
 Used in various situations, from cybersecurity incidents
to customer complaints
 Include resource requirements, steps to be taken, and
expected outcomes

30
Q

Define Regulatory Considerations and what 4 areas does it cover

A

1 Data Protection
2 Privacy
3 Environmental Standards
4 Labor Laws

31
Q

Litigation risks include

A

Breach of contract, product liability, and employment disputes.

Robust legal strategies and resources are needed to manage legal risks.

32
Q

Industry Considerations

A

 Refer to industry-specific standards, practices, and
ethical guidelines
 Not legally binding but influence customer, partner,
and regulator expectations
 Non-adoption may lead to competitive disadvantages
and stakeholder criticism

33
Q

Geographical Considerations

A

 Geographical regulations impact organizations at local,
regional, national, and global levels
 Local considerations include city ordinances, zoning
laws, and operational restrictions
 Regional considerations, like CCPA in California, impose
state-level regulations
 National considerations, e.g., ADA in the US, affect
businesses across the entire country
 Global considerations, like GDPR, apply
extraterritorially to organizations dealing with EU
citizens’ data
 Conflict of laws between jurisdictions is significant
challenge
 Navigating these differences requires deep legal
knowledge and flexibility in governance

34
Q

Compliance

A

 Ensures adherence to laws, regulations, guidelines, and
specifications
 Includes compliance reporting and compliance
monitoring

35
Q

Compliance Reporting

A

Systematic process of collecting and presenting data to demonstrate adherence to compliance requirements

36
Q

Two types of compliance reporting

A

Internal Compliance Reporting
 Ensures adherence to internal policies and procedures
 Conducted by an internal audit team or compliance
department

External Compliance Reporting
 Demonstrates compliance to external entities
 Mandatory, often by law or contract

37
Q

Compliance Monitoring

A

 Regularly reviews and analyzes operations for
compliance
 Includes due diligence and due care, attestation and
acknowledgement, and internal and external
monitoring

37
Q

Due Diligence and Due Care

A

Due Diligence
 Identifying compliance risks through thorough review

Due Care
 Mitigating identified risks

38
Q

Attestation and Acknowledgement

A

Attestation
 Formal declaration by a responsible party that the
organization’s processes and controls are compliant

Acknowledgement
 Recognition and acceptance of compliance
requirements by all relevant parties

39
Q

Internal and External Monitoring

A

Internal Monitoring
 Regularly reviewing an organization’s operations to
ensure compliance with internal policies

External Monitoring
 Third-party reviews for compliance with external
regulations or standards

40
Q

Role of Automation in Compliance

A

Streamlines data collection, improves accuracy, and provides real-time monitoring

41
Q

Understanding and adhering to relevant laws and regulations

A

 Implementing robust cybersecurity measures
 Regularly reviewing and updating compliance programs

42
Q
A