Governance and Compliance Flashcards
Governance
Overall management of IT infrastructure, policies, procedures, and operations
Part of the GRC triad (Governance, Risk, and Compliance)
Strategic leadership, structures, and processes ensuring IT aligns with business objectives
Involves risk management, resource allocation, and performance measurement
Framework
Aligns with organizational objectives and regulatory requirements
Governance and Compliance - crucial aspects
Risk Management
Identify, assess, and manage potential risks
Strategic Alignment
Ensure IT strategy aligns with business objectives
Resource Management
Efficient and effective use of IT resources
Performance Measurement
Mechanisms for measuring and monitoring the
performance of IT processes
Importance of compliance
Legal Obligations
Non-compliance leads to penalties (fines, sanctions)
Trust and Reputation
Compliance enhances reputation and fosters trust
Data Protection
Prevents breaches and protects privacy
Business Continuity
Ensures operation in disasters or disruptions
Governance structure
1: Boards
Elected by shareholders to oversee organization
management
Responsible for setting strategic direction, policies, and major decisions
2: Committees
Subgroups of boards with specific focuses
Allows detailed attention to complex areas
3: Government Entities
Play roles in governance, especially for public and
regulated organizations
Establish laws and regulations for compliance
4: Centralized and Decentralized Structures
Centralized
Decision-making authority at top management levels
Ensures consistent decisions and clear authority
Slower response to local/departmental needs
Decentralized
Decision-making authority distributed throughout the
organization
Enables quicker decisions and local responsiveness
Potential for inconsistencies
Policies are High-level guidelines indicating organizational commitments. They cover
Acceptable Use Policies
Information Security Policies
Business Continuity
Disaster Recovery
Incident Response
Change Management
Software Development Lifecycle (SDLC)
Standards are specific, mandatory actions or rules adhering to policies. They cover
Password Standards
Access Control Standards
Physical Security Standards
Encryption Standards
Procedures are step-by-step instructions ensure consistency and compliance. They cover
Change Management Procedures
Onboarding and Offboarding Procedures
Playbooks
Compliance covers
1: Monitoring and Reporting
Concepts like due diligence, due care, attestation, and
acknowledgment
2: Internal and External Compliance
Differentiating factors
3: Automation in Compliance
Utilizing automation in the compliance process
Consequences of Non-compliance
Fines, Sanctions
Legal penalties
Reputational Damage
Impact on trust and reputation
Loss of License, Contractual Impacts
Severe consequences
Purpose of Governance
Establishes a strategic framework aligning with
objectives and regulations
Defines rules, responsibilities, and practices for
achieving goals and managing IT resources
Governance influence on IT Components
Shapes guidelines for recommended approaches in
handling situations
Drives policy development, outlining organizational
commitments (e.g., data protection)
Impacts standards, defining mandatory rules for policy
adherence
Ensures procedures align with objectives, providing
task-specific guidance
Organizational Governance
Complex, multifaceted concept essential for successful
organization operation
Comprises various components, each with unique
functions
Acceptable Use Policy (AUP)
Document that outlines the do’s and don’ts for users
when interacting with an organization’s IT systems and
resources
Defines appropriate and prohibited use of IT
systems/resources
Aims to protect organizations from legal issues and
security threats
Information Security Policies & what 5 areas do they cover
Cornerstone of an organization’s security
Outlines how an organization protects its information
assets from threats, both internal and external
These policies cover a range of areas
1 Data Classification
2 Access Control
3 Encryption
4 Physical Security
5 Ensures confidentiality, integrity, and availability of data
Business Continuity Policy
Ensures operations continue during and after
disruptions
Focuses on critical operation continuation and quick
recovery
Includes strategies for power outages, hardware
failures, and disasters
Disaster Recovery Policy
Focuses on IT systems and data recovery after disasters
Outlines data backup, restoration, hardware/software
recovery, and alternative locations