Governance and Compliance Flashcards

1
Q

Governance

A
  • Part of the GRC triad (Governance, Risk, and Compliance)
  • Involves risk management, resource allocation, and performance measurement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Purpose of Governance

A

■ Establishes a strategic framework aligning with objectives and regulations
■ Defines rules, responsibilities, and practices for achieving goals and managing IT
resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Adaptation and Revision

A

■ Governance must adapt to technological advancements, regulatory changes, and
industry culture shifts
■ Monitoring evaluates governance effectiveness and identifies gaps
■ Revision updates governance framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Boards

Governance Structures

A

● Elected by shareholders to oversee organization management
● Responsible for setting strategic direction, policies, and major decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Committees

Governance Structures

A

● Subgroups of boards with specific focuses
● Allows detailed attention to complex areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Government Entities

Governance Structures

A

● Play roles in governance, especially for public and regulated organizations
● Establish laws and regulations for compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Centralized

Governance Structures

A

○ Decision-making authority at top management levels
○ Ensures consistent decisions and clear authority
○ Slower response to local/departmental needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Decentralized

Governance Structures

A

○ Decision-making authority distributed throughout the
organization
○ Enables quicker decisions and local responsiveness
○ Potential for inconsistencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Acceptable Use Policy (AUP)

A

■ Defines appropriate and prohibited use of IT systems/resources
■ Aims to protect organizations from legal issues and security threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information Security Policies

A

■ Outlines how an organization protects its information assets from threats, both internal and external
● Data Classification
● Access Control
● Encryption
● Physical Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Business Continuity Policy

A

Ensures operations continue during and after disruptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Disaster Recovery Policy

A

■ Focuses on IT systems and data recovery after disasters
■ Outlines data backup, restoration, hardware/software recovery, and alternative locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Incident Response Policy

A

■ Addresses detection, reporting, assessment, response, and learning from security incidents
■ Specifies incident notification, containment, investigation, and prevention steps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Software Development Lifecycle (SDLC) Policy

A

■ Guides software development stages from requirements to maintenance
■ Includes secure coding practices, code reviews, and testing standards
■ Ensures high-quality, secure software meeting user needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Change Management Policy

A

■ Ensures controlled, coordinated change implementation to minimize disruptions
■ Covers change request, approval, implementation, and review processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Password Standards

A

Define password complexity and management

17
Q

Access Control Standards

A

Determine who has access to resources within an organization
● Discretionary Access Control (DAC)
● Mandatory Access Control (MAC)
● Role Based Access Control (RBAC)

18
Q

Physical Security Standards

A

Cover physical measures to protect assets and information

19
Q

Encryption Standards

A

Ensure data remains secure and unreadable even if accessed without authorization

20
Q

Change Management

A

It aims to implement changes smoothly and successfully with minimal disruption

21
Q

Change Management Key Stages

A

● Identifying the need for change
● Assessing impacts
● Developing a plan
● Implementation
● Post-change review

22
Q

Playbooks

A

Detailed guides for specific tasks or processes

23
Q

Compliance Reporting

A

Systematic process of collecting and presenting data to demonstrate adherence to compliance requirements

24
Q

Compliance Monitoring

A

■ Regularly reviews and analyzes operations for compliance
■ Includes due diligence and due care, attestation and acknowledgement, and
internal and external monitoring

25
Q

Due Diligence

Compliance Monitoring

A

Identifying compliance risks through thorough review

26
Q

Due Care

Compliance Monitoring

A

Mitigating identified risks