Governance, Risk, and Compliance Flashcards
Security risks are out there
- Many different types to consider
Assets are also varied
- Data, physical property, computer systems
Prevent security events, minimize the impact, and limit the damage
Security controls
Controls that addresses security design and implementation
Security policies, standard operating procedures
Managerial control
Controls that are implemented by people
Security guards, awareness programs
Operational controls
Controls implemented using systems
Operating system controls
Firewalls, anti-virus
Technical controls
Physically control access
Door lock
Security guard
Firewall
Preventive (control type)
May not prevent access
Identifies and records any intrusion attempt
Motion detector, IDS/IPS
Detective (control type)
Designed to mitigate damage
IPS can block an attacker
Backups can mitigate a ransomware infection
A backup site can provide options when a storm hits
Corrective (control type)
May not directly prevent access
Discourages an intrusion attempt
Warning signs, login banner
Deterrent (control type)
Doesn’t prevent an attack
Restores using other means
Re-image or restore from backup
Hot-site
Backup power system
Compensating (control type)
Fences, locks, mantraps
Real-world security
Physical (control type)
Meeting the standards of law, policies, and regulations
A healthy catalog of regulations and laws
- Across many aspects of business and life
- Many are industry-specific or situational
Penalties
- Fines, incarceration, loss of employment
Scope
- Covers national territory, or state laws
- Domestic and international requirements
Compliance
European Union regulation
- Data protection and privacy for individuals in the EU
- Name, address, photo, email address, bank details, posts on social networking websites, medical information, a computer’s IP address, etc
Controls export of personal data
- Users can decide where their data goes
Gives individuals control of their personal data
- A right to be forgotten
Site privacy policy
- Details all of the privacy rights for a user
European Union data protection and privacy
Personal data must be protected and managed for privacy
General Data Protection Regulation (GDPR)
A standard for protecting credit cards
Six control objectives
- Build and maintain a secure network and systems
- Protect cardholder data
- Maintain a vulnerability management program
- Implement strong access control measures
- Regularly monitor and test networks
- Maintain and information security policy
Payment Card Industry Data Security Standard (PCI DSS)
Secure your data
Often a complex problem
- Unique organizational requirements
- Compliance and regulatory requirements
- Many different processes and tools are available
- Documented process
- A guide for creating a security program
- Define tasks and prioritize projects
Security frameworks
Critical Security Controls for Effective Cyber Defense
Improve cyber defenses
- Twenty key actions (the critical security controls)
- Categorized for different organizational sizes
Designed for implementation - Written for IT professionals
- Includes practical and actionable tasks
Center for Internet Security (CIS)
Mandatory for US federal agencies and organizations that handle federal data
Six step process
- Step 1: Categorize - Define the environment
- Step 2: Select - Pick appropriate controls
- Step 3: Implement - Define proper implementation
- Step 4: Access - Determine if controls are working
- Step 5 Authorize - Make a decision to authorize the system
- Step 6 Monitor - Check for ongoing compliance
National Institute of Standards and Technology - Risk Management Framework (NIST RMF)
Framework Core
- Identify, Protect, Detect, Respond, and Recover
Framework Implementation Tiers
- An organization’s view of cybersecurity risk and processes to manage the risk
Framework Profile
- The alignment of standards, guidelines, and practices to the Framework Core
National Institute of Standards and Technology - Cybersecurity Framework (NIST CSF)
Standard for Information Security Management System (ISMS)
ISO/IEC 27001
Code of practice for information security controls
ISO/IEC 27002
Privacy Information Management Systems (PIMS)
ISO/IEC 27701
International standards for risk management practices
ISO 31000
The American Institute of Certified Public Accountants auditing standard Statement on Standards for Attestation Engagements number 18
SSAE 18
Trust Services Criteria (security controls)
- Firewalls, intrusion detection, and multi-factor authentication
SOC 2
Tests controls in place at a particular point in time
Type I audit