Governance, Risk, and Compliance Flashcards

1
Q

Security risks are out there
- Many different types to consider

Assets are also varied
- Data, physical property, computer systems

Prevent security events, minimize the impact, and limit the damage

A

Security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Controls that addresses security design and implementation

Security policies, standard operating procedures

A

Managerial control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Controls that are implemented by people

Security guards, awareness programs

A

Operational controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Controls implemented using systems

Operating system controls

Firewalls, anti-virus

A

Technical controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Physically control access

Door lock

Security guard

Firewall

A

Preventive (control type)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

May not prevent access

Identifies and records any intrusion attempt

Motion detector, IDS/IPS

A

Detective (control type)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Designed to mitigate damage

IPS can block an attacker

Backups can mitigate a ransomware infection

A backup site can provide options when a storm hits

A

Corrective (control type)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

May not directly prevent access

Discourages an intrusion attempt

Warning signs, login banner

A

Deterrent (control type)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Doesn’t prevent an attack

Restores using other means

Re-image or restore from backup

Hot-site

Backup power system

A

Compensating (control type)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fences, locks, mantraps

Real-world security

A

Physical (control type)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Meeting the standards of law, policies, and regulations

A healthy catalog of regulations and laws
- Across many aspects of business and life
- Many are industry-specific or situational

Penalties
- Fines, incarceration, loss of employment

Scope
- Covers national territory, or state laws
- Domestic and international requirements

A

Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

European Union regulation
- Data protection and privacy for individuals in the EU
- Name, address, photo, email address, bank details, posts on social networking websites, medical information, a computer’s IP address, etc

Controls export of personal data
- Users can decide where their data goes

Gives individuals control of their personal data
- A right to be forgotten

Site privacy policy
- Details all of the privacy rights for a user

European Union data protection and privacy

Personal data must be protected and managed for privacy

A

General Data Protection Regulation (GDPR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A standard for protecting credit cards

Six control objectives
- Build and maintain a secure network and systems
- Protect cardholder data
- Maintain a vulnerability management program
- Implement strong access control measures
- Regularly monitor and test networks
- Maintain and information security policy

A

Payment Card Industry Data Security Standard (PCI DSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Secure your data

Often a complex problem
- Unique organizational requirements
- Compliance and regulatory requirements
- Many different processes and tools are available
- Documented process
- A guide for creating a security program
- Define tasks and prioritize projects

A

Security frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Critical Security Controls for Effective Cyber Defense

Improve cyber defenses
- Twenty key actions (the critical security controls)
- Categorized for different organizational sizes

Designed for implementation - Written for IT professionals
- Includes practical and actionable tasks

A

Center for Internet Security (CIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mandatory for US federal agencies and organizations that handle federal data

Six step process
- Step 1: Categorize - Define the environment
- Step 2: Select - Pick appropriate controls
- Step 3: Implement - Define proper implementation
- Step 4: Access - Determine if controls are working
- Step 5 Authorize - Make a decision to authorize the system
- Step 6 Monitor - Check for ongoing compliance

A

National Institute of Standards and Technology - Risk Management Framework (NIST RMF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Framework Core
- Identify, Protect, Detect, Respond, and Recover

Framework Implementation Tiers
- An organization’s view of cybersecurity risk and processes to manage the risk

Framework Profile
- The alignment of standards, guidelines, and practices to the Framework Core

A

National Institute of Standards and Technology - Cybersecurity Framework (NIST CSF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Standard for Information Security Management System (ISMS)

A

ISO/IEC 27001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Code of practice for information security controls

A

ISO/IEC 27002

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Privacy Information Management Systems (PIMS)

A

ISO/IEC 27701

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

International standards for risk management practices

A

ISO 31000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The American Institute of Certified Public Accountants auditing standard Statement on Standards for Attestation Engagements number 18

A

SSAE 18

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Trust Services Criteria (security controls)
- Firewalls, intrusion detection, and multi-factor authentication

A

SOC 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Tests controls in place at a particular point in time

A

Type I audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Tests controls over a period of at least six consecutive months
Type II audit
26
Security in cloud computing - Not-for-profit organization Cloud Controls Matrix (CCM) - Cloud-specific security controls - Controls are mapped to standards, best practices, and regulations Enterprise Architecture - Methodology and tools - Access internal IT groups and cloud providers - Determine security capabilities - Build a roadmap
Cloud Security Alliance (CSA)
27
No system is secure with the default configurations - You need some guidelines to keep everything safe Hardening guides are specific to the software or platform - Get feedback from the manufacturer or Internet interest group - They'll have the best details Other general-purpose guides are available online
Secure configurations
28
Access a server with your browser - The fundamental server on the Internet - Microsoft Internet Information Server, Apache HTTP Server, et al Huge potential for access issues - Data leaks, server access Secure configuration - Information leakage: Banner information, directory browsing - Permissions: Run from a non-privileged account, configure file permissions - Configure SSL: Manage and install certificates - Log files: Monitor access and error logs
Web server hardening
29
Many and varied - Windows, Linux, iOS, Android, et al Updates - Operating system updates/service packs, security patches User accounts - Minimum password lengths and complexity - Account limitations Network access and security - Limit network access Monitor and secure - Anti-virus, anti-malware
Operating system hardening
30
Programming languages, runtime libraries, etc - Usually between the web server and the database - Middleware Very specific functionality - Disable all unnecessary services Operating system updates - Security patches File permissions and access controls - Limit rights to what's required - Limit access from other devices
Application server
31
Switches, routers, firewalls, IPS, etc - You never see them, but they're always there Purpose-build devices - Embedded OS, limited OS access Configure authentication - Don't use the defaults Check with the manufacturer - Security updates - Not usually updated frequently - Updates are usually important
Network infrastructure devices
32
What is an acceptable use of company assets? - Detailed documentation - May be documented in the Rules of Behavior Covers many topics - Internet use, telephones, computers, mobile devices, etc Used by an organization to limit legal liability - If someone is dismissed, these are the well-documented reasons why
Acceptable use policy (AUP)
33
Keep people moving between responsibilities - No one person maintains control for long periods of time
Job rotation
34
Rotate others through the job - The longer the vacation, the better chance to identify fraud - Especially important in high-security environments
Mandatory vacations
35
Split knowledge - No one person has all of the details - Half of the safe combination
Separation of duties
36
Two people must be present to perform the business function - Two keys open a safe (or launch a mission)
Dual control
37
When you leave, nothing is left on your desk - Limit the exposure of sensitive data to third-parties
Clean desk policy
38
Rights and permissions should be set to the bare minimum - You only get exactly what's needed to complete your objective All user accounts must be limited - Applications should run with minimal privileges Don't allow users to run with administrative privileges - Limits the scope of malicious behavior
Least privilege
39
Pre-employment screening Verify the applicant's claims Discover criminal history, workers compensation claims, etc Legalities vary by country Adverse actions - An action that denies employment based on this - May require extensive documentation - Can also include existing employees
Background checks
40
Confidentiality agreement/Legal contract - Prevents the use and dissemination of confidential information Confidentiality agreement between parties - Information in the agreement should not be disclosed Protects confidential information - Trade secrets - Business activities - Anything else listed Unilateral or bilateral (or multilateral) - One-way or mutual Foreign contract - Signatures are usually required
Non-disclosure agreement (NDA)
41
Gather data from social media Facebook, Twitter, Linkedin, Instagram Build a personal profile Another data point when making a hiring decision
Social media analysis
42
Bring a new person into the organization - New hires or transfers IT agreements need to be signed - May be part of the employee handbook or a separate AUP Create accounts - Associate the user with the proper groups and departments Provide required IT hardware - Laptops, tablets, etc
On-boarding
43
This process should be pre-planned - You don't want to decide how to do things at this point What happens to the hardware and the data? Account information is usually deactivated - But not always deleted
Off-boarding
44
Gamification - Score points, compete with others, collect badges Capture the flag (CTF) - Secure competition - Hack into a server to steal data (the flag) - Can involve highly technical simulations - A practical learning environment Phishing simulation - Send simulated phishing emails - Make vishing calls - See which users are susceptible to phishing attacks without being a victim of phishing Computer-based training (CBT) - Automated pre-built training - May include video, audio, and Q&A - Users all receive the same training experience
User training
45
Before providing access, train your users - Detailed security requirements Specialized training - Each user role has unique security responsibilities Also applies to third-parties - Contractors, partners, suppliers Detailed documentation and records - Problems later can be severe for everyone
Role-based security awareness training
46
Every organization works with vendors - Payroll, customer relationship management, email marketing, travel, raw materials Important company data is often shared - May be required for cloud-based services Perform a risk assessment - Categorize risk by vendor and manage the risk Use contracts for clear understanding - Make sure everyone understands the expectations - Use the contract to enforce a secure environment
Vendors
47
The system involved when creating a product - Involves organizations, people, activities, and resources Assessment - Get a product or service from supplier to customer - Evaluate coordination between groups - Identify areas of improvement - Assess the IT systems supporting the operation - Document the business process changes
Supply chain
48
Much closer to your data than a vendor - May require direct access - May be a larger security concern than an outside hacker Often involves communication over a trusted connection - More difficult to identify malicious activity Partner risk management should be included - Requirements for best practices, data handling, intellectual property Include additional security between partners - Firewalls and traffic filters
Business partners
49
Minimum terms for services provided Uptime, response time agreement, etc Commonly used between customers and service providers
Service Level Agreement (SLA)
50
Both sides agree on the contents Usually includes statements of confidentiality Informal letter of intent; not a signed contract
Memorandum of Understanding (MOU)
51
Don't make decisions based on incorrect data! Used with quality management systems Access the measurement process Calculate measurement uncertainty
Measurement system analysis (MSA)
52
Going into business together Owner stake Financial contract Decision-making agreements Prepare for contingencies
Business Partnership Agreement (BPA)
53
Manufacturer stops selling a product May continue supporting the product Important for security patches and updates
End of life (EOL)
54
Manufacturer stops selling a product Support is no longer available for the product No ongoing security patches or updates May have a premium-cost support option
End of service life (EOSL)
55
Rules, processes, and accountability associated with an organization's data - Data is used in the right ways Formal rules for data - Everyone must know and follow the processes
Data governance
56
Manages the governance process Responsible for data accuracy, privacy, and security Associates sensitivity labels to the data Ensures compliance with any applicable laws and standards
Data steward
57
Identify data types - Personal, public, restricted, etc - Use and protect data efficiently Associate governance controls to the classification levels - How the data class should be managed
Data classification
58
Laws and regulations regarding certain types of data GDPR - General Data Protection Regulation
Data compliance
59
Keep files that change frequently for version control - Files change often - Keep at least a week, perhaps more Recover from virus infection - Infection may be identified immediately - May need to retain 30 days of backups Often legal requirements for data retention - Email storage may be required over years - Some industries may legally store certain data types - Different data types have different storage requirements - Corporate tax information, customer PII, tap backups, etc
Data retention
60
All that stands between the outside world and all of the data - The data is everything Passwords must not be embedded in the application - Everything needs to reside on the server, not the client Communication across the network should be encrypted - Authentication traffic should be impossible to see
Credential management
61
An account on a computer associated with a specific person - The computer associates the user with a specific identification number Storage and files can be private to the user - Even if another person is using the same computer No privileged access to the operating system - Specifically not allowed on a user account This is the account type most people will see - Your user community
Personnel accounts
62
Access to external third-party systems - Cloud platforms for payroll, enterprise resource planning, etc Third-party access to corporate systems - Access can come from anywhere Add additional layers of security - 2FA (two factor authentication) - Audit the security posture of third-parties Don't allow account sharing - All users should have their own account
Third-party accounts
63
Access to devices - Mobile devices Local security - Device certificate - Require screen locks and unlocking standards - Mange through a Mobile Device Manager (MDM) Add additional security - Geography-based - Include additional authentication factors - Associate a device with a user
Device accounts
64
Used exclusively by services running on a computer - No interactive/user access - Web server, database server, etc Access can be defined for a specific service - Web server rights and permissions will be different than a database server Commonly use usernames and passwords - You'll need to determine the best policy for password updates
Service accounts
65
Elevated access to one or more systems - Super user access Complete access to the system - Often used to manage hardware, drivers, and software installation This account should not be used for normal administration - User accounts should be used Needs to be highly secured - Strong passwords, 2FA - Scheduled password changes
Administrator/root accounts
66
How to make a change - Upgrade software, change firewall configuration, modify switch ports One of the most common risks in the enterprise - Occurs very frequently Often overlooked or ignored - Did you feel that bite? Have clear policies - Frequency, duration, installation process, fallback procedures Sometimes extremely difficult to implement - It's hard to change corporate culture
Change management
67
A formal process for managing change - Avoid downtime, confusion, and mistakes Nothing changes without the process - Determine the scope of the change - Analyze the risk associated with the change - Create a plan - Get end-user approval - Present the proposal to the change control board - Have a backout plan if the change doesn't work - Document the changes
Change control
68
Identify and track computing assets - Usually an automated process Respond faster to security problem - you know who, what, and where Keep an eye on the most valuable assets - Both hardware and data Track licenses - You know exactly how many you'll need Verify that all devices are up to date - Security patches, anti-malware signature updates, etc
Asset management
69
Identify assets that could be affected by an attack - Define the risk associated with each asset - Hardware, customer data, intellectual property Identify threats - Loss of data, disruption of services, etc Determine the risk - High, medium, or low risk Assess the total risk to the organization - Make future security plans External threats - Outside the organization - Hacker groups, former employees Internal threats - Employees and partners - Disgruntled employees Legacy systems - Outdated, older technologies - May not be supported by the manufacturer - May not have security updates - Depending on the age, may not be easily accessible
Risk assessments
70
Breaches involving multiple parties - Often trusted business relationships - Events often involve many different parties
Multi-party risk
71
Theft of ideas, inventions, and creative expressions Human error, hacking, employees with access, etc Identify and protect IP Educate employees and increase security Stealing company secrets Can out an organization out of business
Intellectual Property (IP) theft
72
Operational risk with two few licenses Financial risk with budgeting and over-allocated licenses Legal risk if proper licensing is not followed
Software compliance/licensing
73
A business decision; we'll take the risk!
Risk Acceptance
74
Stop participating in a high-risk activity
Risk Avoidance
75
Buy some cybersecurity insurance
Risk Transference
76
Decrease the risk level Invest in security systems
Risk Mitigation
77
Every project has a plan, but also has risk - Identify and document the risk associated with each step - Apply possible solutions to the identified risks - Monitor the results
Risk register
78
View the results of the risk assessment - Visually identify risk based on color - Comes the likelihood of an event with the potential impact - Assists with making strategic decisions
Evaluating risk
79
Impact + Likelihood Risk that exists in the absence of controls Some models include the existing set of controls
Inherent risk
80
Inherent risk + control effectiveness Risk that exists after controls are considered Some models base it on including additional controls
Residual risk
81
The amount of risk an organization is willing to take
Risk appetite
82
Risk has been determined - Heat maps have been created Time to build cybersecurity requirements - Based on the identified risks Find the gap - Often requires a formal audit - Self-assessments may be an option Build and maintain security systems based on the requirements - The organizational risk determines the proper controls Determine if existing controls are compliant or non-compliant - Make plans to bring everything into compliance
Risk control assessment
83
A constantly changing battlefield - New risks, emerging risks - A nearly overwhelming amount of information - Difficult to manage a defense Knowledge is key - Part of every employee's daily job role - Part of the onboarding process for employees and partners Maintaining awareness - Ongoing group discussions - Presentations from law enforcement - Attend security conferences and programs
Risk awareness
84
Many of them - Regulations tend to regulate Regulations directly associated to cybersecurity - Protection of personal information, disclosure of information breaches Requires a minimum level of information security
Regulations that affect risk posture
85
Privacy of patient records New storage requirements, network security, protect against threats
Health Insurance Portability and Accountability Act (HIPAA)
86
Identify significant risk factors - Ask opinions about the significance - Display visually with traffic light grid or similar method
Qualitative risk assessment
87
Likelihood - Annualized Rate of Occurrence (ARO) SLE (Single Loss Expectancy) - What is the monetary loss if a single event occurs? - Laptop stolen (asset value or AV) = $1000 ALE (Annualized Loss Expectancy) - ARO * SLE - Seven laptops stolen a year (ARO) * $1000 (SLE) = $7000 The business impact can be more than monetary
Quantitative risk assessment
88
Environment threats - Tornado, hurricane, earthquake, severe weather Person-made threats - Human intent, negligence, or error - Arson, crime, civil order, fires, riots, etc Internal and external - Internal threats are from employees - External threats are from outside the organization
Disaster types
89
Get up and running quickly Get back to a particular service level
Recovery time objective (RTO)
90
How much data loss is acceptable? Bring the system back online; how far back does data go?
Recovery point objective (RPO)
91
Time required to fix the issue
Mean time to repair (MTTR)
92
Predict the time between outages
Mean time between failures (MTBF)
93
Recover from an outage - Step-by-step guide Contact information - Someone is on-call - Keep everyone up to date Technical process - Reference the knowledge base - Follow the internal processes Recover and test - Confirm normal operation
Functional recovery plan
94
A single event can ruin your day - Unless you make some plans Network configuration - Multiple devices Facility/Utilities - Backup power, multiple cooling devices People/Location - A good hurricane can disrupt personnel travel There's no practical way to remove all points of failure - Money drives redundancy
Removing single points of failure
95
Detailed plan for resuming operations after a disaster - Application, data center, building, campus, region, etc Extensive planning prior to the disaster - Backups - Off-site data replication - Cloud alternatives - Remote site Many third-party options - Physical locations - Recovery Services
Disaster Recovery Plan (DRP)
96
Life - The most important consideration Property - The risk to buildings and assets Safety - Some environments are too dangerous to work Finance - The resulting financial cost Reputation - An event can cause status or character problems
Impact of DRP
97
All locations are a bit different - Even those designed to be similar Recovery plans should consider unique environments - Applications - Personnel - Equipment - Work environment
Site risk assessment
98
Creation and receipt - Create data internally or receive data from a third-party Distribution - Records are sorted and stored Use - Make business decisions, create products and services Maintenance - Ongoing data retrieval and data transfers Disposition - Archiving or disposal of data
Information life cycle
99
Opinion of the organization becomes negative Can have an impact on products or services Can impact stock price
Reputation damage
100
Company and/or customers information becomes public May require public disclosure Credit monitoring costs
Identify theft
101
Breaches are often found by technicians Provide a process for making those findings known
Internal escalation process (Notification)
102
Know when to ask for assistance from external resources Security experts can find and stop an active breach
External escalation process (Notification)
103
Almost everything can affect privacy - New business relationships, product updates, website features, service offering Privacy risk needs to be identified in each initiative - How could the process compromise customer privacy?
Privacy impact assessment (PIA)
104
Fix privacy issues before they become a problem Provides evidence of a focus on privacy Avoid data breach Shows the importance of privacy to everyone
Advantages of Privacy impact assessment
105
Terms of use, terms and conditions Legal agreement between service provider and user User must agree to the terms to use the service
Terms of Service
106
May be required by law Documents the handling of personal data May provide additional data options and contact information
Privacy notice, privacy policy
107
Not all data has the same level of sensitivity - License tag numbers vs health records Different levels require different security and handling - Additional permissions - A different process to view - Restricted network access
Labeling sensitive data
108
Data that is the property of an organization May also include trade secrets Often data unique to an organization
Proprietary
109
Data that can be used to identify an individual Name, DOB, mother's maiden name, biometric information
Personally Identifiable Information (PII)
110
Health information associated with an individual Health status, health care records, payments for health care, and much more
Protected Health Information (PHI)
111
No restrictions on viewing the data
Public/Unclassified
112
Restricted access, may require a non-disclosure agreement (NDA)
Private/Classified
113
Intellectual property, PII, PHI
Sensitive
114
Very sensitive, must be approved to view
Confidential
115
Data should always be available
Critical
116
Internal company financial information Customer financial details
Financial Information
117
Open data Transfer between government entities May be protected by law
Government data
118
Data associated with customers May include user-specific details Legal handling requirements
Customer data
119
Replace sensitive data with a non-sensitive placeholder - SSN 266-12-1112 is now 691-61-8539 Common with credit card processing - Use a temporary token during payment - An attacker capturing the card numbers can't use them later This isn't encryption or hashing - The original data and token aren't mathematically related - No encryption overhead
Tokenization
120
Minimal data collection - Only collect and retain necessary data Included in many regulations - HIPAA has a "Minimum Necessary" rule Some information may not be required - Do you need a telephone number or address? Internal data use should be limited - Only access data required for the task
Data minimization
121
Make it impossible to identify individual data from a dataset - Allows for data use without privacy concerns Many different anonymization techniques - Hashing, masking, etc Convert from detailed customer purchase data - Remove name, address, change phone number to ### ### #### - Keep product name, quantity, total, and sale date Cannot be reversed - No way to associate the data to a user
Anonymization
122
High-level data relationships - Organizational responsibilities, not always technical
Data responsibility
122
Data obfuscation - Hide some of the original data Protects PII - And other sensitive data May only be hidden from view - The data may still be intact in storage - Control the view based on permissions Many different techniques - Substituting, shuffling, encrypting, masking out, etc
Data masking
122
Replace personal information with pseudonyms Often used to maintain statistical relationships May be reversible - Hide the personal data for daily use or in case of breach - Convert it back for other processes Random and consistent replacements
Pseudo-anonymization
123
Accountable for specific data, often a senior officer VP of Sales owns the customer relationship data Treasurer owns the financial information
Data owner
124
Manages the purposes and means by which personal data is processed
Data controller
125
Processes data on behalf of the data controller - Often a third-party of different group
Data processor
126
Payroll department (data controller) defines payroll amounts and timelines Payroll company (data processor) processes payroll and stores employee information
Payroll controller and processor
127
Responsible for data accuracy, privacy, and security Associates sensitive labels to the data Ensures compliance with any applicable laws and standards Manages the access rights to the data Implements security controls
Data custodian/steward
128
Responsible for the organization's data privacy Set policies, implements processes and procedures
Data protection officer