Governance, Risk, & Compliance Flashcards
What are the three categories of Security Control?
- Managerial (Controls that address security design and implementation; policies)
- Operational (Controls that are implemented by people; security guards, awareness programs)
- Technical (firewalls, antivirus, etc.)
List examples of Corrective control types?
- an IPS blocking an attacker
- Using backups to mitigate a ransomware infection
- A backup site when a storm hits
List examples of Compensating control types?
- re-imaging a device from backup
- A hot site
- a backup power generator
- Or, per an alternative definition, anything put in place as an easier/cheaper alternative to a better control.
Explain
GDPR
- General Data Protection Regulation
- Allows individuals in the EU to control what happens with their info
- Users must be aware of where data is stored and can control its export / where it goes
- “Right to be forgotten” – user requests for deletion of their data must be followed
- Every website must provide a detailed privacy policy
Define
PCI DSS
- Payment Card Industry Data Security Standard
- A standard for protecting credit card info
- Not a set of laws or regulations, but guidelines managed by the payment card industry
What are the 6 control objectives of PCI DSS?
- Build and maintain a secure network and systems
- Protect cardholder data
- Maintain a vulnerability management program
- Implement strong access control measures
- Regularly monitor and test networks
- Maintain an information security policy
Define
Security Framework
- A guide for creating a security program
- Document processes
- Defines tasks and prioritizes projects
Explain
CIS CSC
- Center for Internet Security Critical Security Controls for Effective Cyber Defense
- A security framework, designed to help you improve cyber defenses
- Twenty key actions (the CSCs)
- Categorized with different recommendations for different organization sizes
Explain
NIST RMF
- National Institute of Standards and Technology Risk Management Framework
- A security framework
- mandatory for US federal agencies, and any organization that handles federal data
Explain
NIST CSF
- National Institute of Standards and Technology Cybersecurity Framework
- Designed for commercial organizations; voluntary rather than mandatory.
What security frameworks are useful at an international level?
- ISO/IEC has several frameworks
- International Organization for Standardization / International Electrotechnical Commission
Define
SSAE SOC 2 Type I/II
- an auditing standard from the American Institute of CPAs (AICPA)
- The Statement on Standards for Attestation Engagements (SSAE)
- Include several reports. The suite of reports related to security controls is SOC 2
- System and Organization Controls (SOC) Number 2
- Audit covers firewalls, intrusion detection, MFA, etc.
Difference between SOC 2 Type 1 and SOC 2 Type 2?
- a Type I audit tests security controls in place at a particular point in time
- a Type II audit tests controls over a period of at least six consecutive months
Define
ISO 27001
- an international specification for information security management systems
- details documentation, management responsibility, internal audits, continual improvement, and corrective and preventive action
- Organizations meeting all requirements can be certified as ISO 27001 compliant
Define
ISO 37000
- international guidelines for risk management
- can be applied across a variety of industries, to any size company
- guidelines only; not requirements. There is no certification of compliance.
Define
CSA
- Cloud Security Alliance
- A not-for-profit organization that focuses on security in the cloud
- Developed the CCM (Cloud Controls Matrix)
Define
CCM
- Cloud Controls Matrix
- a security framework
- Developed by CSA (Cloud Security Alliance)
- Cloud-specific security controls
- Controls are mapped to standards, best practices, and regulations
What does this stand for?
AUP
• Acceptable Use Policy
Define:
Job Rotation
- Keep people moving between responsibilities
- No one person maintains control for long periods of time
- Benefits of cross-training, but also security as an individual is less likely to take advantage of vulnerabilities if they do not stay in one place for as long, and subsequent workers will see their work
Define:
Mandatory Vacations
- Rotates others through the job to ensure that fraud is not occurring
- Rarely seen in the business world but may be important in high-security environments
What are two examples of Separation of Duties?
- Split knowledge: No single person has all the details
* Dual Control: Two people must be present to perform the function
Define:
CBT
- Computer-Based Training
* Automated pre-built training that users receiving
Define
MOU
- Memorandum of Understanding
- Informal letter of intent; not a contract, not legally binding
- Often used when a contract is not possible
- Both sides agree on the contents of the memorandum
Define
MSA
- Measurement Systems Analysis
- A process that assesses a measurement system, and calculates the amount of uncertainty in the measurement
- Used with quality management systems, i.e., Six Sigma