Important Terms/Topics Flashcards
Data Subjects
Data Subjects are individuals whose personal data is being processed. This can include customers, employees and partners. Data Subjects often have rights regarding their data, such as the right to access, correct, or request the deletion of their data.
Data Controllers
Data Controllers are the entities who determine the reasons for processing personal information and direct the methods of processing that data.
Data Custodians
Data Custodians are individuals or teams who do not have controller or stewardship responsibility of data but are responsible for the secure safekeeping of information.
For example, a data controller might delegate responsibility for securing PII to an information security team. In that case, the information security team serves as a data custodian.
Data Processors
Data Processors are service providers that process personal information on behalf of a data controller.
Root of Trust (Boot)
A Root of Trust based secure boot process validates each signed component as it starts and ensures that the trusted components are all loaded as part of the boot process.
Fuzzing
Fuzzing is a technique whereby the tester intentionally enters incorrect values into input fields to see how the application will handle it.
COPE (corporate-owned, personally enabled)
COPE provides devices to users that they can then use for personal use.
Data Steward
Data Stewards are individuals who carry out the intent of the data controller and are delegated responsibility from the controller. This means they carry out data usage and security policies and ensure that data is handled appropriately.
What is the difference between standards and policies?
Policies are a statement of organizational intent. Standards are defined to help organizations achieve that intent through the use of rules.
Key Escrow
Key Escrow refers to a process where encryption keys are retained by the organization in case the files on the drive need to be accessed by someone with proper authority.
KMS
Key Management Systems allow you to safely store and manage secrets like keys and certificates. Centralizing a KMS allows organizations to effectively manage their secrets, including tracking their life cycle and rotation.
Fault Tolerance & High Availability
High availability designs are less expensive because they attempt to minimize service interruptions, whereas fault-tolerant designs seek to avoid service interruptions almost entirely, and thus cost significantly more.
Fault tolerance is more preventative than high availability.
SASE
SASE stands for Secure Access Service Edge. It’s a network architecture that combines network security functions with wide-area networking capabilities to support the dynamic, secure access needs of organizations, particularly those with distributed workforces and cloud-based applications. Essentially, SASE aims to provide comprehensive security and networking services from a single cloud-based platform, optimizing performance and simplifying management for businesses.
SD-WAN is the core of a SASE implementation.
VPC Endpoint
A Virtual Private Cloud endpoint is a way to directly connect to services inside of a cloud provider without an Internet gateway.
Security Groups (Cloud)
Security groups are a virtual firewall for instances, allowing rules to be applied to traffic between instances.