Information Security Governance Flashcards
Security governance is supported by the documents
ISO/ICE 17799 (ISO 27002), British Standard 77 99 (ISO 27001), ISACA CobiT, NIST SP 800-55, 800-26, 800-12
Governance is the process by …
governments are selected, held accountable, monitored, and replaced.
Corporate governance is …
a set of relationships among the organization’s management, board, stakeholders.
Corporate governance provides …
objectives, means, and ability to monitoring
An effective security governance has four components:
1) Establish the responsibilities for each group of management and employees, 2) establish practical security policies and procedures backed by the authority, 3) ability to capture and provide meaningful information on program effectiveness, and 4) periodic analysis of the program.
Maturity level 1 of security program
Control objectives have been documented in a policy
Maturity level 2 of security program
Security control processes have been documented in procedures
Maturity level 3 of security program
Supporting procedures have been implemented.
Maturity level 4 of security program
Policies, procedures, and controls are tested and reviewed to ensure continued adequacy
Maturity level 5 of security program
Procedures and controls are fully integrated into the culture of the organization.
The information strategy must address three key concepts …
Identification, authentication, and authorization
Authorization shall follow two key elements …
Need to know and least privilege.
Effective security strategy requires at a minimum of five key elements …
Policies, procedures, authentication, authorization, and recovery plan.
An effective information security strategy requires four types of controls …
preventive, detective, containment, and recovery.
Business Continuity Planning, BCP, is a corporate requirement and must be integrated with
the IT Disaster Recovery Plan (DRP).