ISC Deck 2 Flashcards
Cloud Service Provider (CSP)
relies on sharing of resources, is very secure and leads to economies of scale. managed by third parties
Is NOT on site, leads to fewer IT professionals.
BCP vs DR Plans
BCP is preventative and DR is corrective
DR is part of BCP
BCP is continuous.
Types of Security Controls
Physical (ID badges, security guards, generators)
Technical - IT controls (general or app)
Administrative (Seg of Duties)
Types of preventative and detective controls
Access control software - preventative
Echo Checks and Hash Total - Detective
IT Roles and their functions
Data Librarian - control over entity’s data
System’s analyst - investigates business system and decides how computer can be applied
Computer Operator - runs comp eq
Programmer - writes, tests and debugs programs for apps or systems.
System Steering committee - involved in long range plans and overseeing info systems.
Systems Programmer - programs OS, installs, upgrades and compiles
Business Impact Analysis (BIA)
Used to ID business units that are essential. Assesses time to return these to full functionality in event of a disruption.
Management Assertion applicable to ALL SOC report
That the description of the system is fairly presented
Two primary entities covered by GDPR
Data processors and Data Controllers.
Data Processors handle data but do NOT determine purpose. Controller does that.
COBIT 2019 Holistic Approach
Ensure that all enablers are implemented in a holistic manner
What is a validity check?
ensures that only authorized info is entered and accepted by the system.
Public Cloud
Client’s data is stored in the cloud and managed by a third party. Data is still secure and not available across orgs. Resources are also not shared.
Types of Encryption
Asymmetric Encryption - Public AND private key (more secure)
Symmetric Encryption - Public only
Purpose of Mgmt System Description for SOC2
enable report users to understand the system and the processing and flow of data. Prepare in accordance with specific criteria and describes procedures/controls in place to manage risk
SOC Independence
Must be independent of responsible party - service org. No independence required of user entity.
If subservice org is used and mgmt uses the inclusive, they become a responsible party which requires independence.
Device and Software Hardening
Reducing total vulnerabilities points and surfaces that can be attacked.