ISC R1 Flashcards
Framework Implementation Tier: cybersecurity risk gauging
Tier 1
Tier 1 (partial) - not integrated, not formalized, ad-hoc (need based), reactive manner
Framework Implementation Tier: Gauging Cybersecurity Risk
Tier 2
Tier 2 (Risk-informed): approved by management but not org-wide policy. Has established risk management practices.
Framework Implementation Tier 3:
Tier 3 (Repeatable): risk management practices are consistently implemented. Adapt based on lesson learned and predictive indicators.
Framework Implementation Tier 4:
Tier 4 (Adaptive): adapt its lessons based on lessons learned and predictive indicators from previous and current cybersecurity activities. RM is part of org culture, evolves, continuous awareness.
COBIT 2019 Core Model: Governance Objectives:
EDM (Evaluate, Direct and Monitor) = ensuring business delivery, governance framework setting, risk optimization, resource optimization, shareholder engagement.
Three Principles of Governance Framework (COBIT):
- Based on Conceptual Model
- Open and Flexible
- Aligned to Major Standards
Most widely used enterprise IT Governance Standards
COBIT 2019 Framework (Control Objectives for Information and Related Technologies)
COBIT Management Objectives: APO
APO (Align, Plan and Organize)
- Managed data - most significant
- guidance on IT infrastructure, innovation, budgeting Human resources, vendors, quality, security and managing risk.
COBIT Management Objective: BAI
BAI (Build, Acquire, Implement)
- guidance on requirement definitions
- identifying solutions
- managing capacity,
- dealing with organizational IT change, managing knowledge, administering assets and managing configurations
COBIT Management Objective: DSS
DSS (Deliver, Service and Support)
- addresses security, delivery and support services
- manage operations, service request, manage problems, continuity, security services, business process controls
COBIT Management Objective: MEA
MEA (Monitor, Evaluate and Assess)
- technology conformance to performance targets
- manage performance and conformance monitoring, manage system internal controls, compliance, assurance
CIS Control 12 : securely managing the network, ensuring network components updated, establishing and maintaining a secure network
CIS Control: Network Infrastructure Management
Open Systems Interconnection (OSI)
How protocols work and how well networking devices work with each other - has 7 layers
OSI Layer 1
Physical - after decapsulation happens, converts message sent from data link layer, transmitted to other physical devices.
OSI Layer 2:
Data Link Layer - data packets are formatted for transmission. Determined by Ethernet. Adds Media Access Control
OSI Layer 3
Network Layer - adds routing or address header or footers to the data. IP addresses. Detect errors.
OSI Layer 4
Transport Layer - supports and controls communication between devices. Setting the rules, validating integrity, data can be transmitted, data has been lost.
OSI Layer 5
Session Layer - allows sessions between communicating devices to be established and maintained. Have dialogue with others.
OSI Layer 6
Presentation Layer - transforms data into a format others can interpret. Encryption occurs.
OSI Layer 7
Application Layer - serves as interface between application and the network protocol. Does not represent actual application being used.
CSP Deployment Model that provides entire virtual data center of resources. Company is responsible for keeping the environment consistently up and running, CSP is responsible for physical management of infrastructure. Org more control, CSP less control.
IaaS (Infrastructure-as-a-Service)
CSP Deployment Model that provides proprietary tools to fulfill a specific business purpose. Run on CSP’s hosted infrastructure. CSP is responsible for keeping the application uptime at acceptable level. CSP more control, Org less control.
Business PaaS (Plaftorm-as-a-Service)
CSP Deployment Model that provides business application or software that org use to perform specific functions or processes. Customers purchase through licensing. Access through internet - upgrades.
Software-as-a-Service (SaaS)
Cloud Risk
- Rate of competitor adoption
- Being in the same risk ecosystem as CSP and other tenants
- Transparency
- Reliability and Performance
- Lack of application portability
- Security and compliance
- Cyber attacks
- Data leakage
- IT Org change
- CSP long-term viability