IT Governance Flashcards
3 Types of Governance Models
- Centralized
- Decentralized
- Hybrid
Due Diligence
Pre-emptive measure made to avoid harm to other persons or their property
Leads to due care
Examples: employee background checks, credit checks, risk assessments
Due Care
Used to describe the care a “reasonable person” would exercise under given circumstances
Individual’s or organization’s legal duty
Lack of due care = negligence
Types of Security Policies
- Organizational or Program Policy
- Functional, Issue Specific Policies
- System Specific Policies
Organizational or Program Policy
Addresses goals of confidentiality, integrity, and availability
Functional, Issue Specific Policies
Addresses areas of particular security concern requiring clarification
System Specific Policies
Areas where it is desired to have clearer direction or greater control for a specific technical or operational area may have more detailed policies
Standards
Specific requirements for systems in an organization
Requires consistency across the organization
Hardware and software security mechanisms needed in controlling security risks
Policies
Define what organizations need
Baselines
Describes how to best implement the security configuration or standard of a software or environment to ensure that it is consistent throughout the organization
Specific rules describing how to implement the best security controls in support of policy and standards
Procedures
Step-by-step instructions to support compliance with the policies and standards (best way to implement)
Guidelines
Optional recommendations that can be used to enable individuals to make judgments with respect to security actions
Security Policy Best Practices
- Clearly defined process for policy initiation, creation, review, approval,
distribution and communication - Do not be too specific in policy statements
- Use forceful, directive wording
- Policies must be technology independent
- Provide references to supporting documentation
- Conduct management review and sign-off
- Employees should explicitly acknowledge policies
- Define policy exception rules
- Review incidents and adjust policies as needed
- Periodically review policies
- Develop sanctions for non-compliance
Directive Controls
- Information security policies
- Procedures
- Standards
- Baselines
- Guidelines
Factors that Drive Frequency of Monitoring
- Organizational mission/business functions, and their ability to use monitoring results to facilitate greater situational awareness
- Anticipated frequency of changes in organizational information systems and operating environments
- Potential impact of risk if not properly addressed
- Degree to which the threat space is changing