Lesson 16: Explaining Organization Security Concepts Flashcards
security posture
- organization needs to create proper documentation to help staff understand and fulfill their responsibilities and to follow proper procedures
- adopting an effective security posture is a difficult and costly change for an organization to make, as it involves disruption to normal practice at almost every level without any tangible reward or benefit
corporate security policy
aim of a corporate security policy should be to obtain support for security awareness in the organization and outline in general terms the risks, guidelines, and responsibilities
standard
measure by which to evaluate compliance with the policy
procedure
often referred to as a standard operating procedure (SOP), is an inflexible, step-by-step listing of the actions that must be completed for any given task. Most critical tasks should be governed by SOPs
guidance
guidelines exist for areas of policy where there are no procedures, either because the situation has not been fully assessed or because the decision making process is too complex and subject to variables to be able to capture it in a procedure. Guidance may also describe circumstances where it is appropriate to deviate from a specified procedure
memorandum of understanding (MOU)
preliminary or exploratory agreement to express an intent to work together. MOUs are usually intended to be relatively informal and not to act as binding contracts. MOUs almost always have clauses stating that the parties shall respect confidentiality, however
memorandum of agreement (MOA)
formal agreement (or contract) that contains specific obligations rather than a broad understanding. If one party fails to fulfill its obligations, the other party will be able to seek redress under the terms of the agreement through the courts
service level agreement (SLA)
contractual agreement setting out the detailed terms under which a service is provided
business partners agreement (BPA)
while there are many ways of establishing business partnerships, the most common model in IT is the partner agreements that large IT companies (such as Microsoft and Cisco) set up with resellers and solution providers
interconnection security agreement (ISA)
- defined by NIST’s SP800-47 “Security Guide for Interconnecting Information Technology Systems”
- any federal agency interconnecting its IT system to a third party must create an ISA to govern the relationship. An ISA sets out a security risk awareness process and commits the agency and supplier to implementing security controls
non-disclosure agreement (NDA)
egal basis for protecting information assets. NDAs are used between companies and employees, between companies and contractors, and between two companies. If the employee or contractor breaks this agreement and does share such information, they may face legal consequences. NDAs are useful because they deter employees and contractors from violating the trust that an employee places in them
data handling (or document management)
process of managing information over its lifecycle (from creation to destruction). At each stage of the lifecycle, security considerations are vital
data policy
- describes the security controls that will be applied to protect data at each stage of its lifecycle
- important in reducing the risk of data loss or theft
legal and compliance
reasons for enforcing strict data policies
data governance
- company with formal data governance policy will define following roles:
- data owner - senior (executive) role with ultimate responsibility for maintaining the confidentiality, integrity, and availability of information asset
- data steward - primarily responsible for data quality. This involves tasks such as ensuring data is labelled and identified with appropriate metadata and that data is collected and stored in a format and with values that comply with applicable laws and regulations
- data custodian - responsible for managing the system on which the data assets are stored. This includes responsibility for enforcing access control, encryption, and backup/recovery measures
- privacy officer - ole is responsible for oversight of any personally identifiable information (PII) assets managed by the company - ensures that the processing and disclosure of PII complies with legal and regulatory frameworks
workflow
describes how editorial changes are made and approved