Misc Governance, Risk, and Compliance Flashcards
SLA
Service level agreement - defines the level of service the customer expects from the service provider. The level of service definitions should be specific and measurable in each area
MOU
memorandum of understanding - a legal document that describes a mutual agreement between parties
ISA
interconnection security agreement - an agreement that specifies the technical and security requirements of the interconnection security requirements of the interconnection between organizations.
BPA
business partnership agreement - a legal agreement between partners. It establishes the terms, conditions, and expectations of the relationship between the partners
Risk severity = X*Impact
likelihood of occurrence
RPO
Recovery point objective - specifies the allowable data loss. It is the amount of time that can pass during an interruption before the quantity of data lost during that period surpasses business continuity planning’s maximum acceptable threshold
MTTR
Mean time to repair - the average time it takes for a failed device or component to be repaired or replaced
MTBF
mean time between failures - the rating on a device or component that predicts the expected time between failures.
ARO
annual rate of occurrence - is the ratio of an estimated possibility that a threat will take place within a one-year time frame.
AUP
acceptable use policy - describes the limits and guidelines for users to make use of an organization’s physical and intellectual resources. This includes allowing or limiting the use of personal email during work hours.
BIA
Business Impact Analysis - helps to identify critical systems by determining which systems will create the largest impact if they are not available.
ISO 27002
a global standard that outlines guidelines for creating and sustaining information security systems
ISO 27017
a standard for cloud security
NIST 800-12
a general security standard that is specific to the United States, not recognized internationally
NIST 800-14
a U.S. standard that focuses on policy development rather than information security management systems