Module 3 Governance, Risk and Compliance Flashcards
Two Governance Components
- Separation of Duties
2. Policy Definition
GRC
Governance
Risk
Compliance
3 Characteristics of GRC
- Integrated and holistic
- Organization structures
- Process oriented
Two Risk Management Components
- Change Management
2. Configuration Management
Two Compliance Components
- Adherence to Regulations
2. Industry Aligned
Integrated approach to organization-wide governance, risk management, and compliance.
GRC
Helps ensure that an organization acts ethically correct and in accordance with its risk appetite, internal policies and external regulations.
GRC
Integrated, holistic, and organization-wide
GRC
Managed and supported through GRC
Operations
Defines the guidelines and performance goals of an organization.
Governance
Must include measurements of success to determine if the operation is performing to the company’s standard and, if not, what type of remediation is required.
Governance
Four Consequences of Bad / Failed / No GRC
- Risk of fines for failed audits.
- Compliance concerns stall virtualization and Cloud.
- Audits - time consuming and costly.
- Concerns of identifying risk and proper valuation.
Examples of external events that drive a company to have a GRC program
- A breach where information is lost and has to be reported due to regulations.
- A new Federal regulation
Companies usually accept the risk of exposure until what?
Until they have an actual breach
Why GRC is important
- Breach
- Regulation
- Other?
Is security GRC?
No. Security is not GRC.
- Related to information processing systems.
2. Mechanisms and techniques that control who may use or modify the computer or the information stored in it.
Security
Three key security tenets
- Confidentiality
- Integrity
- Availability
CIA
CIA
Confidentiality
Integrity
Availability
Purpose of IT security
To mitigate risks
IT risks are coupled with what?
Business risks
A framework for decision making, accountability, and measuring success.
Governance
Data protection and regulatory laws require what?
Security controls
How does Compliance relate to Security?
- Data protection and regulatory laws require security controls.
- Access to information and enforcement.
Related to information processing systems
Security
Mechanisms and techniques that control who may use or modify the computer or the information stored in it.
Security
Key security rule regarding information
Always ensure that your company owns the information; retain ownership no matter who stores / maintains it.
Key security rule regarding the Cloud
Make your information Cloud ready - clearly understand:
- Data you’re putting in the Cloud.
- Regulations and legislation surrounding that data.
- Worst case outcomes related to a breach of this information.
Required for data
A creation-to-deletion plan
Layered Security Approach
Take a layered approach to protections with defense-in-depth, measuring against the CIA model, and keep roles segregated.
Term for End-to-end Data Lifecycle
Information Lifecycle Management
Key because most regulated data has data lifecycle requirements and should be how all data is handled.
The end-to-end data lifecycle (Information Lifecycle Management)
Four GRC Requirements for Virtualize Step
- Visibility into virtual infrastructure
- Privileged user monitoring
- Access management
- Network security
Four GRC Requirements for Operationalize Step
- Security compliance
- Information-centric
- Risk-driven policies
- IT & security operations alignment
Three GRC Requirements for IT-as-a-Service Step
- Secure hyrbid Clouds
- Secure multi-tenancy
- Chain of trust
3 Infrastructure Characteristics for Virtualize Step
- Automation
- Efficiency
- Integration of virtual OS and infrastructure
3 Infrastructure Characteristics for Operationalize Step
- On-demand
- Service Level Management
- Increased range of capability
3 Infrastructure Characteristics for IT-as-a-Service Step
- Metering and charge-back
- Federation of resources
- Geographically independent
Must be included when securing hybrid Clouds
Secure multi-tenancy and hardware root of trust
How do enterprises need to look at the Cloud?
As an extension of the data center
Looking at the Cloud as an extension of the data center means what?
That security and GRC controls should already be in place and be enforceable with measurable results.
Most large enterprises fall between what two stages?
Between the Virtualize and Operationalize stages
7 Top Threats - Cloud Security Alliance (CSA)
- Abuse and nefarious use of Cloud computing
- Insecure interface and APIs
- Malicious insiders
- Shared technology issues
- Data loss or leakage
- Account or service hijacking
- Unknown risk profile
7 Top Threats - ENISA
- Loss of governance
- Lock-in
- Isolation failure
- Compliance risks
- Data protection
- Insecure or incomplete data deletion
- Malicious insider