Módulo 11 - Security Governance Concepts Flashcards
List:
Key roles in security governance
- Owner
- Controller
- Processor
- Custodian
List:
Governance guidelines
- Implement a structure that supports objectives
- Leverage expertise through committees
- Establish comprehensive policies, processes, and standards
- Implement change management programs
- Use automation and orchestration tools
List:
Examples of global and regional privacy laws
- General Data Protection Regulation (GDPR)
- California Consumer Privacy Act (CCPA)
- Health Insurance Portability and Accountability Act (HIPAA)
- Federal Information Security Management Act (FISMA)
- Personal Information Protection and Electronic Documents Act (PIPEDA)
- Privacy Act 1988 (Australia)
List:
Sectors and corresponding cybersecurity laws - Healthcare
HIPAA, GDPR
List:
Sectors and corresponding cybersecurity laws - Financial Services
Gramm-Leach-Bliley Act, PCI DSS
List:
Sectors and corresponding cybersecurity laws - Telecommunications
Communications Assistance for Law Enforcement Act (CALEA)
List:
Sectors and corresponding cybersecurity laws - Energy
North American Electric Reliability Corporation (NERC)
List:
Sectors and corresponding cybersecurity laws - Education & Children:
FERPA, CIPA, COPPA
List:
Sectors and corresponding cybersecurity laws - Government
FISMA, CJIS, GSC
List:
Examples of cybersecurity frameworks and regulations
- GDPR
- CCPA
- NIST
- ISO 27K
- CMMC
Define:
Security governance
A framework guiding the management of cybersecurity risks, encompassing policies, standards, and guidelines to safeguard information assets and align security with organizational objectives.
Define:
Centralized governance
A governance model where decision-making authority resides with a core group or department, promoting consistency and standardization across the organization.
Define:
Decentralized governance
A governance model that distributes decision-making authority to different groups or departments, allowing tailored security practices based on localized needs.
Define:
Hybrid governance
A governance structure combining centralized oversight with decentralized implementation, balancing standardization with flexibility.
Define:
Owner (security role)
A high-ranking employee responsible for classifying data, determining access levels, and ensuring security measures align with business objectives.
Define:
Controller (security role)
A role, often associated with GDPR, that defines the purposes and means of processing personal data while ensuring compliance with legal requirements.
Define:
Processor (security role)
An entity, such as a cloud service provider, that processes personal data on behalf of the controller, ensuring secure handling and compliance.
Define:
Custodian (security role)
An entity, often the IT department, responsible for the safe custody, storage, and implementation of security controls for data.
Acronym:
GDPR
General Data Protection Regulation
Acronym:
CCPA
California Consumer Privacy Act
Acronym:
HIPAA
Health Insurance Portability and Accountability Act
Acronym:
FISMA
Federal Information Security Management Act
Acronym:
NIST
National Institute of Standards and Technology
Acronym:
CMMC
Cybersecurity Maturity Model Certification
Define:
Policies
High-level, authoritative documents outlining an organization’s security commitment and guiding decision-making, risk mitigation, and compliance.
Define:
Standards
Specific methods and outcomes used to implement technical and procedural requirements, ensuring consistency and compliance.
Define:
Procedures
Step-by-step instructions detailing how to perform specific tasks aligned with standards and policies.
Define: Playbooks
Centralized, standardized strategies and tactics guiding personnel in operational consistency, quality improvement, and incident response.
Define: Acceptable Use Policy (AUP)
A policy defining acceptable user behavior regarding network and computer systems, including browsing, content, and software usage.
List: Common organizational policies
- Acceptable Use Policy (AUP)
- Information Security Policies
- Business Continuity & COOP
- Disaster Recovery
- Incident Response
- Software Development Life Cycle (SDLC)
- Change Management