Módulo 11 - Security Governance Concepts Flashcards

1
Q

List:
Key roles in security governance

A
  1. Owner
  2. Controller
  3. Processor
  4. Custodian
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List:
Governance guidelines

A
  1. Implement a structure that supports objectives
  2. Leverage expertise through committees
  3. Establish comprehensive policies, processes, and standards
  4. Implement change management programs
  5. Use automation and orchestration tools
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List:
Examples of global and regional privacy laws

A
  1. General Data Protection Regulation (GDPR)
  2. California Consumer Privacy Act (CCPA)
  3. Health Insurance Portability and Accountability Act (HIPAA)
  4. Federal Information Security Management Act (FISMA)
  5. Personal Information Protection and Electronic Documents Act (PIPEDA)
  6. Privacy Act 1988 (Australia)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List:
Sectors and corresponding cybersecurity laws - Healthcare

A

HIPAA, GDPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List:
Sectors and corresponding cybersecurity laws - Financial Services

A

Gramm-Leach-Bliley Act, PCI DSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List:
Sectors and corresponding cybersecurity laws - Telecommunications

A

Communications Assistance for Law Enforcement Act (CALEA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List:
Sectors and corresponding cybersecurity laws - Energy

A

North American Electric Reliability Corporation (NERC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List:
Sectors and corresponding cybersecurity laws - Education & Children:

A

FERPA, CIPA, COPPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List:
Sectors and corresponding cybersecurity laws - Government

A

FISMA, CJIS, GSC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List:
Examples of cybersecurity frameworks and regulations

A
  1. GDPR
  2. CCPA
  3. NIST
  4. ISO 27K
  5. CMMC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define:
Security governance

A

A framework guiding the management of cybersecurity risks, encompassing policies, standards, and guidelines to safeguard information assets and align security with organizational objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define:
Centralized governance

A

A governance model where decision-making authority resides with a core group or department, promoting consistency and standardization across the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define:
Decentralized governance

A

A governance model that distributes decision-making authority to different groups or departments, allowing tailored security practices based on localized needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define:
Hybrid governance

A

A governance structure combining centralized oversight with decentralized implementation, balancing standardization with flexibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define:
Owner (security role)

A

A high-ranking employee responsible for classifying data, determining access levels, and ensuring security measures align with business objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define:
Controller (security role)

A

A role, often associated with GDPR, that defines the purposes and means of processing personal data while ensuring compliance with legal requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define:
Processor (security role)

A

An entity, such as a cloud service provider, that processes personal data on behalf of the controller, ensuring secure handling and compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define:
Custodian (security role)

A

An entity, often the IT department, responsible for the safe custody, storage, and implementation of security controls for data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Acronym:
GDPR

A

General Data Protection Regulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Acronym:
CCPA

A

California Consumer Privacy Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Acronym:
HIPAA

A

Health Insurance Portability and Accountability Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Acronym:
FISMA

A

Federal Information Security Management Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Acronym:
NIST

A

National Institute of Standards and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Acronym:
CMMC

A

Cybersecurity Maturity Model Certification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Define:
Policies

A

High-level, authoritative documents outlining an organization’s security commitment and guiding decision-making, risk mitigation, and compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define:
Standards

A

Specific methods and outcomes used to implement technical and procedural requirements, ensuring consistency and compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define:
Procedures

A

Step-by-step instructions detailing how to perform specific tasks aligned with standards and policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define: Playbooks

A

Centralized, standardized strategies and tactics guiding personnel in operational consistency, quality improvement, and incident response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Define: Acceptable Use Policy (AUP)

A

A policy defining acceptable user behavior regarding network and computer systems, including browsing, content, and software usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

List: Common organizational policies

A
  1. Acceptable Use Policy (AUP)
  2. Information Security Policies
  3. Business Continuity & COOP
  4. Disaster Recovery
  5. Incident Response
  6. Software Development Life Cycle (SDLC)
  7. Change Management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

List: Industry standards

A
  1. ISO/IEC 27001 (ISMS framework)
  2. ISO/IEC 27002 (detailed guidance on ISMS controls)
  3. ISO/IEC 27017 (cloud-specific extension)
  4. ISO/IEC 27018 (PII in public clouds)
  5. NIST SP 800-63 (digital identity)
  6. PCI DSS (payment card data)
  7. FIPS (cryptographic standards)
32
Q

List: Internal security standards examples

A
  1. Password standards
  2. Access control standards
  3. Physical security standards
  4. Encryption standards
33
Q

List: Key components of encryption standards

A
  1. Encryption algorithms
  2. Key length
  3. Key management
34
Q

List: Benefits of playbooks

A
  1. Consistency in operations
  2. Knowledge sharing and continuity
  3. Risk mitigation and quality assurance
  4. Incident response and crisis management
35
Q

Acronym: ISMS

A

Information Security Management System

36
Q

Acronym: PCI DSS

A

Payment Card Industry Data Security Standard

37
Q

Acronym: FIPS

A

Federal Information Processing Standards

38
Q

Acronym: SDLC

A

Software Development Life Cycle

39
Q

Compare: Policies vs. Standards

A

Policies define high-level rules for security and compliance, while standards provide specific methods to implement those rules.

40
Q

Compare: Standards vs. Procedures

A

Standards define expected outcomes and configurations, while procedures detail the step-by-step tasks to achieve those outcomes.

41
Q

Compare: Centralized vs. Decentralized security governance

A

Centralized governance centralizes decision-making for consistency, while decentralized governance allows localized control for flexibility.

42
Q

What is the role of guidelines in security governance?

A

Guidelines provide flexible recommendations to steer actions and help individuals align with policies and improve effectiveness.

43
Q

Why are playbooks critical for incident response?

A

Playbooks detail emergency procedures and contingency plans, helping teams respond quickly and effectively to security incidents.

44
Q

How do standards support compliance?

A

Standards provide a measurable framework for implementing controls, ensuring regulatory requirements and best practices are met.

45
Q

What is Change Management?

A

Change management is a systematic approach to managing changes in IT infrastructure to minimize risks and disruptions while maximizing value.

46
Q

Define: Allow List in Change Management.

A

An allow list specifies approved changes, software, or individuals to streamline the change management process.

47
Q

Define: Deny List in Change Management.

A

A deny list blocks unauthorized or high-risk changes, software, or actions to prevent unintended impacts.

48
Q

What is Version Control?

A

Version control tracks and manages changes to documents, code, or configurations, ensuring consistency and providing rollback capabilities.

49
Q

What are the steps in a typical change management approval process?

A
  1. Submit Request for Change (RFC)
  2. Review by change manager or committee
  3. Formal approval by stakeholders
  4. Implementation with testing and rollback plans
  5. Post-implementation review and documentation.
50
Q

What should every change request include?

A

Details of the change, reasons, potential impacts, a rollback plan, and documentation.

51
Q

What are the critical elements of a change implementation plan?

A
  1. Testing procedures
  2. Rollback or remediation plans
  3. Scheduling to minimize downtime
  4. Stakeholder communication.
52
Q

How can allow and deny lists impact change management?

A

Allow lists streamline trusted changes; deny lists prevent risky changes. Improperly configured lists can disrupt software updates or patching.

53
Q

What is the risk of dependencies in change management?

A

Changes to one system may unintentionally disrupt dependent systems, causing broader outages or downtime.

54
Q

Which documents are impacted by change management?

A
  1. Change requests
  2. Policies and procedures
  3. System/process documentation
  4. Configuration management
  5. Training materials
  6. Incident response and recovery plans.
55
Q

How often should documentation be updated in change management?

A

Documentation should be updated whenever significant changes occur, ensuring accuracy and alignment with current processes.

56
Q

What steps should be taken for a legacy system update?

A
  1. Extensive testing for compatibility
  2. Detailed implementation and rollback plans
  3. Use of virtualization or custom solutions
  4. Update documentation and ensure training.
57
Q

What factors must be considered for changes requiring downtime?

A
  1. Scheduling during maintenance windows
  2. Notifying stakeholders
  3. Mitigating impacts on dependent services
  4. Implementing post-change performance monitoring.
58
Q

Compare: Allowed vs. Blocked changes.

A

Allowed changes are pre-approved, routine, or low-risk. Blocked changes are high-risk, unauthorized, or incompatible with systems.

59
Q

Compare: Scheduled vs. Unscheduled Downtime.

A

Scheduled downtime is planned for maintenance, minimizing disruption. Unscheduled downtime occurs unexpectedly due to issues or failures.

60
Q

What are examples of changes requiring service restarts?

A
  1. Software upgrades and patches
  2. Configuration changes
  3. Infrastructure updates
  4. Security feature implementations.
61
Q

What is the role of stakeholders in change management?

A

Stakeholders review, approve, and provide insights into proposed changes to minimize risks and ensure alignment with objectives.

62
Q

What is Automation in IT operations?

A

Automation uses software to perform repetitive, rule-based tasks like monitoring threats, applying patches, and maintaining baselines to improve efficiency and reduce errors.

63
Q

What is Orchestration in IT operations?

A

Orchestration coordinates and streamlines automated processes across systems to enable seamless, integrated workflows in complex environments.

64
Q

What is a Standard Baseline in Configuration Management?

A

A standard baseline is a predefined set of approved configurations used as a reference to maintain the desired state of a system.

65
Q

What is the role of automation in change management?

A

Automation reduces human error, speeds up implementation, and provides clear audit trails for tracking changes.

66
Q

How does orchestration improve incident response?

A

Orchestration automates threat detection, isolation, reporting, and ticket generation, reducing reaction times and enabling faster resolutions.

67
Q

What are the key benefits of automation in security operations?

A
  1. Reduces operator fatigue
  2. Improves efficiency and accuracy
  3. Frees staff for strategic tasks
  4. Enforces standardized baselines
  5. Enhances threat detection and response.
68
Q

How does automation benefit infrastructure management?

A

Automation ensures consistency, saves time, enhances scalability, strengthens security, and simplifies auditing and compliance.

69
Q

How can automation improve staff retention?

A

By reducing repetitive tasks, automation allows staff to focus on more rewarding and creative work, increasing job satisfaction.

70
Q

What are the key challenges of implementing automation and orchestration?

A
  1. Complexity in integration
  2. High initial cost
  3. Risk of single points of failure
  4. Accruing technical debt
  5. Need for ongoing support and updates.
71
Q

What is Technical Debt in the context of automation?

A

Technical debt arises when automation tools are implemented hastily, resulting in poor documentation, brittle systems, and increased maintenance costs.

72
Q

How can automation handle newly added hardware in a network?

A

Automation enforces standard configurations, ensuring new hardware is up-to-date, secure, and consistent with organizational policies.

73
Q

What happens if a critical automated system fails?

A

It creates a single point of failure that can disrupt multiple areas, causing widespread operational problems.

74
Q

Compare: Automation vs. Orchestration.

A

Automation handles repetitive tasks independently, while orchestration coordinates automated tasks across systems to create integrated workflows.

75
Q

How can orchestration reduce response times to security threats?

A

Orchestration automatically isolates affected systems, generates reports, notifies teams, and documents incidents without human intervention.

76
Q

What is the importance of audit trails in automation?

A

Audit trails track automated changes and processes, supporting compliance, investigation, and transparency.

77
Q
A