Play It Safe: Manage Security Risks Flashcards
Prepare, Categorize, Select, Implement, Assess, Authorize, and Monitor
Name the steps of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) in order
Assess
The fifth step of the NIST RMF that means to determine if established controls are implemented correctly.
Authorize
The sixth step of the NIST RMF that refers to being accountable for the security and privacy risks that may exist in an organization.
Business continuity
An organization’s ability to maintain their everyday productivity by establishing risk disaster recovery plans.
Categorize
The second step of the NIST RMF that is used to develop risk management processes and tasks.
External threat
Anything outside the organization that has the potential to harm organizational assets.
Implement
The fourth step of the NIST RMF that means to implement security and privacy plans for an organization.
Monitor
The seventh step of the NIST RMF that means be aware of how systems are operating.
Prepare
The first step of the NIST RMF related to activities that are necessary to manage security and privacy risks before a breach occurs.
Risk mitigation
The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach.
Select
The third step of the NIST RMF that means to choose, customize, and capture documentation of the controls that protect an organization.
Shared responsibility
The idea that all individuals within an organization take an active role in lowering risk and maintaining both physical and virtual security.
What are the five core functions of NIST CSF?
Identify, protect, detect, respond, and recover.
What does OWASP stand for?
Open Worldwide Application Security Project
What is OWASP’s security principles?
Minimize attack surface area, Principle of least privilege, Defense in depth, Separation of duties, Keep security simple, and Fix security issues correctly.