Section 1 - Secure Architecture for GRC Flashcards
GRC stands for
Governance, Risk, Compliance
Cyclical process of identifying, assessing, analyzing and responding to risks
Risk Management
The comprehensive process of evaluating, measuring, and mitigating the many risks that pervade an orginization
Enterprise Risk Management
What is NIST Framework for Risk Management
RMF ISO 31000
Comprehensive set of standards for enterprise risk management
What are the 5 phases of Risk Management?
- Identification of mission critical functions
- Identification of known vulnerabilities
- Identification of potential threats
- Analysis of Business Impacts
- Identification of Risk responses
How do you measure Risk
Risk is a measure of impact or consequence
the variables are likelihood and impact
List of Quantitative Risk Variables
Single Loss Expectancy - cost of single event
Annual Rate of Occurrence (ARO) # of times in a year that the single loss occurs
Annual Loss Expectancy -
ALE - SLE x ARO
Asset Value (AV) - value of an asset such as a server
Exposure Factor (EF) % of the AV that would be lost. part of a building is damaged
SLE = AV x EF
Also know
TCO, ROI, MTTR, MTBF
Gap Analysis - difference between current state and desired state - for scoping purposes
What is the risk that exists before any type of mitigation has been implemented?
Inherent Risk
Website are inherently risky due to attack vectors
What is the Residual Risk
Risk that remains after controls are put in place
Know what Risk appetites is based on tolerance of organization.
also note that acceptance risk and residual risk are not always equivalent
What is a popular Cybersecurity Framework widely adopted in the US
NIST CSF
1. Identify
2. Protect
3. Detect
4. Respond
5. Recover
What Steps do NIST CSF require when performing risk management
- Prioritize and Scope
- Orient
- Create a Current Profile
- Conduct a Risk Assessment
- Create a Target Profile
- Determine, Analyze & Prioritize Gaps
- Implement Action Plan
What are the NIST Risk Management Frameworks steps (RMF)
- Prepare
- Categorize
- Select
- Implement
- Assess
- Authorize
- Monitor
Name 3 other RMF and Provide details
ISO 3100 or 31K - International and very comprehensive
COBIT maintained by ISACA
5 Major Components
1. Framework 2. Process Descriptions
3. Control Objectives, 4. Management Guidelines 5. Maturity Models
Committe of Sponsoring Organizations of the Treadway Commission (COSO)
initiative of 5 private sector organizations. Enterprise Risk Managment from a strategic leadership point of view
What is the Risk Management LIfecycle
Identify Risk Items
Assess risks and their associated level
Control - minimize risk
Review - periodic re-evaluation
What are key ingredients to understanding control categories
People
Process
Technology
What is a formal mechanism designed to measure performance of a program against a desired goal
Key Performance Indicators (KPI)
What is the method by which emerging risks are identified and analyzed so that changes can be adopted to proactively avoid issues from occurring
Key Risk Indicators (KRI)
What framework standard did Risk Registers originate from
ISO 27001
An effective visualization of identified risks and information about mitigating the controls.
Risk Item, Threat, Impact, Likelihood, Plan, Risk Level
What is the difference between Risk Appetite and Risk Tolerance
Appetite is often prescribed via regulation and addresses how an organization will address risks while Tolerance is the threshold that separate different levels of risks
Name a Trade Off Analysis developed by a University
Architecture Tradeoff Analysis Method (ATAM) developed by SEI at Carnegie Mellon
What is the term for putting a vendors source does in a 3rd party in case of a cease of business
Source Code Escrow