Section 16.155 Selecting Infrastructure Controls Flashcards

Objective 3.2 Given a scenario, you must be able to apply security principles to secure enterprise architecture. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security

1
Q

Control

A

A protective measure put in place to reduce potential risks and safeguard an organisations assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Key Principles

Least Privilege

A

Users and systems should have only necessary access rights to reduce the attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Key Principles

Defense in Depth

A

Utilise multiple layers of security to ensure robust protection even if onecontrol fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Key Principles

Risk-based Approach

A

Prioritise controls based on potential risks and vulnerabilities specific to the infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key Principles

Lifecycle Management

A

Regularly review, update, and retire controls to adapt to the evolving threat landscape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Key Principles

Open Design Principle

A

Ensure transparency and accountability through rigorous testing and scrutiny of controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Methodology

Assess Current State

A

Understand existing infrastructure, vulnerabilities, and current controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Methodology

Gap Analysis

A

Identify discrepancies between current and desired security postures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Methodology

Set Clear Objectives

A

Define specific goals for adding new controls (data protection, uptime, compliance, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Benchmarking

A

Compare your organization’s processes and security metrics with industry best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Methodology

Cost-Benefit Analysis

A

Evaluate the balance between desired security level and required resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Methodology

Stakeholder Involvement

A

Engage relevant stakeholders to ensure controls align with business
operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Methodology

Monitoring and Feedback Loops

A

Continuously revisit control selection to adapt to evolving threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Best Practices

Conduct Risk Assessment

A

Regularly assess threats and vulnerabilities specific to your organisation and update it with significant changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Best Practices

Align with Frameworks

A

Utilise established frameworks (e.g., NIST, ISO) to ensure comprehensive and tested methodologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Best Practices

Customise Frameworks

A

Tailor framework controls to your organizations unique risk profile and business operations

17
Q

Best Practices

Stakeholder Engagement and Training

A

Engage all relevant stakeholders in the decision-making process, and conduct regular training to keep the workforce updated on security controls and threats