Section 5: Risk Frameworks Flashcards

1
Q

NIST SP 800-37 RMF

A

Risk Management Framework for Information Systems and Organizations
Provides a flexible 7 step process for managing security and privacy risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NIST RMF 7 steps

A

PREPARE- identify different roles, strategies, control providers
CATEGORIZE- identify all of the organizational assets and categorize them in terms of risk, value, and document them
SELECT- the initial security controls necessary to protect the information system and organization
IMPLEMENT- Deploy security controls and document how they are used
ASSESS- Test the effectiveness of the controls and comply with governance
AUTHORIZE- require a senior management official to take accountability for the residual risk
MONITOR- ongoing evaluation of security effectiveness against organizational and system related changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ISO 31000

A

Risk management framework that provides a common approach to managing any type of risk within any industry
8 principles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ISO 31000 Principles

A

Integrated
Structured and Comprehensive
Customized
Inclusive
Dynamic
Best Available Information
Human and Cultural Factors
Continual Improvement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

COSO

A

Committee of Sponsoring Organizations
Enterprise risk management framework focused on corporate governance
Often used to comply with SOX 404 requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

COSO Components

A

Governance & Culture
Strategy & Objective Setting
Performance
Review & Revision
Information, Communication & Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NIST CSF

A

NIST Cybersecurity Framework
Risk management and reduction framework based on existing standards, guidelines, and industry best practices
Voluntary and not required by any organization, authorizing, or accrediting body

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NIST CSF Core

A

Activities, implementations, and functions designed to achieve the desired cybersecurity outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NIST CSF Tiers

A

Characterize how the core activities align with the desired cybersecurity outcomes
Tier 1 - Partial
Tier 2 - Risk Informed
Tier 3 - Repeatable
Tier 4 - Adaptive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NIST CSF Profiles

A

Alignment of requirements, objectives, implementations, and risk tolerance to the desired cybersecurity outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NIST CSF Framework Steps

A

Identify
Protect
Detect
Respond
Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NIST CSF - Identify

A

Identify critical enterprise processes and assets
Document information flaws
Maintain hardware and software inventory
Establish policies for cybersecurity that include roles and responsibilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NIST CSF - Protect

A

Manage access to assets and information
Protect sensitive data
Conduct regular backups
Securely protect your devices
Manage device vulnerabilities
Train users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NIST CSF - Detect

A

Test and update detection processes
Maintain and monitor logs
Know the expected data flows for your enterprise
Understand the impact of cybersecurity events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NIST CSF - Respond

A

Ensure response plans are tested
Ensure response plans are updated
Coordinate with internal and external stakeholders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NIST CSF - Recover

A

Communicate with internal and external stakeholders
Ensure recovery plans are updated
Manage public relations and company reputation

17
Q

ISO/IEC 27001

A

Internationally recognized standard for Information Security Management Systems
Focuses on three main principles- Confidentiality, Integrity, Availability

18
Q

PCI DSS

A

Payment Card Industry Data Security Standard
Focused on protecting cardholder data from unauthorized access or disclosure
Not a law, but treated as one

19
Q

PCI DSS - CHD

A

Cardholder Data types:
Primary Account Number (PAN)
Cardholder Name
Expiration Date
Service Code

20
Q

PCI DSS - SAD

A

Sensitive Authentication Data types:
Full track data (magnetic-stripe data or equivalent on a chip)
Card verification code (CVV)
PINs/PIN blocks

21
Q

PCI DSS - CDE

A

Cardholder Data Environment
Anything that can possibly touch, process, or collect payment card data

22
Q

Sherwood Applied Business Security Architecture (SABSA)

A

Methodology for developing enterprise and solution level security architectures that align with business objectives
Supports other standards, does not replace or compete

23
Q

SABSA Contextual Architecture

A

Identifies organization’s business objectives, drivers, and key stakeholders
Links business objectives to security requirements to help define overall strategy

24
Q

SABSA Conceptual Architecture

A

Translates business goals and objectives into security objectives and requirements
Defines high-level security architecture components and their relationships

25
Q

SABSA Logical Architecture

A

Develops logical security architecture components based on the conceptual layer
Defines security services, policies, standards, and guidelines

26
Q

SABSA Physical Architecture

A

Implements security controls and technologies to support the logical functionality
Includes physical infrastructure, network infrastructure, and systems infrastructure

27
Q

SABSA Component Architecture

A

Focuses on the implementation of specific security components
Incorporates technologies, products, and solutions to meet security requirements

28
Q

SABSA Service Management Architecture

A

Addresses day-to-day security management and operations
Includes incident response, vulnerability management, security awareness and training

29
Q

PCI DSS Merchant Level 1

A

Companies with over 6 million transactions

30
Q

PCI DSS Merchant Level 2

A

Companies that process between 1-6 million transactions

31
Q

PCI DSS Merchant Level 3

A

Companies that process between 20k and 1 million transactions

32
Q

PCI DSS Merchant Level 4

A

Companies that process less than 20k transactions