Section 5.2 Regulations, Standards, and Frameworks Flashcards

1
Q

What do you call any information that isn’t public or unclassified?

A

Sensitive Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do you call any information that can identify an individual (name, SSN, birthdate/place, biometric records, etc…)

A

PII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do you call health information that can be related to a specific person?

A

Protected Health Information (PHI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What regulation deals with the handling of data while maintaining privacy rights of an individual? Applies to any company with customers in the EU

A

GDPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do you call the process of removing all relevant data so that it is impossible to identify original subject or person?

A

Anonymization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What process could reduce or eliminate GDPR requirements?

A

Anonymization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do you call the process of using pseudonyms (aliases) to represent other data? Can result in less stringent requirements than would otherwise apply under the GDPR.

A

Pseudonymization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What law is focused on services of banks, lenders, and insurance?

A

Gramm-Leach-Bliley Act (GLBA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What act requires that government agencies include the activities of contractors in their security management programs?

A

Federal Information Security Management Act (FISMA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do you call a widely accepted set of policies and procedures intended to optimize the security of credit, debt, and cash card transactions?

A

PCI DSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do you call a not-for-profit organization that publishes information on cybersecurity best practice and threats? Provides benchmarks for different operating systems and provides controls to help secure your organization.

A

Center for Internet Security (CIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a set of guidelines and best practices to help organizations build and improve their cybersecurity posture? Aimed at private industry (commercial business)

A

Cyber Security Framework (CSF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which ISO is Security techniques for Information Security Management Systems: an international standard on how to manage information security?

A

ISO 27001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which ISO is a Code of Practice for Information Security Controls, which aims to improve the management of information.

A

ISO 27002

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which ISO is an extension to 27001/27002 for Privacy Information Management - provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management Systems (PIMS)

A

ISO 27701

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which ISO provides principles, a framework and a process for managing risk for organizations of any size in any sector?

A

ISO 31000

17
Q

What is an audit standard to enhance the quality and usefulness of System and Organization Control (SOC) reports? designed for larger organizations, such as cloud providers.

A

Statements on Standards for Attestation Engagements (SSAE) 18

18
Q

What report assesses the design of security processes at a specific point in time?

A

SOC 2 Type 1

19
Q

What report assesses how effective controls are over time by observing operations for six months?

A

SOC 2 Type 2

20
Q

What is a not-for-profit organization that produces resources to help CSP’s, like online training, webinars, discussion groups, and virtual summits?

A

Cloud Security Alliance (CSA)

21
Q

What is designed to provide a guide on security principles for cloud vendors and potential cloud customers to assess the overall risk of a cloud provider?

A

Cloud Control Matrix (CCM)

22
Q

What contains best security practices for CSP’s and examples?

A

CSA Reference Architecture

23
Q

What are configuration baselines and best practices for securely configuring a system?

A

Benchmarks