Security and Risk Management Flashcards
CIA Triad
Confidentiality
Integrity
Availability
ISO 27001/27002
“The International Standards Organization (ISO) is recognized globally, and it is probably the most pervasive and used source of security standards outside the United States (American organizations often use standards from other sources). ISO 27001 is known as the information security management system (ISMS) and is a comprehensive, holistic view of security governance within an organization, mostly focused on policy. “
COBIT
Created and maintained by ISACA, the COBIT framework (currently COBIT 5) is designed as a way to manage and document enterprise IT and IT security functions for an organization. COBIT widely uses a governance and process perspective for resource management and is intended to address:
IT performance,
security operations,
risk management,
and regulatory compliance
ITIL
IT Infrastructure Library - Best practices for IT core operational processes, not technologies to business customers
ITIL v3 has 5 Phases
- Service Strategy
- Service Design
- Service Transition
- Service Operation
- Continuous service improvement
RMF
RISK MANAGEMENT FRAMEWORK
“NIST, the U.S. National Institute of Standards and Technology, publishes two methods that work in concert (similar to how ISO 27001 and 27002 function); the Risk Management ““Framework (RMF), and the applicable list of security and privacy controls that goes along with it (respectively, these documents are Special Publications (SPs) 800-37 and 800-53). While the NIST SP series is only required to be followed by federal agencies in the United States, it can easily be applied to any kind of organization as the methods and concepts are universal. Also, like all American government documents, it is in the public domain; private organizations do not have to pay to adopt and use this framework. However, there is no private certification for the NIST framework.”
CSA STAR
“The Cloud Security Alliance (CSA)
is a volunteer organization with participant members from both public and private sectors, concentrating—as the name suggests—on security aspects of cloud computing. The CSA publishes standards and tools for industry and practitioners, at no charge. The CSA also hosts the Security, Trust, and Assurance Registry (STAR), which is a voluntary list of all cloud service providers who comply with the STAR program framework and agree to publish documentation on the STAR website attesting to compliance. Customers and potential customers can review and consider cloud vendors at no cost by accessing the STAR website. The STAR framework is a composite of various standards, regulations, and statutory requirements from around the world, covering a variety of subjects related to IT and data security; entities that choose to subscribe to the STAR program are required to complete and publish a questionnaire (the Consensus Assessments Initiative Questionnaire (CAIQ), colloquially pronounced “cake”) published by CSA. The STAR program has three tiers, 1–3, in ascending order of complexity. Tier 1 only requires the vendor self-assessment, using the CAIQ. Tier 2 is an assessment of the organization by an external auditor certified by CSA to perform CAIQ audits. Tier 3 is in draft form as of the time of publication of this CBK; it will require continuous monitoring of the target organization by independent, certified entities.”
DUE CARE
Obligation
(looking out for safety of others)
“due” = required or legally required
“is a legal concept pertaining to the duty owed by a provider to a customer. In essence, a vendor has to engage in a reasonable manner so as not to endanger the customer: the vendor’s products/services should deliver what the customer expects, without putting the customer at risk of undue harm”
DUE DILIGENCE
Action that support “due care”
- verifying background checks
- information security assessments
- risk assessment of physical security systems
- threat intelligence services
RISK
The possibility of damage or harm and likelihood that damage or harm will be realized.
ACCEPTABLE RISK
The level of risk that is suitable relative to the rewards offered by conducting operations.
Business Impact Analysis (BIA)
Measures the value of an asset, the threats and risks posed by the asset, and the impact to the organization if the asset were affected.
Intellectual Property Laws
Intellectual Property
Patent
Copyright
Trademark Laws
Trade Secrets
THREATS
Any aspects that create a risk to the organization, its function or assets:
Natural
Criminal
User error
VULNERABILITIES
Any aspect of the organization’s operation that could enhance a risk or the possibility of a risk being realized:
Software
Physical
Personnel
VULNERABILITY
An inherent weakness in an information system, security procedures, internal controls, or implementation that could be exploited by a threat source.
Tends to focus on technology aspects
DATA BREACH TECHNOLOGY
Incident
Breach
Data disclosure
RISK AVOIDANCE
The practice of coming up with alternatives so the risk in question is not realized.
RISK TRANSFERENCE
The practice of passing on the risk to another entity.
RISK MITIGATION
The decrease in the level of risk through implementation of controls.
RISK ACCEPTANCE
The practice of accepting certain risks based on a business decision that weighs the cost vs. the benefit of a risk.
RESIDUAL RISK
The risk that remains after controls are put in place.
Who is responsible for security at company
Security is responsibility of everyone at a company.
SECURITY CONTROLS
Methods, tools, mechanisms, and processes used in risk mitigation.
Safeguards - before risk is realized
Countermeasures - after the risk is realized
All security controls have detrimental effects on operations; control selection must entail cost/benefit analysis.
ANNUAL LOSS EXPECTANCY
QUANTITATIVE RISK ANALYSIS
Single Loss Expectancy (SLE) X Annual Rate of Occurance (ARO)
Cost of countermeasures must be smaller than ALE
TYPES OF CONTROLS
Technological/logical
Physical
Administrative (Procedures/ policy)
CONTROLS CONTINUUM
Pre-Event
- Directive
- Preventative
- Compensating
- Deterrent
- Detective
Post-Event
- Corrective
- Recovery
DEFENSE IN DEPTH
OPTIMAL CONTROL IMPLEMENTATION
with layered defenses.
MONITORING AND MEASUREMENT
After control selection, monitoring and enforcement is necessary.
May involve a Security Control Assessment (SCA).
Should include continuous improvement efforts
Vulnerability Assessments
Penetration Testing
RISK FRAMEWORKS
ISO
COSO
ISACA
NIST
COSO
Identifies 5 internal control areas to meet financial reporting and disclosure objectives:
Control Environment
Risk Assessment
Control Activities
Information and Communications
Monitoring
THIRD PARTY REVIEW ENTITIES
ISO certified audits
CSA STAR Evaluation
AICPA SSAE 16 SOC Reports
RISK MANAGEMENT METHODOLOGIES
Governance Review
Site Security Review
Formal Security
Penetration Testing
THREAT MODELING
Looking at an environment, system, or application from an attacker’s point of view and trying to determine vulnerabilities the attacker would exploit.
STRIDE MODEL
SPOOFING
TAMPERING
REPUDIATION
INFORMATION DISCLOSURE
DOS (Denial of Service)
Elevation of privilege
MINIMUM SECURITY REQUIREMENTS
Involve stakeholders as soon as possible
Ensure requirements are specific, realistic and measurable
Restate your understanding of the requirements back to them to confirm
Don’t choose tools or solutions until the requirements are understood
Create prototypes, diagrams or visuals to help solidify understanding on all sides
SERVICE LEVEL REQUIREMENTS (SLR)
Detailed service level requirements
Mutual responsibilities
Other requirements specific to certain customer groups
Both SLR and SLA become addendum to contracts
Compares agreed against achieved performance
Includes information service usage
Provides ongoing measures for service improvement
Exceptional events
SERVICE LEVEL REQUIREMENTS (SLA)
Defines the minimum requirements of a business arrangement and codifies their provision
Every element of the SLA should include a discrete, objective, numeric metric to judge success or failure
Often used as a payment calculator / discriminator
Best serves recurring, continual requirements, not singular or infrequent events
Both SLR and SLA become addendum to contracts
Define the agreed upon level of performance and compensation or penalty between the provider and the customer
if it’s not measurable, a metric or reoccurring it’s NOT a SLA