Security Assessment and Training Flashcards
Security assessments, audits, tests, or other assessment activities can be of two types:
formal and informal
formal assessments, the audit, test, or other assessment activity is
an evaluation against a compliance standard
And audit is a formal evaluation against a compliance standard. It is performed by
individuals who are outside the audited entity’s management structure
For informal assessments, the audit, test, or other assessment activity is conducted to provide insights and observations about the systems being evaluated but not for the direct purpose of meeting a compliance requirement.
the direct purpose of meeting a compliance requirement.
The accuracy of the audit depends on
the integrity of the artefacts.
A typical finding would identify these elements.
Condition is a statement that describes the results of the audit.
Criteria are the standards used to measure the activity or performance of the auditee.
Cause is an explanation of why a problem occurred.
Effect is the difference between and significance of the condition and the criteria.
Recommendation is the action that must be taken to correct the cause.
Formal security assessments are primarily related to
Risk management compliance such as that required by law
For U.S. government agencies and many of their contractors, the Risk Management Framework ___________ serves as the standard against which audits and control assessments will be performed.
SP 800-37r2
What is NIST SP 800-171r1, Protecting Controlled Unclassified Information in Nonfederal Systems and Organisations for?
When private companies become part of a Federal government supply chain or process, they need to take on the responsibility of protecting information covered by this security category.
What are SOC reports
Service Organization Control Reports. reports that evaluate organizational controls against a set of five Trust Services Principles.
The SOC framework defines two major report types:
SOC 1: Attests to the condition of the organisation’s Internal controls over financial reporting (ICFR.)
SOC2: Trust Services Criteria Principles. AICPA defines these to be:
Security
Availability
Confidentiality
Processing Integrity
Privacy
Aside from SOC1 and SOC2 what are the other aspects of a SOC report
- SOC 3 reports provide a summary of the findings and attestations of a SOC 2 report, in less technical form.
- SOC for Cybersecurity: This report focuses specifically on the cybersecurity plans, programs, processes, procedures, services or functions used by the organisation to meet its cybersecurity requirements.
What is the difference between Type 1 and Type 2 reports for SOC1 and SOC2
Type 1 - Point in time (Initial baseline)
Type 2 - Performance over time
What is the focus of SOC 1 reports
Internal Control over Financial Reporting
What is the focus of SOC 2 reports
Security controls
What are the five trust services criteria
Security, Availability, Processing Integrity, Confidentiality and Privacy
The SOC 3 report has been used where there is a need to communicate a level of assurance to a broad base of users without having to
disclose detailed controls and test results
Which of the SOC 2 types proves design effectiveness
Type II -> Type 1 is only point in time, therefore only confirms the design
ISO 27001:2013 control 12.4.1 addresses event logging and states the following
Event logs recording user activities, exceptions, faults and information security events should be produced, kept and regularly reviewed.
In security assessments tests of controls are generally categorized as
compliance tests or substantive tests
In security assessments Compliance tests determine if, in the opinion of the controls assessor, give an example
the control exists and is operating properly
a compliance test might compare a sample of the organization’s employees who are entitled to access a system with the named users of the system. The expected outcome should show that the two lists are identical.
A substantive test evaluates …
Give an example
A substantive test evaluates the proper operation of the process. In the same example, a tester might perform an onboarding operation to give access to a new user, attempt to use the credentials for an authorised transaction, and then off-board that identity.