Security Controls Flashcards

1
Q

What are security controls?

A
  • measures and safeguards implemented to protect information assets and mitigate security risks
  • help organizations enforce security policies, manage vulnerabilities, and safeguard their systems and data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between safeguards and countermeasures?

A
  • safeguards are proactive
  • countermeasures are reactive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 3 different types of controls?

A
  1. Administrative Controls
  2. Technical Controls
  3. Physical Controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe Administrative Controls

A
  • include policies, procedures, guidelines, and security awareness training that govern the organization’s security posture
  • examples include acceptable use, password management, data classification, incident response, and employee onboarding/offboarding procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe Technical Controls

A
  • involve the implementation of hardware, software, and technologies to protect information systems
  • examples: firewalls, encryption mechanisms, access control mechanisms, antivirus software, secure configurations, and network segmentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe Physical Controls

A
  • encompass measures to protect physical assets and the physical environment in which information systems operate
  • examples: physical access controls, video surveillance, secure facilities, environmental controls (such as temperature and humidity regulation), and secure disposal of sensitive materials
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are security controls often based on?

A
  • control objectives and frameworks that provide a structured approach to security implementation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are examples of security control frameworks?

A
  • NIST SP 800-53
  • ISO/IEC 27001
  • CIS Controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which NIST publication covers the assessment of security and privacy controls?

A

NIST SP 800-53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is required for ensuring effectiveness of the security controls?

A
  1. regular control assessments and audits
  2. ongoing monitoring, maintenance, and update
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 6 security control types?
Name them in order.

A
  1. Deterrent
  2. Preventative
  3. Detective
  4. Compensating
  5. Corrective
  6. Recovery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe Deterrent security control type
Name an example

A
  • intended to discourage potential attackers or unauthorized individuals from attempting to exploit vulnerabilities or engage in malicious activities
  • prominent signage indicating the presence of video surveillance, security guards patrolling premises, visible locks or barriers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe Preventative security control type
Name an example

A
  • deployed to stop or thwart unwanted or unauthorized activity from occurring
  • access control mechanisms (e.g., strong authentication, user permissions), firewalls, IPS, encryption, secure coding practices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe Detective security control type
Name an example

A
  • put in place to identify or detect security incidents or unauthorized activities that have already occurred
  • security monitoring systems, IDS, log analysis tools, security incident and event management (SIEM) systems, security audits, mandatory vacation or job rotation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe Compensating security control type
Name an example

A
  • alternative measures implemented to address the deficiencies or limitations of primary security controls
  • provides options to other existing controls
  • put in place when it is not feasible or practical to implement the originally planned controls or when existing controls are unable to fully meet the security requirements
  • example:
    • organization has a security policy that requires all employees to encrypt sensitive data when transmitting it over the network
    • due to technical limitations in the existing infrastructure, the organization is unable to implement encryption on the network devices directly
    • admins configure a VPN solution, that encrypts all network traffic between employee devices and the organization’s network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe Corrective security control type
Name an example

A
  • modifies the environment to return systems to normal after an unwanted or unauthorized activity has occurred
  • implemented to address identified security incidents, vulnerabilities, or deficiencies after they have been discovered
  • example: antivirus that removes detected malware
17
Q

Describe Recovery security control type
Name an example

A
  • extension of corrective controls but have more advanced and complex abilities
  • designed to facilitate the recovery and restoration of critical systems, operations, and data following a disruptive event
  • example: intitiating failover
18
Q

Describe Directive security control type
Name an example

A
  • direct, confine or control the actions of subjects to encourage compliance with security policies
  • often policy-based and establish mandatory guidelines that employees and stakeholders must follow
  • password length complexity
19
Q

Which security control is likely driven by a legal requirement?

A

retention policy

20
Q

Which security control can detect that an employee is engaging in an illegal activity over a period of time?

A

mandatory vacation, during which employee’s privileges are revoked

21
Q

What’s the name for the degree of confidence that an organization has that its security controls are correcctly implemented?

A

assurance

22
Q

What technique is most frequently used to assess security awarness?

A

surveys

23
Q

What purpose are the CIS benchmarks frequently used for in organizations?

A
  • baselining
  • CIS benchmarks are configuration baselines that are frequently used to assess the security settings or configuration for devices and software
24
Q

A significant benefit of a security control is when it goes unnoticed by users. What is this called?

A

transparency

25
Q

Is baseline a more operationally focused form of a standard?

A

yes

26
Q

What should be done with systems that are not complying with the baseline?

A

should be taken out of production until they can be brought up to the baseline

27
Q

Are baselines usually system specific and often refer to an industry or government standard?

A

yes