Security Governance Flashcards

1
Q

AAA

A

Five elements = foundational concepts for any security program:

Identification
Authentication
Authorization
Auditing
Accounting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Governance vs Management

A
  1. Governance = C Level Execs (not me!)&raquo_space; Ultimately Liable
    1. Set company objectives
    2. Set risk appetite (aggressive - neutral - adverse)
    3. Monitor performance and compliance
  2. Management (this is me!)
    1. Plans, builds, runs, monitors objectives set by Governance
    2. Risk tolerance (how are we going to work with the set Risk Appetite..)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

4 elements of a corporate security policy:

A
  • [ ] Policy = broad security statements - Mandatory
  • [ ] Standards (Baseline) = specific use of technology (all laptop are Win10, 64Gbit, 8gig RAM, etc) - Mandatory
  • [ ] Guidelines = recommendations > used then there is not a Procedure – Non Mandatory
  • [ ] Procedures = step by step instructions. – Mandatory

Baselines (Benchmarks) = Mandatory – minimum requirements / server hardening, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IAAA

A
  1. Identification
  2. Authentication
    1. Type I = password
    2. Type II = ID, smart card, PIN, cookie on PC, etc.
    3. Type III = biometric
  3. Authorization
    1. What are you allowed to access?
      1. DAC, MAC, RBAC, ABAC
  4. Accountability
    1. Link activity to subject identity (non-repudiation)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OCTAVE

A

Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE)

A comprehensive evaluation method that allows an organization (i.e., self directed) to identify the information assets that are important to the mission of the organization, the threats to those assets, and the vulnerabilities that may expose those assets to the threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

COBIT

A

Control
OBjectives for
Information
and related Technologies (COBIT)

GOALS FOR IT — stakeholder needs are mapped down to IT related goals.

The goal of the COBIT framework is to provide a common language for IT professionals, business executives and compliance auditors to communicate with each other about IT controls, goals, objectives and outcomes.

TIP: is the most commonly used framework for achieving compliance with the Sarbanes-Oxley Act (SOX).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

COSO

A

Committee of Sponsoring Organizations of the Treadway Commission (COSO).

Goals for ENTIRE ORG - Outlines how you can can develop a strong, effective internal control system.

The original COSO framework was developed in 1992, with the most recent version published in 2013. To understand the framework, you must understand what it covers. According to COSO, internal control:

Focuses on achieving objectives in operations, reporting and/or compliance
Is an ongoing process
Depends on people’s actions, not merely written policies and procedures
Provides assurance senior management of security to a reasonable degree
Can be adapted to the needs of the whole organization as well as each department, unit or process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ITIL

A

Information Technology Infrastructure Library

IT Services Management (ITSM).

ITIL describes processes, procedures, tasks, and checklists which are neither organization-specific nor technology-specific, but can be applied by an organization toward strategy, delivering value, and maintaining a minimum level of competency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

FRAP

A

Facilitated Risk Analysis Process

a qualitative approach, using brainstorming techniques to identify risks. Estimated risk assessments are then made (probability x impact) and appropriate measures determined.

Analyzed one business unit, application or system at a time in a roundtable brainstorm with INTERNAL employees. The impact is analyzed and the threats and the risks are prioritized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ISO 27001

A

The objective of the standard itself is to “provide requirements for establishing, implementing, maintaining and continuously improving an Information Security Management System (ISMS)”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ISO 27002

A

It basically outlines hundreds of potential controls and control mechanisms, which may be implemented via ISO 27001, in theory, subject to the guidance provided within ISO 27001.

The standard “established guidelines and general principles for initiating, implementing, maintaining, and improving information security management within an organization”. The actual controls listed in the standard are intended to address the specific requirements identified via a formal risk assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ISO 27004

A

Provides metrics for measuring the success of your ISMS.

provides guidance on the development and use of measures and measurement for the assessment of the effectiveness of an implemented information security management system and controls, as specified in ISO 27001.

It is intended to help an organization establish the effectiveness of its ISMS implementation, embracing benchmarking and performance targeting within the PDCA cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ISO 27005

A

The standard provides guidelines for information security risk management (ISRM) in an organization, specifically supporting the requirements of an information security management system defined by ISO 27001 (a standards based approach).

The ISO 27005 standard comprises 55 pages, and is applicable to all types of organization. It does not provide or recommend a specific methodology. This will depend upon a number of factors, such as the actual scope of the Information Security Management System (ISMS), or perhaps the industry/commercial sector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ISO 27799

A

Directives on how to protect PHI (protected health info)

By implementing ISO 27799:2016, healthcare organizations and other custodians of health information will be able to ensure a minimum requisite level of security that is appropriate to their organization’s circumstances and that will maintain the confidentiality, integrity and availability of personal health information in their care.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Seven steps to implement a data classification scheme:

A
  1. Identify the custodian & define their responsibilities
  2. Specify the evaluation criteria for how the data will be classified and labeled
  3. Classify and label each resource (the owner usually does this with a reviewer)
  4. Document any exceptions discovered, and then integrate them
  5. Select security controls that will be applied to each classification level
  6. Specify the procedures for Declassifying resources and how to transfer custody
  7. Create enterprise=wide training on the classification system created
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which commercial business/private sector data classification is used to control information about individuals within an organization?

A

A. Confidential
B. Private
C. Sensitive
D. Proprietary

17
Q

rule-based access control

A

uses Global rules that apply to all users

18
Q

RBAC

A

role based access control

The Role Based Access Control (RBAC) model is based on role or group membership, and users can be members of multiple groups.

Role Based Access Control (RBAC) models define a subject’s access based on job-related roles.

19
Q

MAC

A

mandatory access control

The Mandatory Access Control (MAC) model uses assigned labels (top secret, secret, etc) to identify access.

The Mandatory Access Control (MAC) model is prohibitive, and it uses an implicit-deny philosophy (not an explicit-deny philosophy).

20
Q

DAC
MAC
RBAC
Nondiscretionary

A

Mandatory Access Control (MAC) models rely on the use of labels for subjects and objects.

Discretionary Access Control (DAC) models allow an owner of an object to control access to the object.

Nondiscretionary access controls have centralized management such as a rule-based access control model deployed on a firewall.

Role Based Access Control (RBAC) models define a subject’s access based on job-related roles.

21
Q

Threat Modeling

A

Threat modeling helps identify, understand, and categorize potential threats.

used to identify potential attackers

22
Q

Common Criteria

A

Replaces TCSEC (orange book / rainbow series) DoD security evaluation standards.

CC is based on two key elements:

  1. Protection Profiles = product to be evaluated
  2. Security Targets = specific claims of security by vendor in TOE
23
Q

What part of the Common Criteria specifies the claims of security from the vendor that are built into a target of evaluation?

A

A. Protection profiles
B. Evaluation assurance level
C. Certificate authority
D. Security target

Security targets (STs) specify the claims of security from the vendor that are built into a TOE.

24
Q

What comprises a formal Security Policy?

A
Policies
Standards
Baselines
Guide-lines
Procedures

These are essential to the design and implementation of security

25
Q

Data classification is used to….

A

determine how much effort, money and resources are allocated to protect said data.

26
Q

AAA Services

login process

A

Identify –> Authenticate –> Authorize –> Accountability

27
Q

DREAD

threat modeling –> rate / rank the threats

A
Damage potential
Reproduce?
Exploitable?
Affected users?
Discoverable?
28
Q

Threat Modeling

A

THREAT MODEL APPROACH:
VAST –> Visual, Agile, Simple Threat
STRIDE —> Spoofing, Tampering, Repudiation, Info disclosure, DDoS, Elev of priv

RISK BASED APPROACH:
TRIKE –>
PASTA –> DO, DTS, ADA, TA, WVA, RAM