Security Management Programs and Oversight: Guide Line and Policies Flashcards

1
Q

What are guideline and policies?

A

Guidelines serve as a framework in an effective security-governance program within an organization. They provide clear directives and best practices to ensure consistent and aligned security measures across all levels, processes, and systems.

Policies establish the overarching principles and rules in an effective security governance program within an organization, guiding decision-making and standardizing security practices to protect sensitive data and mitigate risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are AUP’s?

A

AUPs: Delineates the permissible boundaries and rules governing the appropriate and responsible utilization of an organization’s IT resources, systems, and networks by employees and stakeholders.

Acceptable Use Policies

Purpose and scope

Authorized users

Acceptable use

Unacceptable Use

Email

Lega department must be involved

Social Media

Consequences on breach of Policy

Reporting breaches (self reporting) - Encouragement to do this

Employee needs to sign on the onboarding process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are ISP’s?

A

ISPs: Outlines the comprehensive strategies, protocols, and practices that an organization employs to safeguard its sensitive data, digital assets, and information systems against unauthorized access, breaches, and cyber threats.

Information Security Policy

Scop and applicability

Roles and Responsibility

Information Classification

Access control

MDM

Legal/regulatory compliance

Communication and reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What should you include in a BCP?

A

Business continuity policies: Establish the strategies, procedures, and guidelines necessary to ensure an organization’s critical operations, processes, and services can continue functioning or recover swiftly in the face of disruptions, disasters, or unforeseen events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What should you consider in a Disaster recovery Policies?

A

Disaster recovery policies: Define the systematic procedures, protocols, and measures that an organization follows to restore and resume its IT systems, applications, and data after a significant disruption or catastrophic event. This helps minimize downtime and ensure operational continuity.

Incident response policies: Delineate the predefined steps, roles, and responsibilities that an organization follows to swiftly detect, assess, mitigate, and recover from security breaches, cyberattacks, or other adverse events. This helps minimize potential damage and ensure a coordinated and effective response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the outlines of SDLC?

A

Software development Life Cycle

SDLC: Outlines the structured methodology and stages through which software applications are planned, designed, developed, tested, deployed, and maintained. Integrates security considerations at every phase to ensure robust protection against vulnerabilities and threats.

Plan
Analyse
Design
Implementing
Test
Maintain
Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What should you take into account in a change management policies?

A

Change management policies: Establish guidelines, processes, and approvals required for implementing modifications, updates, or alterations to IT systems, applications, or infrastructure. This helps ensure that changes are carried out in a controlled manner to prevent disruptions and maintain an organization’s security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly