Security Program Management and Oversight Flashcards
Domain 5
Guidelines
Guidelines provide structured recommendations and principles that serve as a framework for guiding decision-making and behavior. Unlike policies, they are not rigid rules that look at operations in a granular fashion. Instead, guidelines are adaptable and informed suggestions.
Chapter 23
7 types of Policies
Organizational rules for specific areas:
Acceptable Use Policy (AUP): An AUP sets the ground rules for how employees and stakeholders can utilize an organization’s resources. It outlines acceptable and unacceptable behaviors, such as appropriate use of email, internet access, and social media, while emphasizing the importance of responsible and ethical use.
Information security policies: Information security policies are policies that define the procedures and controls that protect sensitive information from unauthorized access, data breaches, and cyber threats. They encompass aspects such as access control, data encryption, and password management to ensure data confidentiality, integrity, and availability.
**Business Continuity Plan (BCP): **BCP policies provide a roadmap for organizations to sustain essential operations in the face of disruptions, whether caused by natural disasters, cyberattacks, or other unforeseen events. These policies outline strategies for data backup, disaster recovery, and continuity of critical functions. These policies go together with Continuity-of-Operations Plans (COOPs), outlining strategies for data backup, disaster recovery, and the continuous operation of critical functions.
Disaster recovery: While related to BCP, disaster recovery policies are more specific and focus on IT infrastructure and systems. They lay out procedures for data recovery and system restoration in the aftermath of a disaster, minimizing downtime and ensuring the continuity of IT services.
Incident response: Incident response policies are a playbook for addressing cybersecurity incidents effectively. They define the steps to identify, report, and mitigate security and data breaches promptly. Clear incident response policies can prevent a minor issue from escalating into a full-scale crisis.
Change management: Change management policies facilitate the adoption of new technologies, processes, or organizational changes. They help maintain stability by defining how changes are proposed, evaluated, and implemented. Effective change management policies minimize disruption and ensure that changes align with strategic objectives.
Software Development Life Cycle (SDLC): An SDLC policy establishes the methodologies and best practices for creating, testing, and deploying software applications. This policy ensures that software projects are managed efficiently, with an emphasis on quality, security, and compliance.
Chapter 23
Standards
Standards provide a common framework for security practices to ensure consistency and alignment with industry best practices and regulatory requirements.
REMINDER
The following regulations deal with privacy: GDPR, CCPA, ISO 27701, and ISO/IEC 27018.
Chapter 23
5 key components of Password Standards
Hashing: Hashing converts passwords into intricate, unalterable sequences of characters to protect them against unauthorized access and attacks.
Salting: Salting is a technique by which a random piece of data, known as a “salt,” is introduced to each password before hashing it. This unique addition ensures that even if two users have identical passwords, their hashed values will differ significantly. This defense mechanism slows down brute-force attacks and prevents rainbow table attacks, in which an attacker has a list of accounts with corresponding passwords. Rainbow tables are not designed to deal with random characters.
Encryption: TLS ensures that data such as passwords transmitted between a client (e.g., a user’s device) and a server (e.g., a website) is encrypted and protected from eavesdropping or tampering during transit.
Password reset: Password standards define robust identity verification methods to ensure that password reset requests are shielded from exploitation.
Password managers: Password managers allow users to set longer and more complex passwords as they don’t need to remember them
Chapter 23
8 elements of Access Control Standards
Authentication protocols: Authentication protocols vary but can include SSH keys for Linux, Kerberos on a Microsoft environment, OAuth for internet-based authentication, and SAML for third-party authentication.
Least privilege: The policy of least privilege should be used to prevent privilege escalation.
Access control type: There are various types of access control, including Mandatory Access Control (MAC), based on classification labels, Role-Based Access Control (RBAC), to give permissions according to users’ job roles, rule-based access control, which affects everyone within given conditions, and Discretionary Access Control (DAC), which gives the data owner the power to grant or deny access directly. Each organization must determine which control is most appropriate for its particular context.
User identity: User identity refers to the method of identification, such as usernames, smart cards, or biometrics, based on an organization’s preference.
Multifactor Authentication (MFA): MFA enhances the access control process by requiring more than one form of authentication factor for each authentication request.
Privilege Access Management (PAM): PAM is a solution designed for stricter control over administrative accounts within a domain. It helps prevent privilege escalation and enhances security for privileged accounts.
Audit trail: Any access control system needs an audit trail that lists every event that happens on a server and identifies who carried out the action and when. Implementing a RADIUS server is a good way to set up audit trailing because of the server’s ability to perform accounting. Specialist applications such as medical systems have built-in audit trails for compliance reasons.
Conditional Access policy: A Conditional Access policy is a cloudbased access control that uses signals, conditions, and enforcement mechanisms to manage and regulate user access to resources, enhancing security and ensuring compliance
Chapter 23
7 types of Physical Security Standards
Mantrap This is a secure entryway with two interlocking doors that allows only one person at a time, enhancing access control.
Turnstile This is a rotating gate that permits one person to pass at a time and is often used for crowd management and access control.
Access control vestibule This is an enclosed area between two secure doors used to verify credentials and restrict unauthorized access.
Guards Trained personnel monitor and protect physical premises, providing a visible deterrent and response to security incidents.
Visitor logs This is an audit trail for visitors when they are signed in and out by their sponsor. The sponsor is then responsible for them.
Proximity cards/fobs These refer to Radio-Frequency Identification (RFID) devices used for access control. Entrants must tap their assigned device on a card reader.
CCTV Closed-Circuit Television (CCTV) is a surveillance system using cameras to monitor and record activities in specific areas for security and monitoring purposes.
Chapter 23
4 types of Procedures
Established methods for task completion:
Change management: Change management procedures outline the steps and protocols for initiating, evaluating, implementing, and monitoring changes within an organization. They ensure that transitions (whether in technology, processes, or policies) are authorized and executed smoothly, minimizing disruptions and optimizing outcomes.
Onboarding: Onboarding is the process of integrating new team members into an organization’s culture and workflows. Onboarding procedures create a structured path for introducing newcomers, including orientation, training, and the provisioning of necessary
resources, such as phones and laptops. These procedures help new employees acclimatize quickly, fostering productivity and engagement from day one. The signing of a Non-Disclosure Agreement (NDA) is typically required during onboarding to legally protect sensitive company information and ensure that new employees or individuals joining the organization understand and agree to maintain confidentiality regarding proprietary or confidential data.
Offboarding: When someone decides to leave the company, HR carries out offboarding procedures to ensure a dignified and systematic exit. These procedures encompass tasks such as returning equipment, revoking access privileges, and conducting exit interviews. They help
protect sensitive data, maintain security, and preserve positive relationships even as farewells are bid.
Playbooks: Playbooks are a subset of procedures that are often used in specific contexts such as sales, marketing, disaster recovery, or incident response. They are comprehensive guides that outline actions, strategies, and contingencies for various scenarios. Playbooks equip teams with predefined responses to complex situations to ensure consistency and effective decision-making.
Chapter 23
6 External considerations
External factors affecting decision-making:
Regulatory: Governments and regulatory bodies enact laws and regulations to ensure fair practices, protect consumers, and maintain industry standards. Staying compliant with these regulations is essential to avoiding legal consequences and maintaining public trust. Whether it’s data privacy, financial reporting, or environmental standards, organizations must navigate the intricate web of regulations that apply to their industry and jurisdiction.
Legal: Legal factors encompass not only regulatory compliance but also broader legal issues that organizations face, such as contracts, intellectual property, liability, and litigation. Organizations need robust legal strategies (including effective contract management and risk
mitigation) to safeguard their interests and ensure ethical and lawful operations.
Industry: Industries evolve rapidly due to technological advancements, consumer trends, and competitive pressures, so industry considerations must encompass those unique challenges and opportunities within their related sector. Organizations must stay attuned to industry dynamics, embracing innovation and adapting to changing market conditions to
remain relevant and competitive.
Local/regional: Local and regional factors consider the specific conditions and demands of a particular location or geographic area. These factors may include cultural preferences, economic conditions, infrastructure, and local regulations. Organizations that engage with and
understand the nuances of local communities can build strong relationships and achieve sustainable growth.
National: National factors pertain to an organization’s interactions with the country in which it operates or is headquartered. National policies, economic trends, and geopolitical stability can significantly impact business operations. Organizations must align their strategies with national priorities and navigate the broader economic and political landscape.
Global: Organizations confront global challenges tied to international trade, geopolitical complexities, and cross-border compliance requirements. A global perspective is imperative, then, in order to capitalize on opportunities and adeptly navigate risks in an increasingly
borderless business landscape. In line with this, there are some global standards that all countries need to adhere to, for example, PCI-DSS, which is an international standard relating to credit card data. An online retail company that accepts credit card payments from customers must adhere to PCI-DSS standards to secure cardholder data during transactions and protect against potential data breaches.
Chapter 23
5 aspects of Monitoring and revision
Ongoing assessment and adaptation
Regular audits and assessments: Routine audits, inspections, and assessments are conducted to gauge compliance levels and identify potential vulnerabilities. These evaluations help organizations stay ahead of threats by ensuring that their existing controls align with
current requirements.
Policy and procedure revisions: The results of compliance reports, technological advancements, changes in business processes, newly identified risks, or evolving legal requirements can necessitate revisions to cybersecurity policies and procedures. Organizations must ensure they know the latest standards and frameworks and revise their policies accordingly as these revisions are essential to address emerging threats effectively.
Employee training: Keeping employees informed and engaged is crucial. Regular training sessions not only educate employees about policy changes but also serve as a reinforcement of cybersecurity best practices to maintain a security-conscious organizational culture.
Legal changes: Organizations must remain vigilant regarding any changes in cybersecurity legislation, whether at the international, national, regional, or industry-specific levels. Staying informed about evolving legal requirements is essential for compliance and risk
mitigation.
Cyclical and proactive approach: Monitoring and revision in cybersecurity governance form a continuous loop of assessment, adaptation, and enhancement. Proactive strategies are key in this process, as they enable organizations to anticipate potential threats, assess their preparedness, and make necessary adjustments ahead of time.
Chapter 23
4 Types of governance structures
Frameworks for organizational oversight:
Boards: Boards of directors or governing boards are fundamental to governance in numerous organizations, including corporations, nonprofits, and educational institutions. These boards are entrusted with setting the strategic direction, overseeing management, and
safeguarding stakeholders’ interests. Boards ensure accountability through governance, oversight, transparency, and ethical leadership.
Committees: Committees are internal task forces within larger governance structures that focus on specific functions or tasks. They play a critical role in breaking down complex governance responsibilities into manageable components. Examples include audit committees, compensation committees, and governance committees. These specialized groups enhance the efficiency and effectiveness of governance by diving deep into specific areas of concern, such as financial compliance, cybersecurity, regulatory compliance, and strategic planning, among others.
Government entities: Government entities at various levels are responsible for public governance. These entities (including federal, state, and local governments) create policies, enforce laws, and provide public services. Public governance structures are vital for maintaining law and order, protecting citizens’ rights, and promoting general welfare. They operate within established legal frameworks and democratic principles.
Centralized/decentralized governance: Centralized and decentralized governance structures are at opposite extremes. Centralized governance consolidates decision-making authority at the top, often with a single governing body or individual. In contrast, decentralized governance distributes decision-making across various entities or levels. Finding the right balance between centralization and decentralization depends on the organization’s size, complexity, and objectives. The amount of centralization/decentralization impacts how decisions are made, resources are allocated, and responsibilities are delegated.
Chapter 23
The 5 Roles and responsibilities for systems and data
Duties in data management:
Data owner: Data owners bear the responsibility of safeguarding data and overseeing the enforcement of policies that govern its proper usage to ensure the protection and responsible handling of data.
Data controller: The data controller writes the policies that relate to data collection and processing. They are legally responsible for ensuring compliance with the up-to-date regulations for each type of data and ensuring that data subjects are acknowledged, their permission to use the data is granted, and all necessary procedures related to privacy notices are correctly implemented in their policies, promoting transparency and data protection.
Data processor: The data processor must handle and process the data on behalf of data controllers. They must adhere to the predetermined instructions and policies set by the controllers and ensure the sanctity of data subject rights and regulatory compliance. They must maintain a record and audit trail for every transaction during data processing so that the auditor can ensure compliance.
Data custodian: The data custodian is responsible for the secure storage of data in compliance with data privacy regulations such as GDPR, ISO 27701, or HIPAA. The data custodian protects the data by ensuring it is encrypted, stored, and backed up. They implement the organization’s data retention policy and archive data that is outside of the legal data retention regulations.
Data steward: Data stewards are dedicated to maintaining data quality, diligently identifying and rectifying errors and inconsistencies. They also maintain detailed records and metadata, making data understandable and accessible to users. Beyond quality, they classify
data based on sensitivity and collaborate with data custodians to implement the necessary controls for compliance.
Chapter 23
Risk identification
The first stage in risk management is the identification and classification of the asset. There are three key elements to risk assessment:
Risk: The risk is the probability that an event will occur that results in financial loss or loss of service. In the preceding example, the probability that the trash or gold would be taken. In IT security, it is the probability your system could be hacked or data stolen.
Threat: A threat is someone or something that wants to inflict loss on a company by exploiting vulnerabilities. In the preceding example, it’s the person who takes the gold. In IT security, it could be a hacker that wants to steal a company’s data.
Vulnerability: This is a weakness that helps an attacker exploit a system. In the preceding example, it is the fact that outside your front door is not a secured area. In IT security, it could be a weakness in a software package or a misconfiguration of a firewall.
Chapter 24
4 types of Risk assessment
Assessing the impact or risk:
Ad hoc risk assessment: Ad hoc assessments are sporadic and arise in response to specific events or perceived threats. This type of assessment is tailored to focus on the immediate dangers and is characterized by its flexibility and swift implementation.
Recurring risk assessment: Recurring assessments are routine and scheduled to occur at predetermined intervals. This approach ensures that the organization’s security posture is regularly monitored, evolving threats are detected, and changes in the environment or operations are addressed. Regularly scheduled assessments enable organizations to stay vigilant and maintain an updated understanding of their risk profile, fostering a proactive security culture.
One-time risk assessment: One-time assessments are conducted for specific scenarios or projects, often at the inception of a new venture, system implementation, or organizational change. This approach provides a detailed one-time view of the risks associated with a
particular endeavor.
Continuous risk assessment: Continuous risk assessment goes above and beyond the periodic nature of recurring assessments, characterized by real-time monitoring and the analysis of risks. This dynamic approach integrates risk assessment seamlessly into the organization’s daily operations, allowing for instantaneous detection and response to threats as they arise. Continuous assessment is vital in today’s fastpaced and dynamic threat landscape as it empowers organizations to stay a step ahead of potential security breaches.
Chapter 24
9 types of Risk analysis
Qualitative risk analysis: Qualitative risk analysis uses subjective judgment to categorize risks as high, medium, or low, focusing on the potential impact, such as the likelihood of occurrence.
Quantitative risk analysis: Quantitative risk analysis, on the other hand, assigns numerical values to risks identified as high in qualitative analysis. It quantifies and creates a precise measurement of the probability and the impact of risks, helping to determine the potential cost and formulate data-driven mitigation strategies. It provides a deeper understanding of the risk for more informed decision-making. One aspect of this is to calculate equipment loss, the process of which is explained in the following section.
Single Loss Expectancy (SLE): SLE represents the monetary value of the loss of a single item. Losing a laptop worth $1,000 while traveling, for instance, implies an SLE of $1,000.
Annualized Rate of Occurrence (ARO): ARO refers to the number of items lost annually. For example, if an IT team experiences the loss of six laptops in a year, the ARO is 6.
Annualized Loss Expectancy (ALE): This is calculated by taking the SLE and multiplying it by the ARO and represents the total expected loss per year, providing a foundation for insurance and risk management decisions.
Probability: Probability is a fundamental concept in risk analysis that describes the chance of a specific event occurring. It is quantified as a number between 0 and 10; the closer the number is to 10, the higher the probability that the event will occur. Assessing probability helps determine the frequency, or the number of times an event will happen in a given timeframe, with which a risk event might occur, enabling organizations to allocate resources more effectively to manage it.
Likelihood: Likelihood is synonymous with probability in risk analysis, representing the possibility of a risk materializing. It is often expressed in qualitative terms, such as high, medium, or low, providing an intuitive grasp of the risk’s occurrence.
Exposure Factor (EF): EF is a measure of the magnitude of loss or damage that can be expected if a risk event occurs. It is represented as a percentage, reflecting the portion of an asset’s value likely to be affected. By determining the EF, organizations can assess the extent of
damage a specific risk can inflict to produce more accurate risk valuations.
Impact: Impact is the consequence or the effect that a risk event has on an organization or a specific asset. It is often quantified monetarily, representing the potential loss in value. Impact assessment is crucial, as it provides insights into the severity of the risk and allows organizations to determine the necessary controls and response strategies to mitigate the risk.
Chapter 24
3 elements of a Risk register
A comprehensive record of identified risks and their details:
KRIs: KRIs Key Risk Indicators, are an essential element of a risk register. They serve as metrics that provide an early signal of increasing risk exposure in various areas of the organization. KRIs act as early indicators of risk and so are instrumental in anticipating potential problems and allowing organizations to enact proactive measures to mitigate such risks. A KRI in a financial institution could be the number of failed transactions in each period, identifying potential issues in the transaction process that could lead to more significant risks if not addressed promptly.
Risk owners: Assigning risk owners is a fundamental step in constructing a risk register. A risk owner is an individual or team assigned the task of risk management. The risk owner is responsible for the implementation of risk mitigation strategies and monitoring the effectiveness of these strategies over time. For example, in a manufacturing firm, the production manager could be designated as the risk owner for operational risks associated with equipment failure or production delays. Establishing clear ownership ensures that there is a designated authority responsible for addressing and managing each identified risk.
Risk threshold: The risk threshold represents the level of risk that an organization is willing to accept or tolerate. Establishing a risk threshold is vital for maintaining a balance between risk and reward and ensuring that the organization does not undertake excessive risks that could jeopardize its objectives. If a risk surpasses the threshold level, it demands immediate attention and, possibly, a re-evaluation of the strategies and controls in place.
Chapter 24
Risk tolerance
The organization’s capacity to withstand and manage risks
Chapter 24