01. Information Security Control Design and Selection (240) Flashcards
(44 cards)
Information Security Control Design and Selection
Controls are the procedures, mechanisms, systems, and other measures designed to reduce risk through compliance to policies
240
Information Security Control Design and Selection
An organisation develops controls to ensure that its business objectives will be met, risks will be reduced, and errors will be prevented or corrected
240
Information Security Control Design and Selection
Controls are created to ensure desired outcomes and to avoid unwanted outcomes. They are created for several reasons includingl
240
- regulation
- risk assessment
- audit result
Control Classification
Sucurity managers should understand the characterstics, or classifications, of controls. Control classification types, classes, and categoris should all be understood
Types of controls
3 types of controls;
- Physical
- Technical
- Administrative
242
Class of Controls
6 classes of controls;
- Preventive
- detective
- deterrent
- corrective
- compensating
- recovery
242
Preventive
Used to prevent the occurrence of unwanted events
Detective
Used to record both wanted and unwanted events
Deterrent
Exists to convince someone that they should not perform and unwanted activity
Corrective
Activated manually or automatically after some unwanted event has occurred
Compensating
Used where some other direct control cannot be used
Recovery
Used to restore system or asset to its pre-incident state
Class of Controls
Examples….
Preventive
Computer loging screen, key card system, encryption
Detective
Video surveillance, event logs
Deterrent
Video surveillance cameras and monitors, fences,
Corrective
The process of improving a process whenf ound to be ineffective
Compensating
A guest sing-in register used/used in place of when video surveilance is unavailable
Recovery
Malware removal tools, backup software to recover lost files
243
Categories of Control
2 categories of controls that relate to the nature of their operation;
- Automatic
- Manual
244
Automatic
Performs its function with little or no human judgement or decision making
Manual
Requires human to operate it
Categories of Control
Examples…
Automatic
Login page to application that cannot be circumvented, security door automatically locking
Manual
Monthly review of computer users
244
Control Objectives
Control objectives describe the desired states or outcomes of business operations
244
General Computing Controls
IT will have a set of controls that apply across all of its applications and services, known as General Computing Controls (GCC’s)
245
General Computing Controls
General Comput Controls (GCCs) are general in nature, often implemented in different ways on different information systems based on individual capabilities and limitations, and applicability
245
Contorls: Build vs Buy
Build vs Buy of controls refers to the business decisions organisation leads take regarding building a new assets, tangible or intangible, or paying another organisation to create the asset.
245
Control Frameworks
A control framework is a collection of controls, organisation into logical categories
246
Control Frameworks
Well known control frameworks developed to streamline the process of control development and adoption;
- ISO/IEC 27002
- NIST SP 800-53
- CIS CSC
Control Frameworks
Selection of a control framework should represent a starting point.Once a framework is selected, the organisation can use risk management life cycle to understand risks in the organisation that result in changes to controls used
247
Mapping Control Frameworks
One or more control frameworks may be adopted primarily because…
- Multiple apllicable regulatory frameworks
- Multiple operational context
248
Example;
Healthcare services that take credit card payments would likely select HIPAA and PCI DSS, where either framework does not fully address all the needs of the business alone
Mapping Control Frameworks
Organisations will map control frameworks together, resulting in a single control framework with controls from each framework
248
Mapping Control Frameworks
A chart that maps two or more control frameworks together is known as a crosswalk
248
Working with Control Frameworks
Security Managers need to organise the organisations operational activities around the selected/mapped control frameworks
249
Working with Control Frameworks
Risk Assessment
Before a control can be designed, the security manager needs to know the nature of the risk(s) the control is intended to address
249
Working with Control Frameworks
Control Design
Before a control can be used, it must be designed. A control framework comprises the control language, and some degree of guideance
249
A security manager with personnel who are responsible for revelent technologies, willd etermine what activity is required to implement the control
Working with Control Frameworks
Control Design
Proper control design will potentially require one or more of the following; New or changed….
- Policies
- Business process documents
- Information systems
- Business records
250
Control Architecture
**Control Architecture **refers to the “big picture” of controls in an organisation. Security managers need to understand how controls work together
250