1 - Security Governance Through Principles and Polcies Flashcards
(34 cards)
CIA Triad
Confidentiality
Integrity
Availability
Confidentiality
Objects are not disclosed to unauthorized subjects
Integrity
Objects retain their veracity and are intentionally modified by authorized subjects
Availability
Authorized subjects are granted uninterrupted access to objects
Identification
Process to establish an identity and accountability
Authentication
Process of verifying or testing that a claimed identity is valid
AAA
Authentication
Authorization
Accountability
Authorization
Activity, access, rights, or privileges are granted to to an authenticated identity
Auditing
Monitoring subjects to be held accountable for their actions while authenticated on a system
Detecting unauthorized or abnormal activities on a system
What is the importance of Accountability?
Security policies can only be enforced if subjects are held accountable for their actions
Nonrepudiation
Subject of an activity cannot deny that the event occurred
What are the three types of security management planning?
Strategic - long term
Tactical - mid term
Operational - short term
What are the elements of a security policy structure?
Policy
Standards/Baseline
Guidelines
Procedures
Layering
Use of multiple controls against security threats
Abstraction
Collection of similar elements into groups or classes that are assigned security controls/restrictions as a collective
Encryption
Hiding meaning or intent of a communication
Government/Military classifications
Top Secret Secret Confidential Sensitive unclassified Unclassified
Commercial business/private sector classification levels
Confidential
Private
Sensitive
Public
COBIT (Control Objectiveness for Information and Related Technology) principles
Meeting Stakeholder Needs Covering the Enterprise end-to-end Applying a single, integrated framework Enabling a holistic approach Separating Governance from management
What are the primary security roles?
Senior Manager Security Professional Data Owner Data Custodian User Auditor
Separation of duties
Dividing critical work tasks among individuals so that no one person can compromise security
Principle of least privilege
Users should be granted the minimum amount of access necessary
Job rotation and mandatory vacation
Reduce fraud, theft, misuse of information and audit/verify work tasks
SLA (Service level agreement)
Define levels of performance, expectation, compensation, and consequences