5.0 Governance, Risk, and Compliance Flashcards
(119 cards)
What is a managerial security control?
A managerial security control provides the guidance, policies, and procedures for implementing a secure environment, such as an acceptable use policy.
A managerial security control gives oversight of the information system. Examples could include risk identification or a tool allowing the evaluation and selection of other security controls.
Administrative security controls are used to determine behavior through policies, procedures, and guidance. A fair use policy is an example of an administrative control.
What do operational security control refer to??
What can do they do?
Who are they implemented by?
2 Examples of Operational controls?
An operational security control refers to an item that can physically be touched. Operational controls are used to prevent or detect unauthorized access to physical areas, systems, and assets.
An operational security control is implemented primarily by people rather than systems.
For example, security guards and training programs are operational controls rather than technical controls.
What is a technical security control?
A technical security control includes hardware or software mechanisms used to protect assets. Antivirus software, firewalls, and intrusion detection systems are examples of a technical control.
A technical security control is implemented as a system (hardware, software, or firmware). For example, firewalls, anti-virus software, and OS access control models are technical controls.
A technical control is implemented in operating systems, software, and security appliances. An Access Control List (ACL) or intrusion prevention system (IPS) are examples.
What does is a preventive control do?
What are 4 examples?
A preventive control aims to prevent security incidents in a system.
Security training and
change management are examples of a preventive security control.
A preventive control physically or logically restricts unauthorized access. A
system password and
physical door lock are
examples of preventive controls.
What is a detective control?
A detective control will identify and record any attempted or successful intrusion. A detective control operates during the progress of an attack.
A detective control identifies when incidents or vulnerabilities have occurred. Auditing and monitoring are examples of detective controls.
A detective control may not prevent or deter access, but it will identify and record any attempted or successful intrusion. A security camera system is an example of a detective contro
What is a corrective control?
Whats an example?
A corrective control responds to and fixes an incident, and prevents reoccurrence. Antivirus software is an example of a corrective control.
What does a compensating control do?
What’s an example?
A compensating control does not prevent an attack but can restore functionality of systems through other means, such as a backup.
What are Administrative security controls?
Administrative security controls are used to determine behavior through policies, procedures, and guidance. A fair use policy is an example of an administrative control.
What is Containment?
A control type or a step in incident management?
Containment does not refer to a security control type; rather, it refers to a step in the incident management lifecycle for handling a threat.
What is a deterrent control?
A deterrent control may not physically or logically prevent access, but psychologically discourages an attacker from attempting an intrusion. A warning sign is an example of a deterrent control.
Which of the following protection and accountability principles does the General Data Protection Regulation (GDPR) provide to consumers?
Purpose limitation
The General Data Protection Regulation (GDPR) provides consumers with purpose limitation by ensuring organizations must process data that was collected for the explicit purposes specified to the data subject.
Data minimization
A data controller should only collect and process as much data as necessary for the purposes specified. This procedure is considered data minimization.
Integrity and confidentiality
Organizations must process personal data in such a way that it ensures the integrity and confidentiality of the consumers’ information.
What is layered security?
Layered security is the practice of providing prevention, detection, and response simultaneously as defense in depth. It includes multiple forms of security.
Think Antivitus, IDS, Firewall.
Patching isn’t part of layerd security as it’s done once the vulnerabilities are found and fixed.
What is The Payment Card Data Security Standard (PC DSS)?
The Payment Card Data Security Standard (PC DSS) is a set of 12 requirements aimed to ensure companies that process, store, or transmit credit card information maintain a secure environment.
What is The Health Insurance Portability and Accountability Act of 1996 (HIPAA)?
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) mandates that medical facilities and patient representatives protect private health information of an individual.
What is The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)?
The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) provides a security policy for how private sector organizations can assess and improve their ability to prevent, detect, and respond to cybersecurity attacks
What are Regulatory frameworks based on?
What do regulatory frameworks do?
Regulatory frameworks are based on specific laws and regulations and ensure compliance of those standards. These regulatory frameworks are highly-controlled and regulated. Medical records are governed by regulatory laws, for example.
What does the Federal Information Security Management Act (FISMA) of 2002 dictate?
Who does this apply to?
The Federal Information Security Management Act (FISMA) of 2002 requires federal agencies to develop, document, and implement an information security and protection program. The FISMA is a United States NATIONAL law.
What is a non-regulatory framework?
A non-regulatory framework identifies common standards and best practices that companies can follow but is not required by law.
What is The International Organization for Standardization (ISO)?
The International Organization for Standardization (ISO) is an independent international standard for information technology security. This non-governmental organization develops standards to ensure the quality, safety, and efficiency of systems.
What are Industry-specific frameworks?
Industry-specific frameworks govern certain industries, such as financial and healthcare organizations. The Payment Card Data Security Standard (PC DSS) and Health Insurance Portability and Accountability Act of 1996 (HIPAA) are industry specific.
What does a Service Organization Control (SOC) Type II report do?
A Service Organization Control (SOC) Type II report provides assurances about the effectiveness of controls in place in an organization within a given timeframe.
What does a Service Organization Control (SOC) Type III report do ?
Service Organization Control (SOC) Type III report is not as detailed of a report certifying compliance with SOC2.
What is the International Organization for Standardization (ISO) 27701?
The International Organization for Standardization (ISO) 27701 provides specific requirements and guidance for establishing, implementing, maintaining, and continually improving an information system containing private data.
What does a A Service Organization Control (SOC) Type I report do?
A Service Organization Control (SOC) Type I report addresses internal controls over financial reporting.