6.1 Key Concepts Design and validate assessment, test, and audit strategies Flashcards

Domain 6 (26 cards)

1
Q

is an evaluation of an organization’s security posture, aimed at identifying vulnerabilities, threats, and risks to the organization’s information assets.

A

security assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a systematic evaluation of an organization’s information system security against a set of established criteria or standards. Generally, it must be conducted by
independent (usually external)

A

security audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Regular evaluations conducted by departments or teams to assess
their own security practices.
– Often used as a preliminary step before more formal assessments.
– Can help foster a culture of security awareness.

A

Self-assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Formal examinations of security controls and processes by the organization’s
internal audit team.
– They provide a deeper understanding of the organization’s current security posture
from an insider’s perspective.
– Help ensure compliance with internal policies and external regulations.

A

Internal audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Systematic reviews of security weaknesses in systems and
applications.
– Often automated using vulnerability scanning tools.
– Should be conducted regularly to identify new vulnerabilities.

A

Vulnerability assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Simulated attacks on systems to identify exploitable vulnerabilities.
– Can be conducted by an internal “red team” or specialized security personnel.
– Provides valuable insights into real-world attack scenarios and validating efficacy of
existing security controls.

A

Penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Developing and tracking key performance indicators
(KPIs) for security.
– Helps quantify the effectiveness of security controls.
– Supports data-driven decision-making for security investments.

A

Security metrics and reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Simulated attacks conducted by specialized security firms.
– Offers an outside perspective on the organization’s security defenses.
– Can identify vulnerabilities that may be overlooked internally.

A

External penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Comprehensive reviews of an organization’s
security program by external experts.
– Can provide valuable insights and recommendations based on industry best practices.
– Often used to benchmark against industry standards or prepare for certifications.

A

Security assessments by consultants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Assessments specifically focused on adherence to
regulatory requirements.
– Examples include HIPAA audits for healthcare organizations or PCI DSS assessments
for companies handling payment card data.

A

Compliance audit or assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Evaluations of the security practices of third-party
vendors or service providers.
– Critical for managing supply chain risks.
– May involve questionnaires, on-site visits, or review of vendor’s security certifications

A

Vendor security assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

are controlled by an external organization. This could be a regulatory body,
a customer, or another entity. The auditors are selected by the initiating organization (often
a regulatory body or customer), and the organization being audited has little control over
the process. are often conducted for regulatory compliance or contractual
obligations.

A

Third-party audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

To reduce the burden of multiple audits for organizations with large numbers of clients, like
public cloud service providers (CSPs), standards. were developed by the American Institute of Certified Public Accountants
(AICPA).

A

Statement on Standards for Attestation
Engagements (SSAE) 18

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Statement on Standards for Attestation Engagements (SSAE) audits

A

System and Organization Controls (SOC) audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Assesses controls impacting financial reporting accuracy

A

SOC 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Evaluates security and privacy controls. Results are confidential. Typically, the
organization audited requires customers to sign an NDA to receive a copy.

17
Q

Similar to SOC 2, but results are for public disclosure

18
Q

Auditor’s opinion on management’s control description and design suitability at a specific point in time.

A

Type I of SOC 2 Report

19
Q

Includes Type I content plus assessment of control effectiveness over an extended period, usually six months or longer. are considered more reliable as they involve actual testing of
controls.

A

Type II SOC 2 Report

20
Q
  1. Security: Ensures that the service organization has implemented appropriate measures to
    protect the security of systems, data, and networks.
  2. Availability: Ensures that the service organization has implemented appropriate measures
    to ensure the availability of systems, data, and networks.
  3. Processing Integrity: Ensures that the service organization has implemented appropriate
    measures to ensure that data is processed accurately and completely.
  4. Confidentiality: Ensures that the service organization has implemented appropriate
    measures to protect the confidentiality of data.
  5. Privacy: Ensures that the service organization has implemented appropriate measures to
    protect the privacy of personal information.
A

SOC 2 Five Trust Principles

21
Q
  • Physical Access. Auditors typically need physical access to hardware, network devices,
    and data centers for inspection, configuration reviews, and testing.
  • Control and Visibility. The organization retains greater control over its infrastructure thus
    auditors have more direct visibility into security configurations.
  • Scope. Audits may be focused on traditional IT infrastructure, including network security,
    operating systems, physical safeguards, etc.
A

On-premises. Challenges and considerations

22
Q
  • Shared Responsibility. Security is a shared responsibility between the organization
    and the cloud provider. Audit focus shifts towards how the organization uses the cloud
    services.
  • Documentation and APIs. Auditors rely heavily on cloud provider documentation, service
    configurations, and access to relevant APIs for gathering evidence.
  • Compliance Focus. Emphasis is often on meeting cloud-specific security standards (e.g.,
    SOC 2, ISO 27001, FedRAMP) and the organization’s configuration of cloud services.
A

Cloud. Challenges, considerations

23
Q
  • Increased Complexity. Hybrid environments present the greatest complexity due to the
    mix of on-premises and cloud components that need auditing.
  • Data Flows. Understanding how data moves between on-premises and cloud environments
    is crucial for risk assessment.
  • Integrated Controls. Auditors must evaluate the effectiveness of security controls across
    the entire hybrid landscape.
A

Hybrid cloud challenges

24
Q

refers to a customer’s contractual right to directly
assess a service provider’s security, compliance, and operational practices. This is especially
important for highly regulated industries, where regulations may require direct audits to
ensure the secure storage and handling of sensitive data.

A

Right-to-Audit

25
Disruption: Physical audits can disrupt a CSP’s operations and environment. * Shared Infrastructure: Multi-tenant cloud environments raise concerns about exposing data or practices of other clients during an audit. * Security Risks: External auditors within the CSP’s environment might introduce security vulnerabilities. * Scalability: Physical audits become inefficient for large CSPs with many clients.
Challenges with Right-to-Audit in the Cloud
26
1. Third-Party Attestations and Reports * SOC Reports (SOC 1, SOC 2, SOC 3): Independent audits by accredited firms examining internal controls and issuing reports with varying levels of detail. * Certifications: Compliance with industry standards like ISO 27001 (security management) or HIPAA/PCI DSS (data privacy) achieved through formal audits. Domain 6 - Security Assessment and Testing 328 2. Detailed Reporting and Transparency * Security Dashboards: Providing clients with real-time insights into their specific cloud environment and configurations. * Compliance Documentation: Up-to-date summaries of the CSP’s controls, policies, and incident response procedures. 3. Contractual Provisions * Strong Service Level Agreements (SLAs): Defining performance guarantees, uptime requirements, and response times for security incidents. * Liability Provisions: Clearly outlining financial responsibility in case of data breaches, mitigating risks for clients. 4. Technical Safeguards * Encryption: Ensuring data is encrypted at rest and in transit for enhanced security. * Robust Access Controls: Stringent procedures for managing access to client data within the CSP’s environment. * Logging and Monitoring: Maintaining detailed logs for auditing and forensic investigation purposes.
CSP Alternatives for Assurance