CCSP Domain 6: Legal, Risk, and Compliance Flashcards

1
Q

Policies

A

Interpretations of laws and practices deemed essential to the firm, policies for the foundation of corporate governance by setting rules that must be followed by employees of the firm; as such, they require approval by senior management and penalties for non-compliance.

Policies, which are general principles, are often supported by standards – unambiguous benchmarks for compliance with policy – and guidelines – prototype policies and standards for emerging but as of yet undecided rules of conduct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Criminal Law

A

A body of rules and statutes that define conduct prohibited by the government so as to foster the safety and well being of the public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Tort Law

A

A body of rights, obligations, and remedies that set our relief for people suffering harm because of the wrongful acts of others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

E-discovery

A

The identification, preservation, collection, processing, review, analysis, or production or electronically stored information.

Triggered by: investigation of a crime, internal policy violation, recovery from accidental damage, legal hold, and violations of compliance or regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Forensic Requirements

A

1) Document all steps taken and discoveries made
2) Photograph computer set-ups and peripheral devices used in discovery (e.g. show your work)
3) Before touching a system, photograph / note any information displayed on the monitor, peripherals, etc.
4) Maintain chain of custody – e.g. ideally, have one person gather all evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ISO/IEC 27037

A

Guidance on identification of data sources, acquisition of data, and preservation of data in e-discovery and forensic analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Five Rules of Evidence

A

1) Be authentic : evidence needs to tie back to the scene (i.e. a clean chain of custody)
2) Be accurate : evidence must have authenticity and veracity
3) Be complete : gather all evidence even if it contradicts the hypothesis of the investigators
4) Be convincing : the evidence should be clear and easy to understand (i.e. quoniam res ipsa loquitur)
5) Be admissible : evidence must be admissible and probative (material) to the case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

EU-U.S. Privacy Shield

A

This framework protects the fundamental rights of anyone in the EU whose personal data is transferred to the U.S. for commercial purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HIPAA

A

The Health Insurance Portability and Accountability Act (HIPAA) sets out the requirements of the U.S. Department of Health and Human Services to adopt national standards for electronic health care transactions and national identifiers for providers, health plans, and employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

GLBA

A

The Gramm-Leach-Bliley Act (GLBA) is a federal law that controls the ways that financial institutions deal with the private information of individuals.

It is composed of three sections:

1) Financial privacy rule : regulates the collection and disclosure of financial data
2) Safeguards rule : states that firms must actively protect the financial data they hold
3) Pretexting provisions : prohibits access to the financial information of an individual under false pretenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ISO/IEC 27018:2019

A

Code of practice for the protection of personal data in the cloud.

The five principles of ISO/IEC 27018:2019 are:

1) Consent: a provider may not use customer data without express customer consent
2) Control: customers retain explicit control of how their data is used by the provider
3) Transparency: operations must be clearly documented for and described to the customer
4) Communication: breeches and other incidents must be disclosed in a timely manner with sufficient detail
5) Independent annual audit: adherence must be certified by a neutral party via audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

GAPP

A

There are ten Generally Accepted Privacy Principles (GAPP) in this privacy framework:

1) Management: policy and procedures are documented and warranted (i.e. say what you do, do what you say)
2) Notice: the nature and management of gathered data is disclosed to the subject, partner, etc.
3) Choice and Consent: Consent is required and the choices available to the subject, partner, etc., are clearly articulated
4) Collection: data collected aligns with the limits established in 1-3, above
5) Use, Retention, and Disposal: are each documented and maintained in operations (i.e. say what you do, do what you say)
6) Access: the data subject may access / review the data you hold about them
7) Disclosure to Third Parties: is limited to 1-3, above
8) Security for privacy: data is protected
9) Quality: data is accurate and has integrity
10) Monitoring and enforcement: as it says on the tin… the system is watched and kept within the range of allowable security states

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Privacy Maturity Model

A

M1: ad hoc (i.e. repetition of outcomes is by chance)

M2: limited documentation and process (i.e. repeatable outcomes are possible but variance is likely)

M3: defined, the system works in a proscribed way (i.e. repeatable outcomes are most likely)

M4: managed, the system is monitored for performance and improvement (i.e. business continuity is applied)

M5: optimized, the system is designated ‘perfect’ for the environment – note this may be a system with 80% availability or one with 99.999% … ‘optimized’ mean ideal within the constraints required or desired by the firm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Audit Planning

A

The stages of implementation are:

define audit objectives -> define audit scope -> refine audit processes from lessons learned -> fieldwork -> analysis -> reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CSA STAR Level 1

A

Self-assessment against the Cloud Controls Matrix (CCM) or the Consensus Assessments Initiative Questionnaire (CAIQ) by the vendor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CSA STAR Level 2

A

This level allows outside certifications to be leveraged for heightened CSA assurance – i.e. similar to SOC II, Type 1.

Acceptable methods are:

1) Attestation via CSA and AICPA (an association of accountants), or,
2) via CSA and Chinese national standards, or,
3) certification via CSA and ISO 27001:2013.

17
Q

CSA STAR Level 3

A

Use of continuous monitoring (alla fedRAMP) of adherence to Cloud Controls Matrix (CCM) security processes and technologies.

^ this is the droid you are looking for if this cloud service is critical or highly important to your operations

18
Q

North American Electric Reliability Corporation / Critical Infrastructure Protection (NERC / CIP)

A

NERC / CIP protects the bulk powers system against cybersecurity compromises that could lead to mis-operation or instability.

19
Q

PCI DSS

A

The Payment Card Industry Data Security Standard (PCI DSS) stipulates the benchmark practices required to accept credit card payments.

The standards become more numerous and demanding as the number of credit card transactions increases (e.g. the standards are most strict for the highest volume transactors [ Tier 1 ]).

20
Q

Data Processor

A

A natural or legal person, public authority, agency, or any other body that processes personal data on behalf of the controller. There are situations where an entity can be a data controller, or a data processor, or both.

21
Q

Data Controller

A

The natural or legal person, public authority, agency, or any other body that alone or jointly with others determines the purposes and means of the processing of personal data. Where the purposes and means of processing are determined by national or community laws or regulations, the controller or the specific criteria for the nomination of the controller may be designated by national or community law.

22
Q

Processing (as regards data)

A

Operations that are performed upon personal data whether or not by automatic means, such as collection, recording, organization, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination, or otherwise making available, alignment or combination, blocking, erasure,, or destruction.

Processing is made for specific purposes and scopes, for example, marketing, selling products, justice, the management of employer–employee work relationships, public administration, and health services.

23
Q

Personal data

A

Any information relating to an identified or identifiable natural person, such as sensitive/health data, biometric data, and telephone traffic data.

24
Q

Data Owner

A

Holds legal rights and complete control over data elements.

25
Q

Data Custodian

A

Responsible for the safe custody, transport, and storage of the data and implementation of business rules.

26
Q

Data Steward

A

Responsible for data content, context, and associated business rules.

27
Q

Data Subject

A

One who can be identified, directly or indirectly, by reference to an identification number or to one or more factors specific to their physical, physiological, mental, economic, cultural, or social identity (e.g., telephone number, IP address).

28
Q

Sarbanes–Oxley Act

A

The Sarbanes–Oxley Act of 2002 (often shortened to SOX) is legislation enacted in the United States to protect shareholders and the general public from accounting errors and fraudulent practices in an enterprise.

The act is administered by the Securities and Exchange Commission (SEC), which sets deadlines for compliance and publishes rules on requirements.

Sarbanes–Oxley is not a set of business practices and does not specify how a business should store records; rather, it defines which records are to be stored and for how long. There is nothing specified in the act itself, but the broad statements of legal requirements related to executives maintaining “internal controls” over financial data could be used to legally redress any breach of those controls.

29
Q

ISO rebranding of Avoid, Accept, Mitigate, and Transfer via ISO/IEC 27005:2018

A

Avoid > Avoidance: The activity or condition that precipitates the risk is avoided

Accept > Retention: Retaining the risk without further action

Mitigate > Modification: Course of action that implements controls that are technical, environmental, or cultural

Transfer > Sharing: The risk is shared with another party (e.g., could be contractual, sub-contractual, insurance of some type)

30
Q

Due care

A

“Due care” is a standard of behavior grounded in the concept of “reasonableness.” Did the actor exhibit a standard of behavior that is deemed by the law to be “reasonable,” i.e., would other individuals in the actor’s position act in a similar manner exhibiting an expected standard of due care?

31
Q

Due diligence

A

“Due diligence” is not a standard, but rather a mode of conduct. Did the actor do what is appropriate, reasonable, and expected in engaging in a certain activity?

Due diligence has several areas of application in corporate environments; it means a comprehensive appraisal of a business undertaken by a prospective buyer or investor, especially to establish its assets and liabilities and evaluate its commercial potential.

32
Q

ISO / IEC 27050

A

ISO 27050 strives to establish an internationally accepted standard for eDiscovery processes and best practices.

33
Q

SSAE 16

A

Standards for Attestation Engagement (SSAE) 16 replaced the SAS 70 in 2011 and was updated to SSAE 18 on 01 May 2017; this is the foundation for the Service Organization Control (SOC) reports series – e.g. SOC 1, SOC 2, and SOC 3.

These standards are widely used in the United States of America to help satisfy regulatory requirements such as SOX / Sarbanes-Oxley.

34
Q

ISAE

A

The International Auditing and Assurance Standards Board (ISAE) 3402 reports are very similar in nature and structure to SOC 2 reports (e.g. they also come in Type 1 [point in time assessment] and Type 2 [ six month review of design and operations]).

While SOC is largely used in the USA, ISAE is used internationally.

35
Q

ENISA, ISO / IEC 31000:2018, and NIST SP 800-146

A

These are different, commonly used, risk frameworks:

European Network and Information Security Agency (ENISA) published a general frameworks outlining 35 risks that an organization faces, as well as a “Top 8” list of risks based on their probability of realization.

ISO / IEC 31000:2018 is a non-certification standard for risk management from the perspectives of designing and implementing a risk management program.

NIST SP 800-146, “Cloud Computing Synopsis and Recommendations,” is a US federal framework similar to ENISA.