Chapter 1 Flashcards
(50 cards)
These controls include the processes that we put in place to manage technology in a secure manner.
Operational Controls
These controls are procedural mechanisms that focus on the mechanics of the risk management process.
Managerial Controls
These controls are the security controls that impact the physical world.
Physical Controls
These controls enforce the CIA Triad (Confidentiality, Integrity, and Availability) in the digital space.
Technical Controls
These controls are intended to stop a security issue before it occurs.
Preventative Controls
These controls remediate security issues that have already occurred.
Corrective Controls
These controls are designed to mitigate the risk associated with exceptions made to a security policy.
Compensating Controls
These controls inform employees and others what they should do to achieve security objectives.
Directive Controls
These controls seek to prevent an attacker from attempting to violate security policies.
Deterrent Controls
These controls identify security events that have already occurred.
Detective Controls
These are specific measures that fulfill the security measures of an organization.
Security Controls
PCI DSS criteria that must be met for compensating control to be satisfactory (3)
- The control must meet the intent and rigor of the original requirement.
- The control must provide a similar level of defense as the original requirement, such that the compensating control sufficiently offsets the risk of the original requirement.
- The control must be above and beyond other PCI DSS requirements.
This process reviews the control objectives for a particular organization, system, or service and then examines the controls designed to achieve those objectives.
Gap Analysis
These are statements of a desired security state, but they do not by themselves carry out any actual security activities.
Control Objectives
CIA Triad (3)
- Confidentiality
- Integrity
- Availability
This pillar ensures that unauthorized individuals are not able to gain access to sensitive information.
Confidentiality
This pillar ensures that there are no unauthorized modifications to information or systems, either intentional or unintentional.
Integrity
This pillar ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them.
Availability
DAD Triad (3)
- Disclosure
- Alteration
- Denial
This is the threat of exposure of sensitive information to unauthorized individuals, otherwise known as data loss (confidentiality violation).
Disclosure
This is the threat of unauthorized modification of information (integrity violation).
Alteration
This is the threat of a disruption to an authorized user’s legitimate access to information (availability violation).
Denial
This process means that someone who performed some action, such as sending a message, cannot later deny having taken that action.
Nonrepudiation
These occur when an organization experiences a breach of the CIA Triad (Confidentiality, Integrity, and Availability) of information and information systems.
Security Incidents