Chapter 16 - Security Governance and Compliance Flashcards
Governance
Governance programs are the sets of procedures and controls put in place to allow an organization to effectively direct its work.
Board of Directors
A Board of Directors has ultimate authority over a corporation as the owner’s representatives. Shareholders elect the members of this board to direct the actions of the corporation on their behalf.
Independent Directors
Independent Directors have no significant relationship with the company other than their board membership.
Chief Executive Officer (CEO)
The Chief Executive Officer is hired by the board of directors to manage the day-to-day operations of the corporation. The CEO is hired by the board, may be dismissed by the board, and has their performance reviews and compensation determined by the board.
Centralized Governance Model
Centralized Governance Models use a top-down approach where a central authority creates policies and standards, which are then enforced throughout the organization.
Decentralized Governance Model
Decentralized Governance Models use a bottom-up approach, where individual business units are delegated the authority to achieve cybersecurity objectives and then may do so in the manner they see fit.
Policy
Policies are high-level statements of management intent. Compliance with policies is mandatory. An information security policy will generally contain broad statements about cybersecurity objectives.
Standards
Standards provide mandatory requirements describing how an organization will carry out its information security policies. These may include the specific configuration settings used for a common operating system, the controls that must be put in place for highly sensitive information, or any other security objective.
Procedures
Procedures are detailed, step-by-step processes that individuals and organizations must follow in specific circumstances. Similar to checklists, procedures ensure a consistent process for achieving a security objective.
Guidelines
Guidelines provide best practices and recommendations related to a given concept, technology, or task. Compliance with guidelines is not mandatory, and guidelines are offered in the spirit of providing helpful advice.
Compensating Control
Compensating Controls are designed to mitigate the risk associated with exceptions to security standards.
Change Management
Change Management processes ensure that appropriate personnel review and approve changes before implementation and ensure that personnel test and document the changes.
Impact Analysis
Impact Analysis is the process of evaluating changes to identify any security impacts before personnel deploy the changes in a production environment.
Backout Plan
A Backout Plan allows personnel to undo the change and return the system to its previous state if necessary.
What are the common tasks within a change management process?
- Request the change
- Review the change
- Approve/reject the change
- Test the change
- Schedule and implement the change
- Document the change
Version Control
Version Control ensures that developers and users have access to the latest versions of software and that changes are carefully managed throughout the release process. A labeling or numbering system differentiates between different software sets and configurations across multiple machines or at different points in time on a single machine.
Two-Person Control
Two-Person Control requires the participation of two people to perform a single sensitive action.
Job Rotation
Job Rotation practices take employees with sensitive roles and move them periodically to other positions in the organization. The motivating force behind these efforts is that many types of fraud require ongoing concealment activities. If an individual commits fraud and is then rotated out of their existing assignment, they may not be able to continue those concealment activities due to changes in privileges and their replacement may discover the fraud themselves.
Mandatory Vacations
Mandatory Vacations force employees to take annual vacations of a week or more and revokes their access privileges during that vacation period.
Clean Desk Policy
Clean Desk Policies are designed to protect the confidentiality of sensitive information by limiting the amount of paper left exposed on unattended employee desks.
Due Diligence
Due Diligence involves thoroughly vetting potential vendors to ensure that they meet the organization’s standards and requirements. This process should include an evaluation of the vendor’s financial stability, business reputation, quality of products or services, and compliance with relevant regulations.
Conflicts of Interest
Conflicts of Interest arises when a vendor has a competing interest that could influence their behavior in a way that is not aligned with the best interests of the organization.
Right-to-Audit Clause
The Right-to-Audit Clause allows the customer to conduct or commission audits on the vendor’s operations and practices to ensure compliance with terms and conditions.
Supply Chain Analysis
Supply Chain Analysis is vital in understanding the risks associated with the vendor’s supply chain. This includes assessing the vendor’s suppliers and understanding the interdependencies and risks that could impact the vendor’s ability to deliver products or services.