Chapter 2 Flashcards

(31 cards)

1
Q

Organisation-Wide Risk Management

A

Involve everyone in the organisation, from top leaders to regular employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Multi-Level Risk Management Model

A

This model manages risks at three levels: organisation, mission/business process, and information system, ensuring that risks are addressed comprehensively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Level 1 and 2 Activities

A

These activities prepare the organisation for risk management by identifying roles, assets, threats, and risk assessments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Level 3 in Risk Management

A

Level 3 focuses on system-specific risks, guided by decisions at higher levels, and designates controls based on security/privacy requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Traceability of Controls

A

It ensures that security and privacy controls are linked to specific requirements throughout the system’s lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Consequences of Inadequate Organisational Preparation

A

Inadequate preparation can lead to costly and ineffective security measures, impacting the organisations efficiency and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Management Framework Steps (RMF)

A

RMF has seven steps, including preparation, categorisation, selection, implementation, assessment, authorisation, and monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Prepare
A

Step 1 establishes priorities for security and privacy risk management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Categorise
A

In step 2, the impact of potential loss and system categorisation is analysed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Select
A

Step 3 involves selecting and tailoring controls based on a risk assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Implement
A

Step 4 is about putting selected controls into practice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Assess
A

Step 5 evaluates control implementation to ensure they meet requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Authorise
A

Step 6 grants system authorisation based on acceptable risk levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Monitor
A

Step 7 involves continuous assessment of control effectiveness and reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Adaption of RMF Steps

A

RMF steps can be adjusted as needed, especially in agile development, where steps may need revisiting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Integration of Information Security and Privacy Programs

A

Information security and privacy programs work together to manage risks associated with personally identifiable information (PII) by selecting and monitoring controls.

17
Q

Privacy Controls vs Security Controls

A

Privacy controls focus on compliance and privacy risks, while security controls cover broader protection needs.

18
Q

Authorisation Boundaries

A

The authorisation boundary defines what the organisation commits to protect in an information system, involving people, processes, and technologies supporting the organisations mission.

19
Q

Systems and System Elements

A

Information systems consist of various elements, including technology, humans, physical components, and environmental factors, working together for specific goals.

20
Q

Authorisation Boundaries Review

A

The scope of the authorisation boundary is periodically reviewed as part of continuous monitoring, aligning with the organisations resources and flexibility.

20
Q

Interconnections in Systems

A

Systems’ interconnections enable them to interact and produce capabilities, operating within an influencing environment.

20
Q

External Systems

A

Other systems interact with the operational environment but may be outside the authorisation boundary, depending on context and organisational considerations.

20
Q

Enabling Systems

A

Enabling systems, although outside the authorisation boundary, may provide support during a system’s lifecycle by offering common controls or services.

21
Q

Establishing Authorisation Boundaries

A

Establishing meaningful authorisation boundaries involves coordinating with key participants, considering mission, business, security, privacy, and cost factors.

21
Requirements and Controls Overview
Requirements signify protection needs, while controls outline safeguards. Requirements can be legal, policy-based, or from risk assessments, and controls are chosen and implemented to meet these needs.
21
Categorising Requirements
Organisations may categorise requirements as capability, system, or statement of work requirements, depending on their role in the SDLC.
21
Types of Controls
Controls cover technical, administrative, and physical aspects and are chosen and implemented to meet system requirements.
21
Security and Privacy Posture Definition
The security and privacy posture reflects the organisations status in terms of resources and capabilities to protect information systems and comply with privacy requirements.
21
Supply Chain Risk Management (SCRM)
Organisations increasingly rely on external providers for products and services, introducing significant risks. SCRM policies help address these supply chain risks.
22
Responsibilities with External Providers
External providers handling federal information must meet security and privacy requirements equivalent to federal agencies, with the RMF serving as a tool for managing supply chain risk.
22
Assurance in SCRM
Assurance in SCRM is based on contractual terms, evidence of control, effectiveness, and trust in the provider, and it determines the acceptability of risk from external providers.