CISSprep - Missing Topics from Common Books Flashcards
(249 cards)
Unilateral NDA
One-way disclosure, meaning that one (uni) company is disclosing something, for example a flat file that’s sent to another organization for its own contracted use.
Bilateral NDA
Two-way disclosure. Example: exchange of files between two organizations. In the previous example, if the flat file was then bounced up against another DB to match with SSNs or names, and then populated with new demographic data.
Multilateral NDA
Disclosures made among three or more parties.
Non-compete agreement
Basically an agreement where the the individual agrees that they won’t use your data/secrets to become your competition.
Prudent actions
Prudent actions are those that most people in a similar life circumstances would do. For example, if the speed limit is 55 you might be able to argue that most “prudent” people are usually within 5 to 10 miles over or under the speed limit.
Reasonable actions
Reasonable actions are actions that have logical justification. For example, if you break someone’s rib during a karate class, it’s probably reasonably justified, but if you do that to a random person on the street, it’s not justified (or in this case, reasonable).
Data portability
Data portability – this is a GDPR right, and says that an individual can have their data securely transferred from one service or controller to another, and that controllers need to provide a mechanism for such requests to be made, such as a paper form to be submitted that requests the transfer, or maybe an online web form.
Data localization
Data localization refers to the requirement that data be processed and stored in the country of the data’s origin, or where it was collected. GDPR discusses this principle in the context of the conditions that are required before transmitting EU data outside of the EU.
GDPR privacy principles
Purpose limitation – this means it should be collected for the stated purpose.
Data minimization – this means it should be used for the stated purpose.
Accuracy – this means there should be a method for the data subject to make corrections so that the info is accurate.
Storage limitation – basically, don’t keep the information longer than needed.
Integrity/confidentiality – this means you should prevent unauthorized modifications or views of the data.
Accountability – means that your organization must demonstrate compliance with these principles and are accountable/responsible for the data.
Article 5 (accountability)
Accountability – means that your organization must demonstrate compliance with these principles and are accountable/responsible for the data.
Public chapter
Public Chapter (previously “public domain”) – use is allowed without constraints, for any purpose, including modification and customization. Support and extra features must be purchased.
Secure defaults
Video explanation: https://youtu.be/EtmTmqCglr4
SECURE DEFAULTS, derived from NIST SP 800-53 control number SA-8, sub control # (23) also known as restrictive defaults – from a manufacturer’s point of view means that products are securely configured “as-shipped”, meaning customers don’t have to apply a lot of configurations out of the box; the product or software is capable of preventing breaches from the get-go, and that the product should initialize / startup in a secured state. It also means that during any unsuccessful initialization, it should still perform actions in a secure state, or not perform the actions at all.
Restrictive defaults
Video explanation: https://youtu.be/EtmTmqCglr4
From a manufacturer’s point of view means that products are securely configured “as-shipped”, meaning customers don’t have to apply a lot of configurations out of the box; the product or software is capable of preventing breaches from the get-go, and that the product should initialize / startup in a secured state. It also means that during any unsuccessful initialization, it should still perform actions in a secure state, or not perform the actions at all.
Zero trust
An architecture in which nothing is trusted. Just like the name implies, devices and users need to be authenticated and authorized for each and every action. https://cissprep.net/architecture-terminology/
Privacy by design
Privacy should be implemented throughout the entire SDLC, and that it needs to be collaborated and communicated at all staffing levels throughout the project.
Trust but verify
Trust but verify – has two additional names to be aware of – system assurance and security verification. This is basically a process of monitoring and looking for, the presence/absence of proper/improper behaviors, against some type of measurable criteria. https://cissprep.net/architecture-terminology/
HITRUST
A collection of frameworks compiled into a single resource with the objective to normalize the different sets of security requirements into a single trusted certification/assessment.
Privacy Management Framework (PMF)
PMF was created as a revision to the 2009 Generally Accepted Privacy Principles (GAPP) by the AICPA. It incorporates local information and data privacy laws and standards that including GDPR and updates to the AICPA’s Trust Services Criteria (TSC).
SWIFT security control framework
A security control framework for financial and payment card system builders. PCI is for payment card processors only, whereas SWIFT has a much broader scope. https://www.swift.com/about-us
Cloud Security Alliance’s IOT security control framework
CSA STAR is for cloud security alliance, which publishes standards for cloud security. Of interest is: Tier 1, in which participants self-assess by filling out a questionnaire, Tier 2 is a third party assessment. Tier 3 is currently in draft, but would include continuous monitoring.
Maximum Allowable Outage
Formerly called “MAD”, this is the amount of time for an outage that the organization can suffer without causing irreparable harm.
Asset-based risk perspective (there are 4 risk perspectives in new CBK)
Asset-based is identifying risks based on what can happen to your assets.
https://cissprep.net/risk-management/
Outcome-based risk perspective
Outcomes-based is identifying what can happen to your desired outcomes, such as profits, income, or sales.
Vulnerability-based risk perspective
Vulnerability-based is centered around inherent weaknesses.