Control/framework/Roles Flashcards
(35 cards)
What are the three types of controls in cybersecurity?
Preventative
Detective
Corrective
What is a preventative control?
They are designed to stop bad things from happening by preventing attacks before they occur.
What are some examples of preventative controls?
Unique usernames and passwords for each user
Locking accounts after multiple incorrect password attempts
Keeping software updated
Training users to be cautious when clicking on links in emails
What do detective controls do?
They are used to detect something bad that is happening, such as a security breach or attack.
What are some examples of detective controls?
Antivirus and antimalware applications
Systems that monitor network activity for malicious behavior
Analyzing log files created by systems during use
What are corrective controls used for?
They are used after an attack to restore things to normal.
What are some examples of corrective controls?
Incident response
Forensic analysis
Restoring data from backups
What are the five functions of the NIST Cybersecurity Framework?
Identify
Protect
Detect
Respond
Recover
identify?
To identify assets and threats to those assets, ensuring that an organization spends its resources in the right places.
Protect?
Selecting, managing, and optimizing controls to protect the organization from cyber threats.
Why do the detect, respond, and recover functions exist in the NIST framework?
Because good cybersecurity assumes that a threat actor may succeed, so organizations need the capabilities to detect, respond to, and recover from an incident.
What is the goal of the respond function in the NIST framework?
To respond to detected incidents in a controlled way with the objective of containing the incident.
What is the goal of the recover function in the NIST framework?
To recover normal operations after an incident has been contained.
Process for Using a Control Framework
Benchmark: Assess where the organization is currently against the framework.
Set Target Posture: Define the desired cybersecurity posture based on the framework.
Manage Change: Plan and manage the changes needed to achieve the target posture.
What are some essential controls that almost every organization will use in cybersecurity?
Applying updates (patching) to computer operating systems and applications.
Application whitelisting.
Hardening computers against attacks.
Limiting the number of people with administrative access to systems.
Implementing multifactor authentication (MFA).
Ensuring data is safely backed up.
Why is patching an important cybersecurity control?
Patching software fixes vulnerabilities in the system that could be exploited by attackers.
What is application whitelisting?
Configuring a computer to only run software that the organization explicitly permits, making it difficult for attackers to run malicious software.
What does hardening a computer’s defenses mean?
Configuring all settings for security.
Removing unnecessary software and components to reduce vulnerabilities.
What is multifactor authentication (MFA)?
A security control requiring users to provide something in addition to a username and password, such as a fingerprint, smartcard, or one-time code from a smartphone.
Why is backing up data essential in cybersecurity?
It allows an organization to restore data and recover operations without paying a ransom if the data is tampered with, erased, or encrypted by an attacker.
What is control assurance?
Control assurance ensures that cybersecurity controls are both operational and effective. It involves monitoring systems and testing controls to verify that they function as intended.
Why do controls fail?
They are not enabled or are in an error condition.
They have flaws and haven’t been updated.
They were never configured properly.
How can organizations ensure controls are operational?
Organizations can deploy monitoring systems and report key performance indicators (KPIs) for controls to ensure they are operational.
How can organizations ensure controls are effective?
Organizations can test controls by simulating attacker behavior and verifying that the control works as expected.