D1 - Security and Risk Management Flashcards
(59 cards)
System owner
- Own specific IT systems,
- Responsible for systems to be secure,
- Meet business requirements,
- Comply relevant policies & regulations
System administrator
Day-to-day operations & mainteinance of IT systems
Security Analyst
- Monitors networks & systems for security breaches,
- Investigates security incidents,
- Assess risks
Board of Directors
Sets the direction for the organisation:
- Risk appetite,
- Security governance framework.
- Responsible for organisation’s strategies align with business objectives & legal regulatory requirements.
Management
Implements Board of Directors´s directive by establishing:
- Security procedures,
- Controls,
- Policies
Audit Comittee
- Part of the board or independent entity,
- Focus on oversight of financial reporting & disclousures (insight/revelación, divulgación)
- Overseeing effectiveness of organisational controls
Data Owner
- Management is responsible for a specific data set,
- Decides classification,
- Approves access controls according to sensitivity & business importance
Data Custodian
- Technical environment & operations procedures protecting data, (Procedimientos en el entorno técnico y operacional protegiendo datos)
- Implement controls that the Data Owner said,
- Regulatory backups, patches & accessiblility
(Acquisition) What are and do the Governance Committees?
-Groups tasked with oversight roles:
* Strategic directions,
* Compliance,
* Managing risks.
- Policy Development & Review:
- Developing,
- Reviewing & approving security policies & framework,
- Ensure they align with organisational objectives & compliance requirements,
- Risk Oversight,
- Resource Allocation,
- During Acquisition & Divestures:
- Participate in due diligence process,
- Assess security implications, manage the associated risks.
- Through Governance Committees:
- Contribute security policies:
- Advocate security resources,
- Cyber security risks appropriately represented & managed.
(Acquisition) What are Divestitures? (disinvestment, dispossession)
- Sell or spining off a portion of its business,
- Data segregation,
- Access Revocation,
- Continuity of Security Operations.
(Acquisition) How do you do Integration when in Acquisition?
- Integrates IT systems, networks & data.
- Maintaining security standards,
- Cultural integration:
*Harmonising the security cultures, - Security governance principles are uniformly applied.
(Acquisition) What does consist a Risk Assessment when in Acquisition?
- Identify risks,
- Maturity of the acquired company´s security practices,
- Evaluate security policies:
- Incident response history,
- Compliance,
- Existing vulnerabilities & breaches.
What we mean by Acquisition?
Purchaising or taking over another company.
Key difference between due diligence and due care
Due diligence:
- Actively seeking, identifying & understanding risks & regulatory requirements,
- The process of gathering information.
Due care:
- Taking action,
- Mitigate risks & comply with legal obligations,
- Practical application of due dligence findings.
Due care
- Actions taken,
- Prevent harm & protect its assets by implementing security measures,
- Taking necessary steps & applying knowledge from due diligence,
- Address identified risks & comply with legal & regulatory standards.
Due diligence
Investigation & analysis conducted to identify the risks associated with an organisation´s
- IT environment
- Business operations
- Legal Obligations
Proactive actions taken to understand & analyse the risks faced by an organisations.
Application:
Conducting comprehensive risks assessments to identify potential threats & vulnerbilities,
- Revieweing & understanding applicable laws, regulations & standards to ensure compliance,
- Evaluating the security controls & practices of thrid-party vendors & partners.
Which are the 5 pillars of IS?
Confidentiality, Integrity, Availability, Authenticity, Nonrepudiation
What’s Confidentiality?
- Only authorised ppl can access
- Encryption, Access Control, Authentication
What’s Integrity?
- No authorised changes
- Hash functions, Digital Signatures, Version Control
What’s Availability?
- Accessible when needed
- Redundancy, Failover Systems, Regular Mainteinance
What’s Authenticity?
- Confirms IDs of People, Systems and Entities
- Digital Certificates, Biometric Verification
What’s Nonrepudiation
- Prevent denying actions
- Digital Signatures, Comprehensive Audit Trails
What’s Defense in Depth?
- Multiple layers of security measures
- Firewalls, IDS/IPS, Malware Protection Systems, Encryption, AC, Policies, …
What’s Layered Defense?
Stacking security measures. It is a comprehensive security model.
LAYERS:
- Network
*Firewalls, Network Segmentation - Application
*App. Firewalls, Secure Coding Practices - Endpoint security
*Antivirus, Device Management - User Training & Awareness programs