Domain 1 Flashcards
What is the CIA Triad
- Confidentiality
- Integrity
- Availability
Achieving CIA Best Practices
- Separation of Duties
- Mandatory Vacations
- Job Rotation
- Least Privilege
- Need-to-know
- Dual Control
BIA
Business Impact Analysis
Define RTO
Planned recovery time. The amount of time allocated for a recovery plan to be executed
WRT
Work Recovery Time
Define WRT
The time needed to test and make sure everything is ready to go into live production environment
SLO
Service Level Objective
Define SLO
The level of Service a business needs to recover to in order to meet contractual requirements
RTO
Recovery Time Objective
COOP
Continuation of Operations
Define COOP
Focuses on delivering “something”, even if not optimal, while recovering critical systems to nominal
MTD
Maximum Tolerable Downtime
Define MTD
Amount of time we can be without a critical business function before business can no longer function from pain (pain of loss)
MTO
Maximum Tolerable Outage
Define MTO
The amount of time business can operate in recovery mode. May be limited by resources or constraint of inventory (example fuel in generators)
Steps of BIA
- Inventory and Define Assets (critical assets)
- Learn the business (understand what it does)
- Identify critical business functions
- Total list, critical and not of assets and their function
- Derive Plans - Create different plans for management to select from
Risk Management Constraints
Time and budget
Opposite of CIA Triad (DAD)
Disclosure, Alteration, Destruction
Protection Mechanisms
- Layering (defense in Depth)
- Abstractions
- Encryption
Security Control Categories
- Directive (administrative) -mandated requirements
- Deterrent - Reduces someone’s will to attack
- Preventative - Controls to prohibit activity
- Detective - Recognize hostile activity
- Corrective - Reacts to a situation to stop and restore 5. Recovery - restore operations to known good state
Define Risk Management
Process of identifying, examining, measuring, mitigating, or transferring (sharing) risk
Risk Terminology
Asset - Anything of value to a company
Vulnerability - a weakness; the absence of a safeguard
Threat - Things that could pose a risk to an asset
Threat agent - The entity which carries out attack
Exploit - An instance of compromise
Popular Security Frameworks
ISO 27001/27002 COBIT ITIL RMF CSA STAR
ISO 27001
ISO 27001 is known as the information security management system (ISMS) and is a comprehensive, holistic view of security governance within and organization, mostly focused on policy