Domain 1: Information Security Governance (24%) Flashcards
(97 cards)
Cybersecurity governance programs guide and direct ???.
Governance programs guide and direct organization wide cyber security efforts.
A Goveranance frameworks consist of?
Policies, Controls, standards, procedures, guidelines, and metrics
Organizations often adopt a set of security policies covering different areas of their security programs.
What are the different policies that are part of the security programs:
Organizations often adopt a set of security policies covering different areas of their security programs.
Common policies used in security programs include an
information security policy
acceptable use policy
data ownership policy
data retention policy
account management policy
password policy
Why should policy documents include exception processes?
Exception processes should outline the information required to receive an exception to security policy and the approval authority for each exception.
The process should also describe the requirements for compensating controls that mitigate risks associated with approved security policy exceptions.
What type of frameworks do security managers use?
- Like other types of models, organizations are expected to consider tailoring a standard framework to align with the organization and its business model, practices, and culture.
Governance frameworks involve activities to ensure that executives are in control of the organization and that they are adequately informed.
Control frameworks: involve IT, security, and privacy controls, the detailed statements describing desired outcomes that are examined for proper design and effectiveness.
Architecture Frameworks
Risk Management Frameworks
how does the vision of a business flow down in an organization from IT to Security strategy?
Organizational culture is the term that describes how people within an organization ???
Organizational culture is the term that describes how people within an organization
* treat one another
* how they get things done.
* Many organizations establish a set of values that defines the norms of professional behavior.
Terms such as respect, collaboration, and teamwork are often used in these values.
* Some organizations publish formal value statements and print them for display in lobbies, offices, and conference rooms.
Every organization also has a risk culture, which affects how the organization does what with risk?
Where does it come from?
Every organization also has a risk culture, which affects how the organization
* Deals with risk
* How it treats risk over time.
This culture is developed from several sources.
First, it can come from the organization’s leadership, based on their business and management philosophies, attitudes, education, and experience.
It can also come from the organization’s governance.
Remember that governance essentially comprises the rules and regulations imposed on the organization by either external entities (in the form of laws, for example) or internally by the organization itself. As discussed, risk tolerance and risk appetite support the culture. organizational risk culture.
What is the goal of the organization’s cybersecurity steering comittee?
Reading between the lines, the primary mission of a security steering committee is to identify and resolve conflicts and to maximize the effectiveness of the security program, as balanced among other business initiatives and priorities.
Governance is usually undertaken through a steering committee that consists of executives from throughout the organization. The steering committee is responsible for setting overall strategic direction and policy, ensuring that security strategy aligns with the organization’s IT and business strategy and objectives. The directives of the steering committee are carried out through projects and tasks that steer the security organization toward strategic objectives. The steering committee can monitor progress through metrics and a balanced scorecard.
Security governance is accomplished using the same means as IT governance: it begins with board-level involvement that sets the tone for risk appetite and is carried out through the chief information security officer,
Security governance is accomplished using the same means as IT governance: it begins with board-level involvement that sets the tone for risk appetite and is carried out through the chief information security officer, who develops security and privacy policies, as well as strategic security programs, including software assurance, change management, vendor management, configuration management, incident management, vulnerability management, security awareness training, and identity and access management.
For an information security program to be successful, it must ….
align with the business and its overall mission, goals and objectives, and strategy.
The security program must consider the organization’s notion of asset value, culture, risk tolerance/appetite, legal obligations, and market conditions.
A successful and aligned security program does not lead the organization but enables and supports it to carry out its mission and pursue its goals.
Security governance is used to establish roles and responsibilities for:
Where are the roles and responsibilities defined?
Security governance is used to establish roles and responsibilities for security-related activities throughout all layers of the organization, from the board of directors to individual staff.
Roles and responsibilities are defined in job descriptions, policy and process documents, and RACI charts.
The security steering committee is responsible for
The security steering committee is responsible for security strategic planning.
The security steering committee will develop and approve security policies and appoint managers to develop and maintain processes, procedures, and standards, all of which should align with one another and with the organization’s overall mission, strategy, goals, and objectives.
What does the CISO do?
The CISO develops business-aligned security strategies that support the organization’s overall mission and goals and is responsible for the organization’s overall security program, including policy development, risk management, and perhaps some operational activities such as vulnerability management, incident management, access management, and security awareness training. In some organizations, the topmost security executive has the title of chief security officer or chief information risk officer.
What does the Chief Privacy Officer do?
The chief privacy officer is responsible for the protection and proper use of sensitive personal information (often referred to as personally identifiable information). The CPO’s information protection responsibilities are sometimes shared with the CISO, who has overall information protection responsibilities. The chief compliance officer is responsible for a broad range of compliance tracking and reporting.
What is a strategy?
What is the purpose of a strategy?
While a specific strategy itself may be complex, the concept of a strategy is quite simple: it can be defined as the plan to achieve an objective.
The effort to build a strategy requires more than saying those six words. Again, however, the idea is not complicated. The concept is this:
Understand where you are now and where you want to be.
The strategy is the path you have outlined, communicated, and documented that the organization will follow to get from where you are (current state) to where you want to be (strategic objective).
What are the objectives of a stratgegy?
The security objectives are the desired future state of the organization’s security posture and level of risk.
There are, in addition, objectives of a strategy. These objectives are as follows:
*Business alignmentThe desired future state, and the strategy to get there, must be in alignment with the organization and its strategy and objectives.
*Risk appetite alignmentAn organization’s information security program implicitly drives an organization toward a specific level of risk, which may or may not align with the organization’s true level of risk appetite.
*Effective risk managementA security program must include a risk management policy, processes, and procedures. Without effective risk management, decisions are made blindly without regard to their consequences or level of risk.
*Value deliveryThe desired future state of a security program should include a focus on continual improvement and increasing efficiency. No organization has unlimited funds for security; instead, organizations need to reduce risk at the lowest reasonable cost.
*Resource optimizationSimilar to value delivery, strategic goals should efficiently utilize available resources. Among other things, this means having only the necessary staff and tools to meet strategic objectives.
*Performance measurementAlthough it is important for strategic objectives to be SMART (specific, measurable, achievable, relevant, and time-related), the ongoing security and security-related business operations should themselves be measurable, giving management an opportunity to drive continual improvement.
*Assurance process integrationOrganizations typically operate one or more separate assurance processes in silos that are not integrated. An effective strategy would work to break down these silos and consolidate assurance processes, reducing hidden risks.
What are the parts of strategy resources?
Before a strategy can be developed, it is first necessary to understand everything that is in place currently. A strategy describes how goals and objectives are to be met. Without knowing the starting place of a journey, it is not possible to chart a course to the journey’s destination. Before future security capabilities can be mapped out, it’s necessary to understand an organization’s current state and capabilities.
The differences can be seen as a gap that needs to be filled, whether that means employing tools, technologies, skills, policies, or practices.
Policy Development
The execution of a security strategy may result in additions or improvements in its security-related capabilities. These additions or improvements may require that one or more security policies be updated to reflect the new or improved capabilities.
It is a common practice to structure the organization’s security policy using one or more relevant standards or frameworks, though this is not generally required for most industries. Common standards and frameworks used in this way include:
- NIST SP 800-53
- NIST SP 800-171 and NIST SP 800-172
- ISO/IEC 27001 and ISO/IEC 27002
- COBIT (formerly, Control Objectives for Information and Related Technologies)
- HIPAA/HITECH (Health Insurance Portability and Accountability Act/Health Information Technology for Economic and Clinical Health)
- PCI DSS (Payment Card Industry Data Security Standard)
- CIS CSC (Center for Internet Security Critical Security Controls)
Difference between Governance framework and control frameworks
Information Governance Frameworks and Standards
It is not necessary for organizations to develop governance models from scratch: plenty of mature models are available to adapt to individual organization needs. Like other types of models, organizations are expected to consider tailoring a standard framework to align with the organization and its business model, practices, and culture.
Security professionals often confuse governance frameworks with control frameworks. While the two are related, they are distinct and different from each other. Governance frameworks involve activities to ensure that executives are in control of the organization and that they are adequately informed. Control frameworks involve IT, security, and privacy controls, the detailed statements describing desired outcomes that are examined for proper design and effectiveness.
Information security governance efforts should integrate with what other corporate governance programs to support both?
business goals
security strategy.
Why should organizations draw on existing governance frameworks, such as xx and xxx
COBIT and the ISO standards, to avoid redundant effort and to align with industry best practices.
What is the difference between policies, standards, procedures, and guidelines?
Policies are high-level statements of management intent for the information security program.
Standards describe the detailed implementation requirements for policies.
Procedures offer step-by-step instructions for carrying out security activities.
Compliance with policies, standards, and procedures is mandatory.
Guidelines offer optional advice that complements other elements of the policy framework.