Domain 1: Security and Risk Management Flashcards
(33 cards)
IAAAA
- Identification
- Authentication
- Authorization
- Accountability
- Auditing
The ISC2 Code of Professional Ethics
Cannons:
PAPA
-Protect society, the common good, necessary public trust and confidence, and the infrastructure
-Act honorably, honestly, justly, responsibly, and legally
-Provide diligent and commitment service to principals
-Advance and protect the profession
The ISC2 Code of Professional Ethics Preamble
The safety and welfare of society and the common good, duty to our principals, and to each other, requires that we adhere, and be seen to adhere, to the highest ethical standards of behavior.
Therefore, strict adherence to this Code of Ethics is a condition of certification.
CIA Triad
Confidentiality
Integrity
Availability
Confidentiality
Only authorized subjects should access and read information.
The opposite is disclosure, and the risk to manage is unauthorized disclosure.
Integrity
Ensuring that information is accurate and complete, only authorized subjects should access and change information.
The opposite is alteration, and the risk is to manage unauthorized alteration.
Availability
Information should be available to authorized users when it’s wanted/needed.
The opposite is destruction, and the risk is to manage unauthorized destruction.
Accountability
Actions of an entity may be traced uniquely to that entity.
NIST 800-33
Assurance
Security measures work as intended
NIST 800-33
Authenticity
The proper attribution of the person who created the information
(Parkerian Hexad)
Utility
The usefulness of the information
(Parkerian Hexad)
Possession of Control
The physical state where the information is maintained
(Parkerian Hexad)
M&A Risks
not knowing, “buying a breach”, introduction of new attack vectors, disgruntled employees, etc.
Security Governance
Set of responsibilities, policies, and procedures related to defining, managing, and overseeing security practices at an organization.
Applying security governance principles
• Aligning information security with the company’s business strategy, goals, mission, and objectives.
• Defining and managing organizational processes to involve information security (e.g., acquisitions, divestitures, and governance committees)
• Developing roles and responsibilities throughout the organization.
• Identifying one or more security control frameworks to align the organization with (the book says so anyway).
• Practice due diligence and due care always.
Security Control Frameworks
o ISO/IEC 27001
o NIST 800-53
o NIST Cybersecurity Framework (CSF)
o CIS Critical Security Controls v7.1
ISO/IEC 27001 - 14 Domains
• Information security policies
• Organization of information security
• Human resource security
• Asset management
• Access control
• Cryptography
• Physical and environmental security
• Operations security
• Communications security
• System acquisition, development, and maintenance
• Supplier relationships
• Information security incident management
• Information security aspects of business continuity management
• Compliance
NIST 800-53 18 Control Families
• Access control (AC)
• Awareness and training (AT)
• Audit and accountability (AU)
• Security assessment and authorization (CA)
• Configuration management (CM)
• Contingency planning (CP)
• Identification and authentication (IA)
• Incident response (IR)
• Maintenance (MA)
• Media protection (MP)
• Physical and environmental protection (PE)
• Planning (PL)
• Personnel security (PS)
• Risk assessment (RA)
• System and services acquisition (SA)
• System and communications protection (SC)
• System and information integrity (SI)
• Program management (PM)
NIST Cybersecurity Framework (CSF) – 5 Core Functions
- Identify (ID): Develop an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities.
- Protect (PR): Develop and implement appropriate safeguards to ensure delivery of critical services.
- Detect (DE): Develop and implement appropriate activities to identify the occurrence of a cybersecurity event.
- Respond (RS): Develop and implement appropriate activities to take action regarding a detected cybersecurity incident.
- Recover (RC): Develop and implement appropriate activities to maintain plans for resilience and restore any capabilities or services that were impaired due to a cybersecurity incident.
CIS Critical Security Controls v7.1 (20 Controls)
CIS Control 1: Inventory and Control of Hardware Assets
CIS Control 2: Inventory and Control of Software Assets
CIS Control 3: Continuous Vulnerability Management
CIS Control 4: Controlled Use of Administrative Privileges
CIS Control 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
CIS Control 6: Maintenance, Monitoring, and Analysis of Audit Logs
CIS Control 7: Email and Web Browser Protections
CIS Control 8: Malware Defenses
CIS Control 9: Limitation and Control of Network Ports, Protocols, and Services
CIS Control 10: Data Recovery Capabilities
CIS Control 11: Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches
CIS Control 12: Boundary Defense
CIS Control 13: Data Protection
CIS Control 14: Controlled Access Based on the Need to Know
CIS Control 15: Wireless Access Control
CIS Control 16: Account Monitoring and Control
CIS Control 17: Implement a Security Awareness and Training Program
CIS Control 18: Application Software Security
CIS Control 19: Incident Response and Management
CIS Control 20: Penetration Tests and Red Team Exercises
Due Care
Refers to the effort made by an ordinarily prudent or reasonable party to avoid harm to another, taking the circumstances into account.
Regarding information security, due care relates to the conduct that a reasonable person would exercise to maintain the confidentiality, integrity, and availability.
Due Diligence
Continually ensuring that behavior maintains due care.
In relation to information security, due diligence relates to the ongoing actions that an organization and its personnel conduct to ensure organizational assets are reasonably protected.
U.S. Computer Security Act of 1987
- Objective of improving the security and privacy of sensitive information stored on U.S. federal government computers.
- Establishes that the National Institute for Standards and Technology (NIST) is responsible for setting computer security standards for unclassified, nonmilitary government computer systems.
- Establishes that the National Security Agency (NSA) is responsible for setting security guidance for classified government and military systems and applications.
U.S. Federal Information Security Management Act (FISMA) of 2002
- Repeals the U.S. Computer Security Act of 1987
- Requires all government agencies and information service providers to risk-based security assessments that align with the NIST Risk Management Framework (RMF).