Domain 4 Flashcards
(78 cards)
Security and privacy controls are the technical, administrative, and physical measures that an organization implements to protects its information systems and data from:
- unauthorized access
- use
- disclosure
- modification
- destruction.
Security and Privacy controls help organization ensure the…
Security and Privacy controls help organization ensure the: CIA Triad and Access Controls
- Confidentiality
- Integrity
- Availability
of their information systems and data and comply with applicable Laws, Regulations, and Standards|laws, regulations, and standards.
What are some examples of security and privacy controls?
Examples of security and privacy controls include.
- encryption
- authentication
- access control
- backup
- audit
- data minimization
- consent
- transparency.
What is Control Implementation and alignment?
Control implementation and alignment is the process of:
- selecting
- applying
- testing
- and monitoring
security and privacy controls that are appropriate for the organization’s:
- objectives,
- risk appetite
- and compliance obligations.
Why is Control implementation and alignment important?
Control implementation and alignment is important because it helps the organization to achieve its goals, reduce its exposure to threats and vulnerabilities, and demonstrate its adherence to relevant laws, regulations, and standards.
Control implementation and alignment enables the organization to communicate its security and privacy posture to its:
stakeholders
customers
partners
and to build trust and reputation.
What is the first step of the Control implementation process?
Identify and assess the organization’s security and privacy objectives, risks, and obligations.
This includes defining the:
- Scope
- boundaries
- and roles
of the information systems and assets, analyzing threats and vulnerabilities, and determining legal, regulatory, and contractual requirements.
What is the second step of the Control implementation process?
2. Select and implement the security and privacy controls that are suitable for the organization’s context, needs and capabilities.
This includes choosing the controls from recognized frameworks or standards, such as ISO/IEC 27001, NIST 800-53, GDPR and applying them in a consistent and effective manner.
What is the third step of the Control implementation process?
-
Test, monitor, and evaluate the performance and effectiveness of the security and privacy controls.
This includes measuring the indicators and outcomes of the controls, conducting audits and reviews, and reporting and documenting results.
What is the fourth step of the Control implementation process?
-
Review and update the security and privacy controls as needed.
This includes identifying and addressing any gaps, weaknesses, or changes in the organization’s environment, risk profile, or compliance status, and ensuring the continuous improvement of the controls.
What does ISO/IEC 27001 specify?
ISO/IEC 27001 specifies the requirements for:
- establishing
- implementing
- maintaining
- and improving an Information security management system (ISMS).
What does NIST SP 800-53 provide?
NIST SP 800-53 provides a catalog of security and privacy controls for federal information systems and organizations. The controls are organized into families, such as:
- access controls,
- audit
- and accountability
- or identification and authentication.
Organization can use these controls to protect their information systems from various threats and comply with different laws and regulations. NIST SP 800-53 is a comprehensive catalog of security and privacy controls for federal information systems and organizations, which helps them meet their legal and regulatory obligations.
Controls can be classfied into three main types. What are they?
Controls can be classified into three main types:
- management
- technical
- operational
What is a common control?
Additionally, a common control is a subset of these main control types. Each type of control has a different:
purpose
scope
level of responsibility
in maintaining a secure and compliant environment.
What are examples of management controls:
Examples of management controls include:
- The security and compliance policies that define the:
- goals
- objectives
- roles
- responsibilities
of the organization.
- The risk management process that identifies, assesses, prioritizes, and mitigates the risks to the organization’s information assets
- The security and compliance audits that evaluate the effectiveness and efficiency of the controls and identify any gaps or weaknesses
- The security and compliance training and awareness programs that educate the staff and stakeholders on:
- policies
- procedures
- standards
- guidelines of the organization
What are management controls?
Management controls are the administrative and organizational controls established by senior management to shape the security culture and governance structure within an organization and provide strategic direction, oversight, and accountability for security compliance.
For what are management controls essential?
Management controls are essential for establishing the security and compliance culture and governance of the organization. They provide high-level vision, direction, and support for the implementation and a maintenance of the other types of controls.
Through these controls, senior management can communicate the importance of information security and compliance, setting the tone for a culture that values and protects information assets.
What are technical controls?
Technical controls are the technological controls (e.g. hardware, software, etc.) implemented to protect the: (CIA TRIAD)
- [[Confidentiality]]
- [[Integrity]]
- [[Availability]]
of information assets. They provide the technical means and mechanisms for enforcing the security and compliance policies and standards of the organization.
Name examples of technical controls:
Examples of technical controls include:
- The encryption and decryption of data in transit and at rest
- The authentication and authorization of users and devices
- The firewall and antivirus software that prevent and detect unauthorized access and malicious attacks
- The backup and recovery systems that ensure the availability and resilience of data
For what are technical controls crucial?
Technical controls are crucial for delivering the security and compliance capabilities of information systems. They offer foundational:
- protection
- detection
- and response mechanisms
for information assets.
These controls facilitate the safeguarding of data and systems at a granular level, ensuring the confidentiality, integrity, and availability of organizational resources.
What are operational controls?
Operational controls are specific to a particular information system or domain within an organization. They provide customized security and compliance requirements and standards that are tailored to the unique characteristics and needs of the information asset.
They are directly involved in the operation and use of information systems and include procedures and measures that help maintain the secure functioning of these systems.
What are examples of operational controls?
Examples of operational controls include:
- The access control of the granting and revoking of permissions and privileges to the information asset.
- The data classification of the data labeling and handling of the information asset according to its sensitivity and criticality.
- The data retention and disposal of the storing and destroying of the information asset according to its life cycle and legal obligations.
- The data quality and integrity of the ensuring and verifying of the accuracy and completeness of the information asset.
What are operational controls essential for?
Operational controls are essential for providing the security and compliance specificity and effectiveness of the information asset. They provide fine-grained and tailored protection, detection, and response for information assets.
What are common controls?
Common controls are those shared by multiple information systems or domains within an organization. These controls may fall under the category of:
- management,
- technical
- or operational
control.
They are inherited from other systems or a third-party vendor controls that can be placed into implementation. They provide the baseline security and compliance requirements and standards that are applicable to all or most of the information assets.
What are examples of common controls?
Examples of common controls include:
- Enterprise-wide security policies, governance frameworks, and risk assessment methodologies
- Centralized authentication mechanisms and network security measures
- The physical security of the premises and facilities that house the information assets
- The network security of the infrastructure and devices that connect the information assets
- The configuration management of the hardware and software components of the information assets
- Incident management of the reporting and handling of security and compliance events and incidents.