GCGA Ch. 11 Implementing Policies to Mitigate Risks Flashcards

(63 cards)

1
Q

Change management programs

A

provide a formal process for approving and carrying out changes in a manner that is coordinated with all stakeholders and designed to minimize the risks associated with the change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Business process issues covered by change management programs

A

include an approval process, ownership, stakeholder analysis, impact analysis, testing, a backout plan, and the use of maintenance windows and standard operating procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Technical implications of change management plans

A

include updating security controls, identifying restricted activities, communicating downtime expectations, tracking dependencies, and avoiding disruptions by managing application and service restarts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Closing out change management processes

A

Change management processes should ensure that changes are not closed out until all documentation and diagrams are updated to reflect the impact of the change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Version control

A

a formal process used to track the current versions of software code and system/application configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Regulated data

A

data that is governed by external laws and regulations with which the organization must comply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Financial information

A

any data about monetary transactions related to an organization or an individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Intellectual property

A

information that is crucial to the way that an organization runs its business. Intellectual property may consist of data that is protected by copyright, trademark, and/or patent law. Trade secrets are a type of intellectual property that remains sensitive and valuable to an organization because it is kept secret from competitors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data classification systems

A

provide formal categories for identifying the sensitivity and criticality of data. Classification ensures that users understand the value of data, and the classifications help protect sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Public vs private data

A

Public data is available to anyone. It might be in brochures, press releases, or on websites. Private data is information about an individual that should remain private.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Confidential data

A

information that an organization intends to keep secret among a certain group of people. Restricted data is another term for regulated data that is governed by outside obligations. Confidential data may also be restricted data depending upon the circumstances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data retention policy

A

identifies how long data is retained, and sometimes specifies where it is stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data sanitization methods

A

ensure that data is removed or destroyed from devices before disposing of the devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Incident response policy

A

defines incident response procedures. Organizations review and update incidents periodically and after reviewing lessons learned after actual incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Communication plan

A

identifies who to inform when an incident occurs. It also outlines the roles and responsibilities of various personnel, including a communication expert that would communicate with the media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

First step in incident response

A

preparation. It includes creating and maintaining an incident response policy and includes prevention steps such as implementing security controls to prevent malware infections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Second step in incident response

A

analysis. After detecting a potential incident, personnel perform an analysis to confirm that a security incident is underway.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Third step in incident response

A

containment. Next, they attempt to contain or isolate the problem. Disconnecting a computer from a network will isolate it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Fourth step in incident response

A

eradication attempts to remove all malicious components left after an incident. Recovery restores a system to its original state. Depending on the scope of the incident, administrators might completely rebuild the system, including applying all updates and patches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Reviewing lessons learned

A

A review of lessons learned helps an organization prevent a reoccurrence of an incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Tabletop exercises vs simulations

A

Tabletop exercises are a type of scenario-based training where participants discuss and analyze a hypothetical incident in a non-threatening environment, whereas simulations involve recreating real-world incidents as closely as possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Chain of custody

A

When collecting documentation and evidence, it’s important to follow specific procedures to ensure that the evidence is admissible in a court of law. A chain of custody provides assurances that personnel controlled and handled evidence properly after collecting it. It may start with a tag attached to the physical item, followed by a chain of custody form that documents everyone who handled it and when they handled it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Legal hold

A

refers to a legal obligation to maintain different types of data as evidence. Electronic discovery, or eDiscovery, is the identification and collection of electronically stored information. A legal hold requires an organization to protect existing data as evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Event logs

A

often help investigators reconstruct the timeline of an event by looking at the timestamps of entries. However, investigators need to consider any time offsets based on the time zone used by the logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
TTP
Investigators provide a report on their findings. They typically include tactics, techniques, and procedures (TTPs) used by attackers and recommendations based on the results.
26
Order of volatility
order of volatility for data from most volatile to least volatile on a system is cache memory, regular RAM, a swap or paging file, and hard drive data.
27
Snapshots
can capture data from almost any location, and the snapshot can be used for forensic analysis.
28
Forensic artifacts
pieces of data that most users are unaware of, but digital forensic experts can extract and analyze the artifacts.
29
Hard drive imaging
creates a forensic copy and prevents the forensic capture and analysis from modifying the original evidence. A forensic image is a bit-by-bit copy of the data and does not modify the data during the capture.
30
Usage of hashes/checksums
Hashes or checksums are used to verify the integrity of captured data. They provide proof the capturing process did not modify data.
31
Security Orchestration, Automation, and Response (SOAR) platforms
use internal tools to respond to low-level security events automatically, reducing administrator workload.
32
SOAR playbook
provides a checklist of things to check for suspected incidents.
33
SOAR runbook
implements the playbook checklist using available tools within the organization.
34
Security governance
the set of responsibilities and processes established by an organization’s top-level management to direct, evaluate, and control the organization’s security efforts.
35
Boards (company)
often consist of executives and high-ranking individuals within the organization who make critical decisions about security policy and strategy. Committees are usually specialized groups focusing on specific aspects of security, such as risk management or compliance. Government entities might have a role if the organization operates in a heavily regulated industry or if it deals with sensitive data like protected health information or national security matters.
36
Centralized vs decentralized governance structures
centralized governance structures concentrate decision-making authority at the top of the organization. Decentralized structures allow different parts of the organization to make their own security decisions.
37
Setting up/managing security governance
In setting up and managing security governance, organizations need to take into account a range of external considerations. These may include regulatory requirements, legal obligations, industry standards, and the security environment at local, regional, national, and global levels.
38
Written security policies
administrative controls that identify an overall security plan for an organization and reduce overall risk. Procedures identify security controls used to enforce security policies. Common security policies include acceptable use policies (AUP), information security policies, business continuity and disaster recovery policies, incident response policies, software development lifecycle (SDLC) policies, and change management policies.
39
Security standards
outline technical and business requirements for security. Common security standards include password standards, access control standards, physical security standards, and encryption standards.
40
Security procedures
provide very specific step-by-step instructions for carrying out security-related tasks. Security guidelines offer advice on achieving security objectives. Common security procedures include change management procedures and employee onboarding/offboarding procedures.
41
Security guidelines
optional advice, while compliance with policies, procedures, and standards is mandatory. Data owners have primary responsibility for a specific type of data within the organization. The data owner is typically a senior executive responsible for the area with oversight of the data.
42
Data owners
typically have senior-level positions and can’t do the day-to-day work of data governance. For this reason, they typically delegate authority to data stewards on their teams who are responsible for carrying out the intent of the data owner’s requirements.
43
Data custodian
responsible for routine daily tasks such as backing up data, storage of the data, and implementation of business rules.
44
Data controller
the organization that is responsible for a dataset. A data processor handles information on behalf of a data controller.
45
Supply chain
includes all the elements required to produce and sell products and services. Organizations should regularly conduct a supply chain analysis that identifies all of the vendors that make up their supply chain and assesses any risks associated with those relationships.
46
Security controls used to assess and manage vendor relationships
include right-to-audit clauses, penetration testing, collecting evidence of internal audits, and conducting independent assessments.
47
Conducting due diligence
involves a thorough evaluation of potential vendors’ capabilities, credentials, reputation, and financial stability.
48
Conflict of interest
might arise if the vendor has business relationships that could influence their decision-making or compromise their ability to prioritize your organization’s needs.
49
SLA
A service level agreement (SLA) is an agreement between a company and a vendor that stipulates performance expectations, such as minimum uptime and maximum downtime levels.
50
MOUs
Memorandum of understandings (MOUs) expresses an understanding between two or more parties, indicating their intention to work together toward a common goal.
51
BPA
A business partners agreement (BPA) is a written agreement that details the relationship between business partners, including their obligations toward the partnership.
52
NDA
A non-disclosure agreement (NDA) is used between two entities to ensure that proprietary data is not disclosed to unauthorized entities.
53
MSA
Master Services Agreements (MSA) provide structure to the agreements for vendors that you will work with repeatedly. Then, when you have a new project for the vendor, you write a simple work order (WO) or a statement of work (SOW) that contains the details of that specific project and references the general terms in the MSA.
54
Compliance programs
ensure that an organization complies with all of its legal and contractual obligations.
55
Due diligence
refers to the actions taken to ensure the organization is aware of all legal requirements applicable to its operations. It involves understanding the risks, regulations, and standards relevant to the business and taking the necessary steps to align with them. Due care, meanwhile, is the continuous effort to ensure the organization adheres to these requirements and addresses any identified non-compliance in a timely manner.
56
Attestation
refers to the verification by individuals within the organization or third parties that the organization is compliant with the relevant rules and regulations.
57
Acknowledgement
the recognition and acceptance of these compliance standards by employees and other stakeholders.
58
The right to be forgotten
empowers individuals to request that their personal data be erased from a company’s records under specific circumstances.
59
Data inventory
a detailed list of where important data is kept, who can get to it, and why it’s used. Data retention policies say how long data should be kept and how to get rid of it safely when it’s not needed anymore.
60
User training
includes training personnel on security policies and reducing risks by training users on current technologies and threats.
61
CBT
Computer-based training (CBT) allows students to learn at their own pace.
62
Training programs
should help users recognize and properly respond to phishing attacks. Phishing simulations mimic the type of phishing campaigns used by attackers and allow an organization to safely check to see if employees will respond to phishing emails. Users should be trained to recognize anomalous behavior, such as risky, unexpected, or unintentional activity.
63
Security awareness training
should cover a variety of relevant issues, including the insider threat, password management, removable media and cables, social engineering, operational security, and remote/hybrid work environments.