GCGA Ch. 11 Implementing Policies to Mitigate Risks Flashcards
(63 cards)
Change management programs
provide a formal process for approving and carrying out changes in a manner that is coordinated with all stakeholders and designed to minimize the risks associated with the change.
Business process issues covered by change management programs
include an approval process, ownership, stakeholder analysis, impact analysis, testing, a backout plan, and the use of maintenance windows and standard operating procedures.
Technical implications of change management plans
include updating security controls, identifying restricted activities, communicating downtime expectations, tracking dependencies, and avoiding disruptions by managing application and service restarts.
Closing out change management processes
Change management processes should ensure that changes are not closed out until all documentation and diagrams are updated to reflect the impact of the change.
Version control
a formal process used to track the current versions of software code and system/application configurations.
Regulated data
data that is governed by external laws and regulations with which the organization must comply.
Financial information
any data about monetary transactions related to an organization or an individual.
Intellectual property
information that is crucial to the way that an organization runs its business. Intellectual property may consist of data that is protected by copyright, trademark, and/or patent law. Trade secrets are a type of intellectual property that remains sensitive and valuable to an organization because it is kept secret from competitors.
Data classification systems
provide formal categories for identifying the sensitivity and criticality of data. Classification ensures that users understand the value of data, and the classifications help protect sensitive data.
Public vs private data
Public data is available to anyone. It might be in brochures, press releases, or on websites. Private data is information about an individual that should remain private.
Confidential data
information that an organization intends to keep secret among a certain group of people. Restricted data is another term for regulated data that is governed by outside obligations. Confidential data may also be restricted data depending upon the circumstances.
Data retention policy
identifies how long data is retained, and sometimes specifies where it is stored.
Data sanitization methods
ensure that data is removed or destroyed from devices before disposing of the devices.
Incident response policy
defines incident response procedures. Organizations review and update incidents periodically and after reviewing lessons learned after actual incidents.
Communication plan
identifies who to inform when an incident occurs. It also outlines the roles and responsibilities of various personnel, including a communication expert that would communicate with the media.
First step in incident response
preparation. It includes creating and maintaining an incident response policy and includes prevention steps such as implementing security controls to prevent malware infections.
Second step in incident response
analysis. After detecting a potential incident, personnel perform an analysis to confirm that a security incident is underway.
Third step in incident response
containment. Next, they attempt to contain or isolate the problem. Disconnecting a computer from a network will isolate it.
Fourth step in incident response
eradication attempts to remove all malicious components left after an incident. Recovery restores a system to its original state. Depending on the scope of the incident, administrators might completely rebuild the system, including applying all updates and patches.
Reviewing lessons learned
A review of lessons learned helps an organization prevent a reoccurrence of an incident.
Tabletop exercises vs simulations
Tabletop exercises are a type of scenario-based training where participants discuss and analyze a hypothetical incident in a non-threatening environment, whereas simulations involve recreating real-world incidents as closely as possible.
Chain of custody
When collecting documentation and evidence, it’s important to follow specific procedures to ensure that the evidence is admissible in a court of law. A chain of custody provides assurances that personnel controlled and handled evidence properly after collecting it. It may start with a tag attached to the physical item, followed by a chain of custody form that documents everyone who handled it and when they handled it.
Legal hold
refers to a legal obligation to maintain different types of data as evidence. Electronic discovery, or eDiscovery, is the identification and collection of electronically stored information. A legal hold requires an organization to protect existing data as evidence.
Event logs
often help investigators reconstruct the timeline of an event by looking at the timestamps of entries. However, investigators need to consider any time offsets based on the time zone used by the logs.