lesson 1-4 Flashcards
(137 cards)
Control objective
A control objective is a statement of desired result or purpose to be achieved by implementing a control or set of controls (What am I trying to achieve? Or what am I trying to accomplish?)
Ex: Control Objective: Protect Hosts from Malware Infiltration
AV software
Host firewall
Restricted email attachments
URL filtering
Sandboxing
vulnerability
a weakness
threat
potential danger
threat actor
an adversary with malicious intent
exploit
a threat actor is successful at taking advantage of a vulnerability
Proportionality
Control baselines should be proportionate to the criticality and sensitivity classifications of the asset being protected (Principle of Proportionality)
controls
Controls are tactics, mechanisms, or strategies that proactively minimize risk in one or more of the following ways:
* Reduce or eliminate a vulnerability
*Reduce or eliminate the likelihood that a *threat actor will be able to exploit a vulnerability.
Reduce or eliminate the impact of an exploit
Has to perform at least one to be considered a control. It can use more than one.
Defense-in-depth
(layered security) is the design and implementation of multiple overlapping layers of diverse controls
Controls should not be subject to a cascade (domino) effect and should maintain independence
The diversity of types of controls and associated vendors should be considered.
Cost Benefit analysis
the process of comparing the estimated costs and benefits to determine whether it makes sense to proceed from a business perspective.
*If the cost of the control is significantly lower than the losses without the control, the cost of the control is generally justified
*If the cost of the control is significantly higher than the losses without the control, the cost may not be justified
*When the cost and benefits are about the same, a return on investment (ROI) analysis is needed to determine whether the cost is justified.
Tailoring
customizing baseline recommendations to align with organizational requirements. (like buying a suit off the rack, its ok but you want it to fit better so you tailor it)
Scoping
elimination of unnecessary baseline recommendations that are not applicable.
Compensating
is substituting a recommended baseline control with a similar control
Supplementing
augmenting or adding to the baseline recommendations
Functionality-
is what a control does
Effectiveness
is how well a control works, effectiveness reflects the control’s consistent, complete, reliable, and timely operation.
Assurance
is a measure of confidence that the intended security controls are effective in their application.
Countermeasures
are controls implemented to address a specific threat.
Countermeasures are generally reactive.
Countermeasures may be more effective but less broadly efficient.
NIST Frameworks
Cybersecurity Framework (CSF)
Privacy Framework
Risk Management Framework
ISO 27014:2020
Information security, cybersecurity, and privacy protection
Technical (control category)
mechanisms are implemented using hardware, software, and/or firmware components. Can be native or supplemental. (Ex. firewalls, cryptography, authentication systems)
Managerial- (control category)
relate to risk management, governance, oversight, strategic alignment, and decision-making ( ex. Risk assessments, project management)
Operational (control category)
are aligned with a process that is primarily implemented and executed by people (ex. Change management, training, testing)
Physical (control category)
are designed to address physical interactions. Generally related to buildings and equipment. ( ex. Gates, locks, security guards)
Deterrent (control classification)
discourage a threat agent from acting