Module 22 - Governance and Compliance Flashcards
(187 cards)
Which process determines who is authorized to make cybersecurity risk decisions and ensures alignment with business goals and compliance?
IT Security Governance
Which function ensures that risk decisions in cybersecurity are accountable and appropriately mitigated?
IT Security Governance
Which process involves defining and implementing controls to mitigate security risks, distinct from governance?
IT Security Management
Which type of governance specifically defines who can make decisions about data in an organization?
Data Governance
Which governance role is responsible for ensuring compliance, classifying data, and determining access criteria?
Data Owner
Who assigns the proper classification to information assets and defines who may access them?
The Data Owner
Which data governance role determines why and how personal data is processed?
Data Controller
Who has the authority to set the purpose and means of personal data processing within an organization?
The Data Controller
Which role processes personal data on behalf of the data controller, often a third party?
Data Processor
Who carries out the actual handling of personal data as instructed by the data controller?
The Data Processor
Which role is responsible for implementing data classification and technical controls, based on data owner rules?
Data Custodian
Who is responsible for applying the correct technical measures to protect data under the data owner’s policies?
The Data Custodian
Which role ensures that data supports both the business’s needs and regulatory compliance?
Data Steward
Who ensures data quality and utility across business and regulatory dimensions?
The Data Steward
Which role oversees the organization’s overall strategy for protecting personal data?
Data Protection Officer
Who is tasked with developing and monitoring a company’s data protection policies?
The Data Protection Officer
Which role in data governance is responsible for both compliance and ensuring data meets business requirements?
Data Steward
Who typically defines the security and classification rules that custodians implement?
The Data Owner
What role ensures that classification and security controls for data are correctly enforced?
Data Custodian
Which type of document outlines an organization’s cybersecurity vision, goals, scope, and responsibilities?
A Cybersecurity policy
Which document sets behavioral and security standards for protecting technology and information assets?
A Cybersecurity Policy
What does a cybersecurity policy provide to the security team from senior management?
Support and authority for implemeting controls
What does a cybersecurity policy define to handle rule-breaking ?
The legal consequences of policy violations
Which type of cybersecurity policy acts as a strategic plan and blueprint for implementing security controls?
A Master Cybersecurity policy