Módulo 11 - Security Governance Concepts Flashcards
(77 cards)
List:
Key roles in security governance
- Owner
- Controller
- Processor
- Custodian
List:
Governance guidelines
- Structure to support corporate objectives
- Leverage expertise
- Establish policies, processes, and standards
- Change management
- Use automation and orchestration tools
List:
Examples of global and regional privacy laws
- General Data Protection Regulation (GDPR)
- California Consumer Privacy Act (CCPA)
- Health Insurance Portability and Accountability Act (HIPAA)
- Federal Information Security Management Act (FISMA)
- Personal Information Protection and Electronic Documents Act (PIPEDA)
- Privacy Act 1988 (Australia)
List:
Sectors and corresponding cybersecurity laws - Healthcare
HIPAA, GDPR
List:
Sectors and corresponding cybersecurity laws - Financial Services
Gramm-Leach-Bliley Act, PCI DSS
List:
Sectors and corresponding cybersecurity laws - Telecommunications
Communications Assistance for Law Enforcement Act (CALEA)
List:
Sectors and corresponding cybersecurity laws - Energy
North American Electric Reliability Corporation (NERC)
List:
Sectors and corresponding cybersecurity laws - Education & Children:
FERPA, CIPA, COPPA
List:
Sectors and corresponding cybersecurity laws - Government
FISMA, CJIS, GSC
List:
Examples of cybersecurity frameworks and regulations
- GDPR
- CCPA
- NIST
- ISO 27K
- CMMC
Define:
Security governance
Manages:
- Cybersecurity risks
- Policies, standards, and guidelines
In order to prorect assets and align security with organizational objectives.
Define:
Centralized governance
A governance model where decision-making authority resides with a core group or department, promoting consistency and standardization across the organization.
Define:
Decentralized governance
A governance model that distributes decision-making authority to different groups or departments, allowing tailored security practices based on localized needs.
Define:
Hybrid governance
A governance structure combining centralized oversight with decentralized implementation, balancing standardization with flexibility.
Define:
Owner (security role)
A high-ranking employee responsible for classifying data, determining access levels, and ensuring security measures align with business objectives.
Define:
Controller (security role)
Defines the purposes and means of processing personal data, ensuring compliance
DPO
Define:
Processor (security role)
An entity, such as a cloud service provider, that processes personal data on behalf of the controller, ensuring secure handling and compliance.
Define:
Custodian (security role)
An entity, often the IT department, responsible for the safe custody, storage, and implementation of security controls for data.
Acronym:
GDPR
General Data Protection Regulation
Acronym:
CCPA
California Consumer Privacy Act
Acronym:
HIPAA
Health Insurance Portability and Accountability Act
Acronym:
FISMA
Federal Information Security Management Act
Acronym:
NIST
National Institute of Standards and Technology
Acronym:
CMMC
Cybersecurity Maturity Model Certification