Security Program Management and Oversight Flashcards
(47 cards)
Security Governance
Framework that ensures an org’s security strategies align with business obj’s and compliance requirments
Business Continuity Plan (BCP)
Strategy that outlines procedures for maintain business operations during and after a disruptive event
Disaster Recovery Plan (DRP)
Documented process for restoring IT systems and data after a disaster to resume normal business op’s
Compliance
Adhere to laws, regulations, standards, and policies relevant to an org’s operations
Acceptable Use Policy (AUP)
Guidelines that define acceptable and unacceptable behaviors when using organizational resources
Security Audit
Evaluation of an org’s security policies, procedures, and controls to ensure effectiveness and compliance
Change Management
Systematic appraoch to managing alterations in IT systems to minimize negative impact on services
Asset Management
Process of tracking and managing an org’s assets, including hardware, software, and data
Data Classification
Process of organizing data into categories based on sensitivity and criticality to ensure proper protection
Chief Information Security Officer (CISO)
Senior executive responsible for developing and implementing and information security program
Security Metrics
Quantitative measures used to assess the effectiveness of an org’s security controls
Policy Exception Management
Process of handling deviations from established security policies in a controlled and documented manner
Continuous Monitoring
Ongoing observation of an org’s security posture to detect and respond to threats in real time
Segregation of Duties (SoD)
The practice of dividing responsibilities among different individuals to reduce the risk of a fraud or error
Security Baseline
Minimum security standards and config’s that must be applied to systems within an org
Risk Appetite
Amount of risk an org is willing to accept in pursuit of it’s obj’s
Business Impact Analysis (BIA)
Process of determining the potential effects of an interruption of critical business ops’
Threat Modeling
Structured approach to identifying and prioritizing potential threats to a system
Security Control Assessment
Evaluation of security controls to determine their effectiveness in protecting information assets
Security Posture
Overall security status of an org’s software, hardware, network, and information
Risk Assessment
Identifying and evaluating risks to an org’s information assets
Security Governance Framework
Structured approach that defines the policies, procedures, and controls to manage and monitor an org’s security
Policy Development Lifecycle
Structured process an org follows to create, implement, and maintain policies
Quantitative Risk Assessment
Risk assessment method that assigns numerical values to risks based on potential impact and likelihood