CGRC Week01 Flashcards

(37 cards)

1
Q

What does ‘GRC’ stand for?

A

Governance, Risk, Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who are involved in the team?

A
  1. Organization
  2. End User
  3. Physical access
  4. System
  5. Software
  6. Network
  7. Data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Challenges that business face

A

Value/Cost
Aligning IT with Business requirement
Security
Managing Complexity
Regulatory compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is GRC?

A

GRC is a set of processes and procedures to help organizations to achieve business objective, address uncertainty and act with integrity.

GRC also refers to a strategy for managing an organization’s overall governance, enterprise risk management and compliance with regulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the aim of GRC

A

To protect corporate assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Governance?

A

Set the rules: Aligning IT objective and operations with organizational/business objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does governance involved with businesses?

A

Refer to the strategies and policies implemented by an organization to ensure that the IT system align with the business goals

Structures, policies and practices are put in place to ensure that the controls are adequately communicated, carried out and enforced by engaging direction and support at the appropriate organizational level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Risk?

A

Ensuring the correct controls are in place and functioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does risk involved in business?

A

Involves identifying potentials threats to systems and taking measures to mitigate them

Act of making decisions about the loss that the company is willing to accept given a breach of security and building the appropriate mitigating risk strategies to reduce the risk to acceptable range defined by the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are under the risk management?

A

Risk: Potential loss/harm
Control: Safeguard
Type: Organization/Third Party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is compliance?

A

Adhering to the legal and regulatory standards applicable to the organization’s IT systems

Confirming with stated requirements

Set out internally(policies)

Through extrinsic requirement(Law/regulation/etc)

Ensure that the controls are being adhered to on ongoing basis/regularly to help to reduce the risk and increase the adherence to the governance intended by the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the steps to compliance?

A

Adapt
Audit
Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is audit?

A

Internal and external security audit -> Outcome of security certificate/reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is adapt?

A

Adaptation of compliance framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is monitor?

A

Continuous monitoring for process/system changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the 8 function of GRC

A
  1. Organize and oversee
  2. Access and align
  3. Prevent and promote
  4. Detect and discern
  5. Respond and resolve
  6. Monitor and measure
  7. Inform and integrate
  8. Context and culture
17
Q

GRC Tools used

A

Archer (Tools by RSA)
Practical Threat Analysis (PTA)
Open Risk & Compliance Framework and Tool (ORICO)
GPLI
STREAM

18
Q

How does GRC help the industry?

A

It helps identify, access and mitigate risk effectively and ensure compliance with regulations and industry standard that helps to promote accountability and transparency in cybersecurity practices

19
Q

What is the purpose of GRC?

A

It provides a structured framework for managing security efforts and aligns cybersecurity strategies with business objective

20
Q

What is IM8?

A

Instruction Manual(IM) 8
- It is a government policy that specifies IT security policies for IT security
- Requirement for government sector
- All agencies must comply

21
Q

What is the relationship between laws, regulations, standards, and security frameworks?

A

Laws and regulations state what must happen to protect information. Standards and security frameworks provide structured steps to plan, implement, test, and monitor those requirements

22
Q

What are some examples of sectors with different regulatory requirements?

A

Finance, credit card, healthcare, etc.

Government vs Private Sector
(Government must comply with IM8)

Regulated industries (Banks, medicine, power plant) have stricter regulations

23
Q

Laws & Regulations - Finance

A

Sarbanes-Oxley Act (SOX) of 2002 - US law that was created to protect investors from fraudulent accounting activities by corporations.

24
Q

Section 302

A

Purpose: To make company leaders accountable for truthful financial reporting and strong internal control systems.

25
Laws & Regulations - Healthcare
HIPAA (Health Insurance Portability and Accountability Act) It is a US law that ensures data privacy and security for medical information
26
What are the 2 stops for HIPAA
1. HIPAA Privacy Rule 2. HIPAA Security Rule
27
what does HIPAA Privacy rule do?
1. Limits the use and disclosure of sensitive PHI 2. Gives patients the right to access their medical records 3. Requires doctors to track and disclose how patient data is shared
28
What does HIPAA Security rule do?
Sets national standard to protect ePHI that is created, received, used or maintained. Requires appropriate administrative, physical, and technical safeguards to ensure confidentiality, integrity, and security of ePHI
29
Law & Regulations - Credit Card
Payment Card Industry Data Security Standard (PCI DSS) Created to prevent credit card fraud and protect cardholders from identity theft Requires all organizations that store, process, or transmit cardholder data to comply with PCI DSS Provides policies and procedures to secure credit, debit and cash card transactions
30
What are the Local Laws/ Regulations
1. Computer misuse and cybersecurity act (Ch 50A) 2. Banking Act (Ch 19) 3. Cybersecurity Act 2018 4. Personal Data Protection Act 2012
31
What does Computer misuse and cybersecurity Act do?
- Secures computer systems against unauthorized access or modification\ - Requires measures to ensure cybersecurity
32
What does Banking Act (ch 19) do?
To provide for the licensing and regulation of the business of banks and related financial institutions.
33
Examples for CII
banking, finance, energy, water
34
What does Cybersecurity Act 2018 do?
Provides legal framework for protecting critical information infrastructure (CII). Cybersecurity Code of Practice (CCOP) is issued under this Act and serves as a guideline for CII owners to follow. CII owners has to ensure cybersecurity resilience and proactively protect CII from cyberthreats.
35
What are the key requirements CCoP 2.0 addresses for CII?
1. Governance 2. Identification 3. Protection 4. Detection 5. Response and Recovery 6. Cyber Resiliency 7. Cybersecurity Training and Awareness 8. Operational Technology (OT) security
36
What does Personal Data Protection Act 2012 do?
Is a legal framework for personal data protection Compliance under IM8 is part of enforcement and audit requirements
37
How does all of this laws and regulation help with the current economy?
By using these frameworks and tools, it helps businesses manage risk, follow laws, and stay compliant using structured tools and controls