What terms describes the agreed upon metrics and quantifiable measures used to determine the effectiveness of security processes and overall security posture?
What are some common inhibitors to vulnerability remediation that must be considered and communicated to stakeholders?
In cloud computing, who is responsible for the physical security of equipment in a data center?
The cloud provider or data center management
This responsibility varies depending on whether the entire data center is used or just a small section.
What is the first part of physical security?
Limiting physical access
This applies even to small home offices and personal devices.
Cloud computing is a form of outsourcing that involves what key concept?
Risk transfer
You transfer some of the risk of the underlying infrastructure to the cloud service provider.
As cloud customers, do we have access to the cloud provider hardware?
No
The hardware is located in a data center and is managed by the cloud provider.
What do cloud providers publish to assure customers of their compliance with security standards?
Security audit results
These results come from a variety of different third-party sources.
Personally Identifiable Information is also known as what abbreviation?
PII
PII consists of one or more pieces of information that can be used to uniquely identify an individual.
What are the key aspects of data privacy related to PII?
These activities are often outlined in privacy impact statements or consent documents.
Give an example of personally identifiable information.
The classification of these items as PII can depend on specific context and usage.
True or false: An IP address is always considered PII.
FALSE
An IP address can be considered PII depending on specific configuration settings and context.
What does Sensitive Personal Information (SPI) refer to?
SPI is safeguarded due to its potential use in discrimination against individuals | SPI is sometimes abbreviated as SI
What does Data Loss Prevention (DLP) aim to prevent?
The disclosure of confidential information to unauthorized parties
DLP is also known as data leakage prevention.
True or false: DLP only addresses intentional data breaches.
FALSE
DLP also addresses accidental disclosures, such as those caused by malware or compromised computers.
What are the two types of breaches that DLP seeks to prevent?
Both types can lead to the unauthorized disclosure of sensitive data.
What do DLP policies control?
What is generally needed for DLP policies to be applied?
Some kind of a software agent; a client endpoint agent on client devices
The specific requirements may depend on the solution being used.
True or false: An agent is not necessary to monitor sensitive documents in DLP policies.
FALSE
An agent is essential for real-time monitoring and protection of sensitive data.
What types of actions can DLP policies help prevent?
These actions are critical to maintaining data security.
What is one example of removable media restrictions in a DLP policy?
These restrictions help control data transfer and prevent data leaks.
What can DLP policies prevent regarding sensitive data?
These measures help ensure sensitive information is not improperly shared or exposed.
True or false: DLP policies can allow sensitive file attachments if a user signs in with a smart card.
TRUE
This adds an additional layer of security for accessing sensitive data.
What type of content can DLP policies limit if social media access is allowed?
DLP policies can limit social media content
This helps manage the risk of data exposure through social media platforms.
Which data security standard applies to cardholder data?
PCI DSS