Nonrepudiation
Users should be granted the minimum amount of access required to do their jobs no more.
Least privilege
Users must know a specific piece of info before accessing it.
Need to know
- Users and computer programs can be labeled this as well.
Subjects
Term used to describe data on a system
Objects
Multiple safeguards are put into place in order to protect an asset. Safeguards aka controls are measures taken to reduce risks
Defense in Depth
What are some auditing frameworks for the purpose of a security assessment?
SOC1 and SOC2
SOC1
Focuses on implemented security controls in relation to availability security, integrity privacy, and confidentiality
SOC2
A thirty-party is brought in to review the practices of the service provider and make a statement regarding their security posture
Attestation
Documents provided that give written approval to the security company to perform pen test or audit the organization network.
Right to penetration test/right to audit
Process of acquiring products or services from a third party
Procurement
Ensures that the business is continually getting sufficient quality from its third-party vendors
Vendor Governance
What are some steps taken before an acquisition of a company?
Due diligence of acquired company’s current cybersecurity program and assessment of current network security.
When one company is split into two or more companies
Divestitures
What are security concerns relating to divestitures?
The split companies inadvertently maintaining duplicate accounts and passwords
First canon of (ISC)^2 Code of Ethics
Second canon of (ISC)^2 Code of Ethics
Third canon of (ISC)^2 Code of Ethics
Fourth canon of (ISC)^2 Code of Ethics
A document defined by the RFC regarding the expected ethical behavior on the internet.
Internet Activities Board (IAB) Code of Ethics
According to the Internet Activities Board (IAB) what are some examples of unethical behavior?
Someone who purposely:
Seeks to gain unauthorized access to a resource
Disrupt the intended use of the internet
Wastes resources (people, capacity, computer) through such actions
Destroy the Integrity of computer-based information
Compromises to privacy of users
The collection of practices related to supporting, defining and directing the security efforts of an organization
Security Governance
- Mandatory document
Policies