An agreement between a company and a vendor that stipulates performance expectations, such as minimum uptime and maximum downtime levels.
Service Level Agreement (SLA)
Expresses an understanding between two or more parties indicating their intention to work together toward a common goal
Memorandum of Understanding (MOU)
Evaluates the processes and tools used to make measurements. Uses various methods to identify variations within a measurement process that can result in invalid results.
Measurement System Analysis (MSA)
A written agreement that details the relationship between business partners, including their obligations toward the partnership.
Business partnership Agreement (BPA)
Refers to the date when a product will no longer be offered for sale
End of Life (EOL)
Indicates the date when you expect a lack of vendor support because vendors no longer create patches or upgrades to resolve vulnerabilities for the product.
End of Service Life (EOSL)
Used between two entities to ensure that proprietary data is not disclosed to unauthorized entities.
NDA
System of organizing data according to its sensitivity. Common classifications include public, confidential, secret, and top secret.
Data Classification
Refers to the processes an organization uses to manage, process, and protect data.
data governance
Identifies how long data is retained and sometimes specifies where it is stored
Data Retention Policy
Credential policies: personnel
Credential policies: Third-party
Credential policies: Devices
Credential policies: service accounts
Credential policies: Administrator/Root Accounts
Process of making sure changes are made smoothly and efficiently and do not negatively affect systems reliability, security, confidentiality, integrity, and availability.
Change Management
The procedures used to identify, document, approve, and control changes to the project baselines
Change Control
The process of tracking valuable assets throughout their life cycles
Asset management
Any risks from outside an organization. This includes and threats from external attackers It also includes and natural threats, such as hurricanes, earthquakes, and tornadoes. Sometimes predictable, often not.
Risk types: External
Any risks from within an organization. This includes employees and all the hardware and software used within the organization. These risks are generally predictable and can be mitigated with standard security controls.
Risk Types: Internal
occur when an organization contracts with an external organization for goods or services. If the third-party suffers an attack it may expose the contracting organization to additional threats.
Risk Types: Multiparty
Risk Management Strategies
When the cost of a control outweighs the risk, an organization will often accept the risk.
Acceptance
An organization can avoid a risk by not providing a service or not participating in a risky activity.
Avoidance