INDEX

A

acceptable risk as strategy constraint, 30

acceptance of risk, 268, 301–302

access administrators, 46

access control lists (ACLs) for remote access, 174

access controls

business process owner responsibilities, 38

concepts, 167

minimizing access, 96

processing centers, 148

threats, 168

types, 166–167

vulnerabilities, 168–169

access history for Internet, 124–125

accountability in RACI charts, 33

accuracy

for continuous improvement, 258

data, 100–101

data classification, 281

ACLs (access control lists) for remote access, 174

acquisitions

considerations, 151–152

integrating into organization processes, 152, 199

activity reviews for remote access controls, 175

actors, threat, 283, 292

administrative audits, 230

administrative safeguards

guidelines, 196

security policies, 193–195

standards, 195–196

advanced persistent threats (APTs), 287–288

advertising, tracking, 117, 119

advisories

actions from, 223–224

communicating, 28

risk management process, 267

aggregation of data, 103

ALE (annualized loss expectancy) in quantitative risk analysis, 297–298

analysis of risk

considerations, 295

controls, 304

costs and benefits, 304–305

incident response, 253

information gathering, 295–296

miscellaneous, 299

OCTAVE, 298–299

qualitative, 296

quantitative, 296–298

risk evaluation and ranking, 299–300

risk identification, 267

risk ownership, 300

risk treatment, 300–303

annualized loss expectancy (ALE) in quantitative risk analysis, 297–298

annualized rate of occurrence (ARO) in quantitative risk analysis, 297

anomaly phase in detection, 180

anonymization of data

auditing, 237

overview, 100

application vulnerabilities, 157, 169

approvals in change management, 183

APTs (advanced persistent threats), 287–288

architectures in privacy programs, 17

archiving

e-mail, 125

overview, 206

ARO (annualized rate of occurrence) in quantitative risk analysis, 297

assessment practice, 137–138

baselines, 138–140

controls, 84

data governance models, 7

assessment practice (cont.)

mergers, acquisitions, and divestitures, 151–152

physical assessments, 147–150

PIAs and DPIAs, 152–158

questions, 160–164

review, 159–160

risk identification, 266

third-party risk management, 140–147

assets and asset value (AV), 281

business alignment, 3

classifying, 280–281

identifying, 190–191, 278–280

managing, 190–193

privacy programs, 18

qualitative valuation, 282

quantitative valuation, 282–283, 297

risk identification process, 292

risk management process, 266

assurance process integration, 14

audiences

metrics for, 114, 116

security policies, 193–194

training, 50–52

audits

baselines, 140

controls, 84

CSA, 225, 228

data governance models, 10

description, 16

evidence, 232–234

integrating into organization processes, 201

objectives, 229

planning, 230–232

responsibilities, 224

risk identification, 267

Sarbanes–Oxley Act, 35

scope, 228

specific practices, 234–238

standards, 238

team positions, 46–47

third parties, 144

types, 229–230

authentication

multifactor, 173

remote access, 169–172

authorities, working with, 110–111, 249

authorization

input, 223

remote access, 171–172

automated profiling opt-out requests, 247

automation in data loss prevention, 88–92

AV. See assets and asset value (AV)

availability

managing, 189–190

minimizing, 97

avoidance of risk, 268, 302

awareness

baselines, 139

privacy programs, 28

programs for, 53

roadmap development, 27

B

baselines

process maturity, 138

program elements, 139–140

BCDR. See business continuity and disaster recovery (BCDR) planning

BEC (business e-mail compromise), 179

behavioral profiling. See tracking

benchmarking

costs, 209

responsibilities, 224

BIA (business impact analysis)

description, 19

overview, 294

big data architects, 43

binding corporate rules in GDPR, 69

biometrics, 123, 174

blended costs, 208

boards of directors

meetings, 28

overview, 35–36

book value in asset valuation, 282

Brazil, LGPD law in, 72

breach notifications

data governance model, 11

GDPR, 68

budgets as strategy constraint, 30

bulletins for communications, 53

business alignment, 3–4

business cases, 27–28

business continuity and disaster recovery (BCDR) planning

baselines, 140

incident response, 256

integrating into organization processes, 199

service continuity, 189

business development, integrating into organization processes, 202

business e-mail compromise (BEC), 179

business impact analysis (BIA)

description, 19

overview, 294

business processes

monitoring, 218

owners, 38–39

weaknesses, 289

business system owners, 38–39

C

CABs (change advisory boards), 184

California Consumer Privacy Act (CCPA)

consent, 110

event monitoring, 219

provisions, 70–71

removal requests, 248

right to be forgotten, 206

third parties, 142–143

California Privacy Rights Act (CPRA), 70–71

authorities, 110, 249

event monitoring, 219

cameras, 121

CAN-SPAM (Controlling the Assault of Non-Solicited Pornography and Marketing Act), 72

Capability Maturity Model Integration (CMMI), 22–24

capability maturity models, 22–24

capacity management, 188–189

CASBs (cloud access security brokers), 91

cashiers, training, 50

CCBs (change control boards), 184

CCPA. See California Consumer Privacy Act (CCPA)

CCSL (Chinese Cybersecurity Law), 71

Center for Internet Security Critical Security Controls (CIS CSC), 82

centralized log management, 220

CEOs (chief executive officers)

accountability, 35

fraud, 179

certifications

GDPR, 68

remote access controls, 175

change

ITSM, 182–184

PIAs, 155

resistance to, 29

change advisory boards (CABs), 184

change control boards (CCBs), 184

characteristics, database matches for, 101

charters, 15, 62

chief executive officers (CEOs)

accountability, 35

fraud, 179

chief information officers (CIOs) in incident response plans, 256

chief information risk officers (CIROs), 41, 43

chief information security officers (CISOs)

overview, 41–42

risk appetite, 4

chief privacy officers (CPOs), 40–41, 43

chief risk officers (CROs), 43

responsibilities, 41

risk appetite, 4

chief security officers (CSOs), 41, 43

Children’s Online Privacy Protection Act (COPPA), 72

Chinese Cybersecurity Law (CCSL), 71

CIOs (chief information officers) in incident response plans, 256

CIROs (chief information risk officers), 41, 43

CIS CSC (Center for Internet Security Critical Security Controls), 82

CISOs (chief information security officers)

overview, 41–42

risk appetite, 4

classification

assets, 280–281

data, 86–87, 281

third parties, 145

Clayton Antitrust Act, 73

clean desks in processing centers, 148

clipboards, 122

closure phase in incident response, 253

cloud access security brokers (CASBs), 91

cloud-based information assets, 279

cloud server storage control, 91

cloud service providers, 141–142

CM (configuration management), 185

CMDBs (configuration management databases), 185

CMMI (Capability Maturity Model Integration), 22–24

Code of Ethics, 249

comingling of data, 98

Common Vulnerability Scoring System (CVSS), 157, 178

communications, 48

audits, 231

awareness, 53

establishing, 28–29

risk, 268

techniques, 53

training, 49–53

compensating controls for remote access, 169

competency, 48

complaints, 109, 248

compliance

audits, 230

baselines, 139

fines and penalties, 305

integrating into organization processes, 201

legal and contract issues, 204

computer crime investigations, auditing, 237

confidential classification level, 86–87

configuration faults, 289

configuration management (CM), 185

configuration management databases (CMDBs), 185

configurations

business process owner responsibilities, 38

standards, 66

conflicts of interest in RACI charts, 34

consent

collecting, 110

data governance models, 9

consequences of internal policies, 64

consequential financial cost in asset valuation, 282

consulting in RACI charts, 33

contact tracing, 123–124

containment phase in incident response, 253

content filters in DLP, 91

continuous improvement, 258

continuous log reviews, 220

contracts, integrating into organization processes, 203–204

control self-assessment (CSA), 225–226

advantages and disadvantages, 226

description, 84

internal audits, 228

life cycle, 226–227

objectives, 227–228

risk identification, 267

Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM), 72

controls, 75

administrative safeguards, 194

CIS CSC, 82

data governance models, 6–7, 10

frameworks, 66, 77–84

HIPAA, 80

input, 223

ISO/IEC, 78, 81

mapping, 82

NIST, 79–82

objectives, 75–76

overview, 17

PCI DSS, 82

processing centers, 148

remote access, 175–176

risk treatment, 304

roadmap development, 26

standards, 66

technical. See technical security controls

working with, 83–84

controls analysts, 45

convergence metrics, 115

cookies

preventing, 126–127

tracking, 119

copiers, 150

COPPA (Children’s Online Privacy Protection Act), 72

corporate rules in GDPR, 69

corporate workers, training, 50

corrections, requests for, 109, 247

costs

analysis, 304–305

events, 297

strategy constraint, 30

technical controls, 208–209

countermeasures in PIAs, 158

CPOs (chief privacy officers), 40–41, 43

CPRA (California Privacy Rights Act), 70–71

authorities, 110, 249

event monitoring, 219

creation cost in asset valuation, 282

critical data and systems, 18

Critical Security Controls framework, 193

criticality

asset classification, 280

data classification, 281

CROs (chief risk officers), 43

responsibilities, 41

risk appetite, 4

cross-border data transfers in GDPR, 69

CSA. See control self-assessment (CSA)

CSOs (chief security officers), 41, 43

culture

business alignment, 3

data handling, 88

importance, 19

mergers, acquisitions, and divestitures, 151

privacy operations, 105

strategy constraint, 30

custodial responsibilities, 39

CVSS (Common Vulnerability Scoring System), 157, 178

Cyber-Risk Oversight, 36

cybersecurity

CCSL, 71

GDPR, 68

cybersecurity officers, 256

D

data

aggregation of, 103

analytic techniques, 103

archiving, 206

classification, 86–87, 281

destruction, 207

flow diagrams, 101–102

handling standards, 87–88

inventory, 84–85

masking, 96

minimization. See minimization, data

movement monitoring, 107–108

operations monitoring, 106–108

protection operations, 106

quality and accuracy, 100–101

retention laws, 205–207

tagging, 90

data collection, auditing, 235–236

data controllers in GDPR, 68

data discovery scanning, 106–107

data entry errors, 101

data entry operators, 45

data governance model, 5–6

drivers, 12–13

influences, 11

metrics, 114

overview, 7–10

personal data and information, 11–12

data loss prevention (DLP) systems

automation, 88–92

dynamic, 90–92

static, 89–90

tools, 221–222

data management

auditing, 235

baselines, 139

privacy programs, 18

risk likelihood, 293

team structure, 43–44

data privacy officers (DPOs), 43

GDPR, 40–41, 68

risk appetite, 4

data processors in GDPR, 68

data protection impact assessments (DPIAs)

GDPR, 68

PIAs. See privacy impact assessments (PIAs)

risk identification, 266

data scientists, 44

data sharing

controls, 207–208

international agreements, 73

data sources for assets, 191–193

data sprawl, 103

data subject engagement

metrics, 113

PIAs, 154

data subject requests (DSRs)

auditing, 236

privacy rights, 246–248

data subjects

access control types, 166–167

rights, 11, 67–68

working with, 108–109

data usage inquiries, 108, 246

data use governance, 93

data aggregation, 103

data analytics, 103

data flow and usage diagrams, 101–102

data quality and accuracy, 100–101

limitations, 93–94

minimization, 94–100

database administrators (DBAs), 44

database referential integrity, 98

DBAs (database administrators), 44

de-identification, 99–100

decision-making processes, opting out of, 247

decryption in SSL, 125

default system settings, 168

Delphi method, 299

deprovisioning remote access controls, 175

design

controls, 83

faults in, 289

incident response, 257–258

privacy by, 39–40, 196–197

release management, 186

desktop computers, 150

destruction

assessment, 149

data, 207

detection phase in incident response, 251–252

development step in release management, 186

devices

identifiers, 118

security assessment, 150

tracking, 120

dial-up for remote access, 169–170

disaster recovery planning, 189

discarding data, 96

disclosures

controls, 207–208

third party, 144

divestitures

considerations, 152

integrating into organization processes, 199

Do-Not-Call Implementation Act, 72

Do Not Track web browser setting, 126

DPIAs (data protection impact assessments)

GDPR, 68

PIAs. See privacy impact assessments (PIAs)

risk identification, 266

DPOs (data privacy officers), 43

GDPR, 40–41, 68

risk appetite, 4

drivers in data governance model, 12–13

DSRs (data subject requests)

auditing, 236

privacy rights, 246–248

due diligence by third parties, 144

dynamic DLP, 90–92

E

e-mail

archiving, 125

communicating by, 53

DLP, 90, 221

movement monitoring, 107

retention practices, 98

eavesdropping, tracking, 120–121

education, baselining, 139

EF (exposure factor) in quantitative risk analysis, 297

efficiency in continuous improvement, 258

emergency changes, 184

emergency services, integrating into organization processes, 204

emerging threats, 225, 288–289

employment data, 200

encryption for remote access, 169–170

end user behavior analytics (EUBA), 223

endpoint storage in movement monitoring, 107

environmental controls, 148

eradication phase in incident response, 253

ETA (event tree analysis), 299

ethics, 201

EUBA (end user behavior analytics), 223

evaluation, risk, 299–300

event tree analysis (ETA), 299

events

costs, 297

monitoring, 180

probability, 296

security-related, 219–224

evidence

gap analysis, 21

privacy audits, 232–234

retention, 254

third parties, 145–146

executive management

overview, 36–37

sponsorship, 2–3

exposure factor (EF) in quantitative risk analysis, 297

external audits for controls, 84

external monitoring, 225

external policies, 64–65

external reviews in incident response plans, 257

external threats, identifying, 286–287

F

facial recognition, 123

facilitators, risk appetite of, 4

Factor Analysis of Information Risk (FAIR), 277–278

fail closed access controls, 167

fail open access controls, 167

Fair Credit Reporting Act (FCRA), 73

FAIR (Factor Analysis of Information Risk), 277–278

Faraday bags, 127

fault tree analysis (FTA), 299

FCRA (Fair Credit Reporting Act), 73

feasibility studies, 186

Federal Trade Commission Act, 72

Federal Trade Commission (FTC), 72–73

feedback, responsibilities for, 224

fiduciary duties of boards of directors, 35

file server storage control in DLP, 90

filters in DLP, 91

financial management

integrating into organization processes, 204–205

ITSM, 188

financial system asset inventories, 191

fines for compliance, 305

firewalls for DLP, 91

forensics

audits, 230, 238

device, 150

FTA (fault tree analysis), 299

FTC (Federal Trade Commission), 72–73

functions, business process owner responsibilities for, 38

G

gap analysis, 21–22

gate processes in release management, 187

General Data Protection Regulation (GDPR)

authorities, 110, 249

consent, 110

data flow and usage diagrams, 102

data use limitations, 93–94

DPOs, 40–41

event monitoring, 219

legal basis for processing, 74

privacy by design, 39–40

provisions, 67–69

removal requests, 248

right to be forgotten, 206

third parties, 142–143

general staff responsibilities, 48

geography and assets, 192

GLBA (Gramm–Leach–Bliley Act), 72

goals, 3–4

governance meetings, 28

Gramm–Leach–Bliley Act (GLBA), 72

guidelines, 16

H

hardware assets, 278–279

hazards in processing centers, 148

HCM (human capital management) systems, 199

Health Information Technology for Economic and Clinical Health Act (HITECH), 70, 72

Health Insurance Portability and Accountability Act (HIPAA)

requirements, 80

rules, 69–70

third parties, 143

HITECH (Health Information Technology for Economic and Clinical Health Act), 70, 72

HRISs (human resources information systems), 199

human capital management (HCM) systems, 199

human resources, integrating into organization processes, 199–201

human resources information systems (HRISs), 199

hygiene in risk likelihood, 293

I

identification in remote access, 171

identifying

assets, 190–191, 278–280

devices, 118

privacy requirements, 104–105

risk, 266–267, 292

threats, 283–289

vulnerabilities, 156, 179, 289–291

identity and access management, 166

access controls, 166–169

remote access, 169–177

Identity Theft and Assumption Deterrence Act, 72

IDS/IPS (intrusion detection/prevention system), 91, 253

impact

BIAs, 19, 294

PIAs. See privacy impact assessments (PIAs)

risk analysis, 267

risk assessment, 294–295

risk identification, 292

incident commanders in incident response plans, 255–256

incident management

auditing, 237–238

ITIL, 182, 185

incident response, 250

baselines, 139

description, 180

evidence, 254

legal and contract issues, 204

phases, 250–254

plan development, 254–257

playbooks, 257

regulations, 250

reporting, 254

third parties, 144

incidents

communicating, 28

logs, 19

reviews, 38

risk identification, 267

inertia, organizational, 31

information assets, 279–280

information gathering, 295–296

information security

human resources, 200

integrating into organization processes, 198

practices, 165

information security management system (ISMS), 165–177

information systems audits, 229

Information Technology Assurance Framework, 238

information workers, training, 51

informed people in RACI charts, 34

initiation phase in incident response, 252

input controls, 223

inquiries

business process owner responsibilities, 38

data usage, 108

insider threats, 283–286

insurance

legal and contracts, 204

privacy programs, 18

third parties, 144

integrated audits, 229

integrating privacy into organization processes

audits, 201

BCDR planning, 199

business development, 202

compliance and ethics, 201

finance, 204–205

human resources, 199–201

information security, 198

IT development and operations, 198–199

legal and contracts, 203–204

MAD, 199

procurement and sourcing, 203

public relations, 203

security and emergency services, 204

integration

mergers, acquisitions, and divestitures, 152

PIAs, 155

integrity data classification, 281

intellectual property, 280

internal audits

controls, 84

CSA, 228

internal policies, 63–64

internal threats, identifying, 283–286

international data-sharing agreements, 73

Internet

access history, 124–125

movement monitoring, 107

intrusion detection/prevention system (IDS/IPS), 91, 253

inventory, data, 84–85

IP address tracking, 117–118

ISMS (information security management system), 165–177

ISO/IEC standards

27005, 274–277

27701, 78, 81

IT development and operations, integrating into organization processes, 198–199

IT general controls (ITGC), 76

IT Infrastructure Library (ITIL), 180, 182

IT service management (ITSM), 180–181

asset management, 190–193

availability management, 189–190

baselines, 140

capacity management, 188–189

change management, 182–184

configuration management, 185

financial management, 188

incident management, 182

problem management, 182

release management, 185–186

service continuity management, 189

service desks, 181

service-level management, 187–188

ITAF: A Professional Practices Framework for IS Audit, 238

ITGC (IT general controls), 76

ITIL (IT Infrastructure Library), 180, 182

ITSM. See IT service management (ITSM)

J

jurisdiction in data governance model, 11

K

key goal indicators (KGIs), 112

key performance indicators (KPIs), 112, 218

key risk indicators (KRIs), 112, 218

knowledge in privacy programs, 17

L

laptop computers, 150

law enforcement in privacy, 4

laws

CCPA, 70–71

CCSL, 71

external monitoring, 225

FTC, 72–73

GDPR, 67–69

HIPAA, 69–70

international data-sharing agreements, 73

LGPD, 72

PIPEDA, 70

privacy and security steering committees, 37

privacy program framework, 67–73

works councils, 73

leadership from executive management, 37

learn mode in DLP, 92

least privilege access controls, 167

legal agreements in third-party risk management, 143–144

legal basis

data governance models, 9

for processing, 74

legal counsels in incident response plans, 256

legal department, integrating into organization processes, 203–204

legal interpretation in privacy operations, 105

legal obligations

business alignment, 3

strategy constraint, 30

legitimate interest, establishing, 74–75

Lei Geral de Proteção de Dados (LGPD), 72

life cycle

CSA, 226–227

risk. See risk management life cycle

third parties, 143–145

likelihood, risk, 293

limitations, data use, 93–94

local file storage control in DLP, 90

location tracking, 120

logs

privacy programs, 19

security-related events, 220

M

MAD (mergers, acquisitions, and divestitures)

considerations, 151–152

integrating into organization processes, 199

management

commitment by, 29

data governance models, 10

mapping control frameworks, 82

market conditions, 4

marking data, 90, 221

masking data, 96

maturity

assessments, 16

privacy programs, 19

measurements

internal policies, 64

responsibilities, 224

media destruction, 149

media managers, 45

mergers, acquisitions, and divestitures (MAD)

considerations, 151–152

integrating into organization processes, 199

metadata tagging, 90

metrics

audiences, 116

baselines, 140

communicating, 28

convergence, 115

data governance, 10, 114

data subject engagement, 113

performance, 114–115

privacy programs, 111–112

program and process maturity, 114

resilience, 115

resource management, 115

responsibilities, 224

risk management, 113

SMART, 112

strategic, 17

third parties, 147

MFA (multifactor authentication), 173

microphones, 121

minimization, data, 94

access, 96

auditing, 236

availability, 97

de-identification, 99–100

discarding data, 96

required data items collection, 94–95

retention practices, 97–99

storage, 96–97

mission, 3

mitigation of risk, 147, 267–268, 302

mobile devices, 150

monetary value in data classification, 281

monitoring

business processes, 218

controls, 84

developing and running, 106–108

events, 180

external, 225

privacy programs, 217–224

remote access, 176–177

security-related events, 219–224

monitors for communications, 53

Monte Carlo analysis, 299

motivation in risk likelihood, 293

multifactor authentication (MFA), 173

N

names, database matches for, 101

National Association of Corporate Directors (NACD), 36

National Institute of Standards and Technology (NIST)

APTs, 288

Cybersecurity Framework, 80–81

metrics, 112

Privacy Framework, 79

RMF, 273–274

SP 800-30, 270–273

SP 800-39, 269–270

SP 800-53 and SP 800-53A, 81–82

SP 800-122, 79

negotiations in procurement and sourcing, 203

net present value (NPV) in asset valuation, 282

NetFlow, 91

network DLP, 91

network management, 44

new hires, training, 52

NIST. See National Institute of Standards and Technology (NIST)

notifications of breaches

data governance model, 11

GDPR, 68

NPV (net present value) in asset valuation, 282

O

objectives

auditing privacy programs, 229

business alignment, 4

controls, 75–76

CSA, 227–228

data governance models, 9

privacy program development, 2, 13–14

training, 49

OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation), 298–299

online content, 307–309

online tracking. See tracking

Open Web Application Security Project (OWASP), 51

operational audits, 229

Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE), 298–299

operations positions, 45

opportunities in SWOT analysis, 22

opt-out requests, 247

orchestration, 220–221

organizational inertia, 31

organizational structure as strategy constraint, 30

outsourced services, 19

OWASP (Open Web Application Security Project), 51

owners

responsibilities, 38–39

risk, 300

P

passwords

default, 168

remote access, 172–173

paste buffers, 122

patch management vulnerabilities, 179–180

PCI DSS framework, 82

penalties

compliance, 305

GDPR, 69

penetration tests, 179

performance metrics, 14, 114–115

permissions, incorrect, 169

personal data and information

business alignment, 3

classification, 281

data governance model, 11–12

Personal Information Protection and Electronic Documents Act (PIPEDA), 70

photos, 121

physical assessment, 147–150

PIAs. See privacy impact assessments (PIAs)

PIOs (public information officers) in incident response plans, 256

PIPEDA (Personal Information Protection and Electronic Documents Act), 70

planning phase in incident response, 251

plans and planning

BCDR. See business continuity and disaster recovery (BCDR) planning

incident response, 254–257

privacy program audits, 230–232

policies

administrative safeguards, 193–195

compliance baselines, 139

data governance models, 6, 9

developing, 63

executive management involvement, 37

external, 64–65

internal, 63–64

legal and contracts, 203

privacy operations, 105

policies (cont.)

privacy program audits, 234–235

roadmap development, 24–26

strategies, 16

politics in gap analysis, 21

post-incident phase in incident response, 253–254

posters for communications, 53

preventing tracking, 125–127

priorities

data governance models, 10

project, 37

privacy

audit responsibilities, 46

by design, 39–40

lexicon, 12

privacy impact assessments (PIAs), 152–153

case study, 158

conducting, 153–154

countermeasures, 158

data subject engagement, 154

integrating, 155

need for, 154

privacy threats, 157–158

PTAs, 153

recordkeeping and reporting, 155

risk identification, 266

vulnerabilities, 156–157

privacy mode browsing, 126

privacy operations

building, 104–105

team structure, 45–46

privacy program development, 1

approaches, 2

business alignment, 3–4

business cases, 27–28

capability maturity models, 22–24

communications, 28–29, 48–53

competency, 48

data governance model, 5–13

executive sponsorship, 2–3

gap analysis, 21–22

objectives, 2

questions, 56–60

reporting, 28–29

review, 53–56

risk objectives, 14

roadmap development, 24–27

strategy constraints, 29–30

strategy development, 20–29

strategy objectives, 13–14

strategy resources, 14–15

SWOT analysis, 22

team structure. See team structure

vision, 1–4

privacy program framework, 61

authorities, 110–111

charters, 62

consent, 110

controls, 75–84

data classification, 86–87

data handling, 87–88

data inventory, 84–85

data loss prevention, 88–92

data monitoring operations, 106–108

data protection operations, 106

data subjects, 108–109

data use governance, 93–103

laws, 67–73

legal basis for processing, 74

legitimate interest, 74–75

metrics, 111–116

online tracking and behavioral profiling, 116–127

policies, 63–65

privacy operations, 104–105

questions, 131–135

review, 128–131

standards, 65–66

privacy rule in HIPAA, 69

privacy steering committees, 37–38

privacy threshold analysis (PTA), 153

privileged account reviews, 176

probability of events, 296

problem management in ITSM, 182

processes

business alignment, 3

data governance models, 10

internal policies, 64

maturity, 114, 138

metrics, 114

monitoring, 218

owners, 38–39

privacy programs, 17

risk management life cycle, 266–268

roadmap development, 26

weaknesses, 289

processing centers, 148

procurement, integrating into organization processes, 203

profiling opt-out requests, 247

program charters, 15

program elements, baselines, 139–140

program managers, 48

programming language standards, 66

project managers, 48

proposals for change management, 183

protection practice, 165

access controls, 166–169

administrative safeguards, 193–196

costs, 208–209

data archiving, 206

data destruction, 207

data retention, 205–207

data sharing and disclosure, 207–208

design, 196–197

information security practices, 165

integrating privacy into organization processes, 198–209

questions, 211–215

remote access, 169–177

review, 210–211

technical security controls. See technical security controls

protocol standards, 66

provisioning

remote access, 175

user accounts, 172–173

pseudonymization

auditing, 237

overview, 99

PTA (privacy threshold analysis), 153

public classification level, 86–87

public information officers (PIOs) in incident response plans, 256

public relations, integrating into organization processes, 203

Q

qualitative asset valuation, 282

qualitative risk analysis, 296

quality, data, 100–101

quality assurance responsibilities, 47

quantitative asset valuation, 282–283

quantitative risk analysis, 296–298

questionnaires for third parties, 145–146

R

RACI (Responsible-Accountable-Consulted-Informed) charts, 33–34

ranks and ranking

privacy attitudes reflected by, 43

risk, 299–300

team roles, 32

reacquisition costs in asset valuation, 282

real-time event monitoring, 219

recommendations in risk analysis, 267

recordkeeping in PIAs, 155

recovery phase in incident response, 253

redeployment costs in asset valuation, 282

reduced sign-on, 174

referential integrity in databases, 98

registered classification level, 86–87

regulations

assets, 193

baselines, 139

external monitoring, 225

gap analysis, 22

incident response, 250

internal policies, 64

legal and contracts department, 204

mergers, acquisitions, and divestitures, 151

privacy and security steering committees, 37

privacy operations, 105

risk identification, 267

as strategy constraint, 30

third parties, 142–143

release management, 185–186

remediation of vulnerabilities, 178

remediation phase in incident response, 253

remote access

access control lists, 174

authentication, 171

authorization, 171–172

remote access (cont.)

biometrics, 174

control processes, 175–176

identification, 171

monitoring, 176–177

multifactor authentication, 173

overview, 169–170

reduced sign-on, 174

single sign-on, 174

user IDs and passwords, 172–173

removal, requests for, 109, 248

replacement costs in asset valuation, 282

reporting

audits, 232, 234

baselines, 140

data governance models, 7, 10

incident response, 254

PIAs, 155

privacy programs, 28–29

responsibilities, 224

third parties, 147

requests

for corrections, 109

for removal, 109, 248

request for information (RFI), 143, 203

request for proposal (RFP), 143, 203

required data items, collecting, 94–95

required records, collecting, 95

requirements

identifying, 104–105

procurement and sourcing, 203

regulations, 142–143

release management, 186

residual risk, 303

resilience metrics, 115

resistance to change, 29

resource management metrics, 116

resources

incident response plans, 255

optimization, 14

respond practice, 245

continuous improvement, 258

data subject requests, 246–248

incident response, 250–258

overview, 245–246

questions, 260–264

review, 258–260

response and exception procedures in DLP, 92

responsibilities

access controls, 38

data governance models, 6

executive management, 37

incident response plans, 255–256

internal policies, 63–64

roadmap development, 26

security-related events, 224

team roles. See team structure

Responsible-Accountable-Consulted-Informed (RACI) charts, 33–34

restricted classification level, 86–87

retail workers, training, 50

retention practices

evidence, 254

minimization through, 97–99

reviews

change management, 183–184

data governance models, 10

incidents, 38

logs, 220

remote access, 175–176

RFI (request for information), 143, 203

RFP (request for proposal), 143, 203

right to be forgotten, 206, 248

rights in GDPR, 67–68

risk

analysis. See analysis of risk

continuous improvement, 258

control frameworks, 83

PIAs, 155–157

privacy and security steering committees, 37

strategy constraints, 30

risk appetite

business alignment, 4

privacy programs, 20

risk management process, 266

risk capacity, 4

risk identification

risk management life cycle, 292

risk management process, 266–267

risk ledgers, 18

risk management

metrics, 113

privacy programs, 13

Risk Management Framework (RMF), 273–274

risk management life cycle

analysis, 295–305

asset classification, 280–281

asset identification, 278–280

asset valuation, 281–283

data classification, 281

FAIR, 277–278

ISO/IEC standards, 274–277

methodologies, 269–278

NIST standards, 269–274

overview, 265–266

process, 266–268

risk identification, 292

risk impact, 294–295

risk likelihood, 293

threat identification, 283–289

vulnerability identification, 289–291

risk mitigation, 147, 267–268, 302

risk registers, 268

risk tolerance, 3

risk treatment

overview, 300–303

privacy programs, 18

risk analysis, 268

RMF (Risk Management Framework), 273–274

roadmap development, 24–27

roles

data governance models, 6

incident response plans, 255–256

internal policies, 63–64

roadmap development, 26

team structure, 31–33

S

sampling audit evidence, 233–234

SAQ (Self-Assessment Questionnaire), 226

Sarbanes–Oxley Act audit requirements, 35, 225

scanners, 150

scanning

data discovery, 106–107

data loss prevention, 221

vulnerabilities, 177–179

schedules, training, 52–53

scope

auditing, 228

gap analysis, 21

risk management process, 266

scribes in incident response plans, 256

Secure Sockets Layer (SSL), 125

security advisories

privacy programs, 28

security-related events, 223–224

security and privacy, 10

security information and event management (SIEM), 220–222

security-related events

data loss prevention, 221

input controls, 223

log reviews, 220

monitoring, 219–224

orchestration, 220–221

responsibilities, 224

security advisories, 223–224

SIEM, 220

threat hunting, 222–223

threat intelligence, 222

UBA, 223

security rule in HIPAA, 69

security steering committees, 37–38

segregation of duties (SOD)

access controls, 167

matrix reviews, 176

RACI charts, 34

Self-Assessment Questionnaire (SAQ), 226

semiqualitative risk analysis, 296

sensitive employment data, 200

sensitive information classification, 281

service access controls, 166–167

service account reviews, 176

service continuity management, 189

service desks

IT, 181

team positions, 47

service-level ITSM management, 187–188

service provider audits, 230

session integrity, tracking, 118

severity of vulnerabilities, 156–157

sharing data, 207–208

SIEM (security information and event management), 220–222

single loss expectancy (SLE) in quantitative risk analysis, 297

single sign-on (SSO), 174

skills

privacy programs, 17

RACI charts, 34

risk likelihood, 293

SLE (single loss expectancy) in quantitative risk analysis, 297

SMART metrics, 112

social engineering

assessing, 179

attack success through, 168

social media accounts, 121

societal norms, 225

SOD (segregation of duties)

access controls, 167

matrix reviews, 176

RACI charts, 34

software assets, 279

software developers

team structure, 42

training, 51

sourcing, integrating into organization processes, 203

split custody access controls, 167

SSE-CMM (Systems Security Engineering Capability Maturity Model), 23

SSL (Secure Sockets Layer), 125

SSO (single sign-on), 174

staff

compensation costs, 209

competency baselines, 140

strategy constraints, 30

standards

administrative safeguards, 195–196

audit, 238

data governance models, 6, 10

data handling, 87–88

NIST, 269–274

policies, 65–66

privacy program development, 16

roadmap development, 26

statements of work for audits, 231

static DLP, 89–90

statistics, tracking, 118

status updates phase in incident response, 252–253

steering committees

meetings, 28

responsibilities, 37–38

storage

assessing, 149

DLP, 90–91, 221

minimizing, 96–97

PIAs, 157

storage engineers, 45

strategies

business alignment, 3

capacity management, 189

constraints, 29–30

data governance models, 9

development, 20–29

objectives, 13–14

resources, 14–15

strengths, weaknesses, opportunities, and threats (SWOT) analysis, 22

subjects. See data subjects

subsystem assets, 279

supervisory authority in GDPR, 69

surveillance in processing centers, 148

sustain practice, 217

auditing, 228–238

CSA, 225–228

external monitoring, 225

privacy program monitoring, 217–224

questions, 240–243

review, 238–239

SWOT (strengths, weaknesses, opportunities, and threats) analysis, 22

systems analysts, 42

systems architects, 42

systems management, 44–45

systems operators, 45

Systems Security Engineering Capability Maturity Model (SSE-CMM), 23

T

tabletop tests in incident response plans, 257

tagging data, 90, 221

TCO (total cost of ownership), 304–305

team structure, 31

boards of directors, 35–36

business process owners, 38–39

CISOs, 41–42

CPOs, 40–41

custodial responsibilities, 39

data management, 43–44

executive management, 36–37

general staff, 48

network management, 44

operations, 45

privacy and security steering committees, 37–38

privacy audits, 46

privacy operations, 45–46

quality assurance, 47

RACI charts, 33–34

roles, 31–33

security audits, 47

security operations, 46

service desks, 47

software development, 42

systems management, 44–45

technical security controls, 177

costs, 208–209

event monitoring and anomaly detection, 180

incident response, 180

IT service management. See IT service management (ITSM)

vulnerabilities, 177–180

technical support analysts, 47

technical workers, training, 51

telecom engineers, 44

temporary workers

records, 201

reviews, 176

testing

incident response plans, 257

release management, 186

third parties

consent through, 110

privacy program audits, 234

retention practices, 98

training, 52

vulnerability identification, 290–291

third-party risk management (TPRM), 140–141

assessment factors, 146–147

classifying, 145

cloud service providers, 141–142

life cycle, 143–145

managers, 47

metrics and reporting, 147

questionnaires, 145–146

regulation requirements, 142–143

risk mitigation, 147

threat identification

APTs, 287–288

emerging threats, 288–289

external threats, 286–287

internal threats, 283–286

overview, 283

threat intelligence in SIEM, 222

threats

access controls, 168

assessments, 15

hunting, 222–223

PIAs, 157–158

risk identification, 267

SWOT analysis, 22

timelines as strategy constraint, 30

timeliness in continuous improvement, 258

titles for team roles, 32

Tor browsers, 126

total cost of ownership (TCO), 304–305

TPRM. See third-party risk management (TPRM)

tracking, 116–117

advertising, 117, 119

cookies, 119

IP addresses, 117–118

preventing, 126–127

techniques and technologies, 117–124

workplace, 124–125

training

audiences, 50–52

content, 49–50

objectives, 49

training (cont.)

roadmap development, 27

schedules, 52–53

transfer of risk, 268, 303

transfer requests, 247–248

treatment, risk

overview, 300–303

privacy programs, 18

risk analysis, 268

U

UAT (user acceptance testing), 186

UBA (user behavior analytics), 223

unit testing, 186

unpatched systems, 168, 290

unstructured data, retention practices for, 98

update requests, 247

usage diagrams, 101–102

usage statistics, tracking, 118

USB storage

DLP, 90

movement monitoring, 107

user acceptance testing (UAT), 186

user accounts, provisioning, 172–173

user behavior analytics (UBA), 223

user IDs in remote access, 172–173

V

valuation of assets, 281–283

value delivery, 13

vCISOs (virtual CISOs), 42–43

velocity in risk likelihood, 293

vendors

managers, 48

standards, 66

verification in change management, 183–184

vice presidents, 43

video monitors for communications, 53

virtual assets, 279

virtual CISOs (vCISOs), 42–43

virtual private networks (VPNs)

overview, 127

remote access, 169–170

visibility in risk likelihood, 293

vision in privacy, 1–4

visitors, tracking, 118

voice assistants, 121

VPNs (virtual private networks)

overview, 127

remote access, 169–170

vulnerabilities

access controls, 168–169

assessing, 15

defined, 283

identifying, 156, 179, 289–291

managing, 177–178

patch management, 179–180

PIAs, 156–157

risk identification, 267, 292

severity, 156–157

third parties, 290–291

W

watermarking, 90

weaknesses

known and undiscovered, 290

SWOT analysis, 22

web, tracking, 118–119

web beacons, tracking, 120

web content filters for DLP, 91

web sites for communications, 53

wire transfer fraud, 179

work centers assessment, 148

workplace, tracking in, 124–125

works councils, 73

wrap-up for audits, 232

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.135.190.101