CHAPTER SUMMARY

This chapter examined various IT security policy frameworks. The frameworks share many of the same concepts and goals of controlling risk; however, their approach and scope of coverage differ. The chapter discussed how these differences are not always in conflict, but rather create an opportunity to adopt strengths of multiple frameworks such as COBIT and ISO. The chapter walked through methods to identify which best practice is appropriate for an organization. The implementation approach to each framework will vary by the type of framework and the organization’s culture.

The chapter examined separation of duties from a roles and organizational view. The organizational view was used to create three lines of defense to enhance the risk management program. Finally, the importance of the frameworks was highlighted in case studies. These case studies illustrated how implementing a policies framework to control risk prevents breaches and ensures compliance. The case studies also showed how contractors and insiders can be as much of a threat as external hackers.

KEY CONCEPTS AND TERMS

CHAPTER 8 ASSESSMENT

  1. The security committee is the key committee for the CISO.
    1. True
    2. False
  2. Which of the following is not an IT security policy framework?
    1. COBIT
    2. ISO
    3. ERM
    4. OCTAVE
  3. Which of the following are PCI DSS network requirements?
    1. Network segregation
    2. Penetration testing
    3. Virus scanning
    4. All of the above
    5. A and B only
  4. Which of the following are common IT framework characteristics?
    1. Risk-based management
    2. Aligned business risk appetite
    3. Reduced operation disruption and losses
    4. Established path from requirements to control
    5. All of the above
    6. A and C only
  5. Which of the following applies to both GRC and ERM?
    1. Defines an approach to reduce risk
    2. Applies a rigid framework to eliminate redundant controls, policies, and efforts
    3. Passively enforces security policy
    4. Seeks line of sight into root causes of risks
  6. The underlying concept of SOD is that individuals execute high-risk transactions as they receive preapproval.
    1. True
    2. False
  7. A risk management and metrics team is generally the first team to respond to an incident.
    1. True
    2. False
  8. Once you decide not to eliminate a risk but to accept it, you can ignore the risk.
    1. True
    2. False
  9. Which of the following is not a key area of improvement noted after COBIT implementation?
    1. Value delivery
    2. Decentralization of the risk function
    3. Better resourcing of IT
    4. Better communication
  10. A security team’s organizational structure defines the team’s ________.
  11. Implementing a governance framework can allow an organization to systemically identify and prioritize risks.
    1. True
    2. False
  12. The more layers of approval required for SOD, the more ________ it is to implement the process.
  13. Asking to borrow someone’s keycard is an example of ________.
  14. All organizations should have a full-time team dedicated to collecting, reviewing, and reporting to demonstrate adherence to regulations.
    1. True
    2. False

ENDNOTES

1. Office of the Comptroller of the Currency, “Supervisory Guidance on Operational Risk Advanced Measurement Approaches for Regulatory Capital,” July 2, 2003, http://www.occ.treas.gov/ftp/release/2003-53c.pdf, accessed April 30, 2010.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.142.164.120