Governance
Definitions
vulnerabilities
threats
risk
exposure
control
documentation
policies
issue specific
system specific
types
regulatory
advisory
informtive
standards
baselines
guidelines
procedures
performance metrics
balanced score cards
best practuces and industry standards
maturity model
Organisation
Layers of Reponsibility
Board of Directors
Executive Management
CEO, CFO
CIO
CPO
CSO
CISO
Security Steering Committee
Audit committee
data owner
data custodian
system owner
security administrator
security analyst
application owner
supervisor
change control analyst
data analyst
process owner
solution provider
user
product line manager
auditor
Personnel Security
separation of duties
rotation of duties
collusion
split knowledge
dual control
mandatory vacation
skill set
hiring practice
nondisclosure agreement
background checks
termination
awareness training
Risk Managment
Types of Risk
physical
human interaction
equipment malfunction
inside/outside attacks
misuse of data
loss of data
application error
IRM Policy
addressed items
IRM Team
Risk Assessment/Analysis
cost/benefit
project sizing
risk analysis team
asset value
identifying vulnerabilities and threats
loss potential
delayed loss
threat agents
methodologies
NIST SP800
FRAP
OCTAVE
ISO 27005
FMEA
fault tree analysis
CRAMM
Approach
quantitative
sle
ef
aro
ale
qualitative
risk matrix
delphi
DSS
pros and cons
handling
transfer
avoidance
acceptance
mitigation
Information Classification
data classification procedures
classification controls
access control
encryption
auditing/mirroring
separation of duties
periodic reviews
backup and recovery
change control
physical security
info flow channels
disposal actions
marking/labeling procedures
classification levels
sensitivity scheme
criteria
commercial
confidential
private
sensitive
public
military
top secret
secret
confidential
sensitive but unclassified
unclassified