Bash, the Crucial Exams Chat Bot
AI Bot

Documentation and Reporting (ISC2 CGRC)  Flashcards

ISC2 Governance, Risk and Compliance (CGRC) Flashcards

FrontBack
Content of vulnerability assessment reportIdentified weaknesses, risk levels, affected systems, and mitigation steps
Contents of a secure software development life-cycle reportCode review findings, vulnerability tests, and compliance checks
Define authority to operate (ATO) documentationApproval that allows a system to operate within set security parameters
Define gap analysis reportIdentifies differences between current system capabilities and compliance requirements
Define policy exception documentationDetails cases where specific standards are not met and the rationale behind them
Define risk registerA documented database of identified risks, their severity, and mitigation strategies
Documentation requirements for third-party service providersIncludes SLAs, contract terms, and compliance certifications
Elements of a security incident reportDetails of the incident, actions taken, impact, and follow-up recommendations
How to document data retention policiesOutlines rules for data storage durations and secure disposal methods
How to document incident response team activitiesTracks actions taken, resources used, and timeline of responses
Importance of change management documentationEnsures accountability and review for modifications to systems and processes
Importance of documenting security benchmarksProvides reference standards for evaluating system performance and compliance
Importance of maintaining regulatory requirement updatesEnsures documentation stays aligned with current standards
Key components of an audit logUser actions, system events, timestamps, and data changes
Key elements of a security risk management planIdentified risks, mitigation strategies, monitoring processes, and assigned roles
Primary audience for system documentationInternal teams, auditors, and regulatory authorities
Purpose of access control audit reportVerifies compliance with access permissions and identifies any unauthorized access
Purpose of business impact analysis documentationEvaluates potential disruption effects on organizational operations
Purpose of compliance reportingTracks performance against regulatory and organizational requirements
Purpose of configuration management planDefines procedures for maintaining consistency in system settings and operations
Purpose of encryption key management documentationSpecifies procedures for securing, rotating, and retiring encryption keys
Purpose of privacy impact assessment documentationEvaluates potential effects of system operations on individual privacy
Purpose of system security planDescribes system security controls and compliance with regulatory requirements
Reporting frequency for operational metricsVaries by organizational policy and regulatory requirements
Responsibilities of system owners in reportingEnsure accurate documentation and timely communication of system status
Role of communication plan in governanceEnsures stakeholders receive timely and relevant information
Role of escalation procedures in reportingEnsures critical issues are promptly communicated to higher management
Role of governance framework in reportingProvides structure for consistent communication about risk and compliance
Role of performance indicators in compliance reportingTracks goals, achievements, and areas needing improvement
Role of service level agreements in documentationEstablishes performance expectations and accountability for services
Steps for documenting system upgradesIncludes impact assessments, approval processes, and testing outcomes
Use of metrics in security documentationProvides quantifiable measures for evaluating system performance and controls
What is a risk assessment reportAnalyzes potential threats, vulnerabilities, and business impacts
What is a risk treatment planOutlines strategies to reduce identified risks to acceptable levels
What is continuous monitoring reportingOngoing collection and analysis of security data to ensure compliance and detect incidents
What is security training program documentationTracks employee training activities and certifications for compliance purposes
When to use stakeholder communication templatesSimplifies the process of delivering consistent messages across teams
Why document lessons learned from incidentsImproves future response and reduces risk of repeated issues
Why document third-party risk assessmentsEnsures thorough evaluation of external service providers’ security practices
This deck covers the essential documents, reporting requirements, and communication practices needed for governance and compliance activities.
Share on...
Follow us on...