Bash, the Crucial Exams Chat Bot
AI Bot

Security and Privacy Controls (ISC2 CGRC)  Flashcards

ISC2 Governance, Risk and Compliance (CGRC) Flashcards

FrontBack
Access Control FamilyEnsures that only authorized users, processes, or devices can access resources.
Audit and Accountability FamilyTracks actions and events to detect potential security breaches or policy violations.
Awareness and Training FamilyFocuses on educating employees regarding security policies, threats, and best practices.
Configuration Management FamilyControls the setup and maintenance of secure system configurations.
Contingency Planning FamilyPrepares for incident response and recovery to maintain critical operations.
Continuous MonitoringProvides ongoing oversight and updates for organizational security systems.
Data Quality FamilyEnsures the accuracy, completeness, and relevance of organizational data to maintain trustworthiness and functionality.
Data Retention and Disposal FamilyAddresses protocol for securely retaining or securely disposing of organizational data to prevent unauthorized access.
Documentation FamilyPromotes thorough, accessible records for systems, policies, and implemented security controls to ensure compliance.
Encryption and Cryptographic ControlsGuarantees that sensitive information is safeguarded through robust encryption and applied cryptographic measures.
Identification and Authentication FamilyEnsures users and systems are uniquely identified and validated before use.
Incident Response FamilyDefines protocols for detecting, reporting, and mitigating security incidents.
Integrity Controls FamilySafeguards data from unauthorized alterations and ensures reliable data exchange within systems.
Interconnection Security Agreements (ISAs)Defines how connected systems interact securely while establishing standards for shared data and communication.
Maintenance FamilyEnsures proper maintenance of systems to prevent and detect vulnerabilities.
Media Protection FamilyProtects sensitive media (e.g., drives, paper) from unauthorized access, use, or destruction.
Personnel Security FamilyManages insider threats through background checks, role separation, and training.
Physical and Environmental Protection FamilySafeguards physical facility and system environment from threats.
Planning FamilyProvides oversight and organization for security policies and implementations.
Privacy ControlsAddress the protection of personal and sensitive data within the organization's systems.
Privacy Impact Assessment (PIA)Identifies privacy risks within new or evolving systems and recommends mitigations to uphold data protection laws.
Program Management FamilyCoordinates an organization-wide security strategy and implementation.
Risk Assessment FamilyFocuses on evaluating and addressing risks to the organization.
Security Assessment and Authorization FamilyEnsures proper evaluation, testing, and approval of security controls.
Security Awareness Metrics FamilyEvaluates the effectiveness of training programs and security comprehension levels across the organization.
Security Baseline FamilyEstablishes minimum required security measures and configurations for systems to uphold uniform compliance.
Supply Chain Risk ManagementFocuses on ensuring security in external partnerships, procurements, and services.
System AcquisitionDevelopment, and Maintenance Family, Focuses on ensuring that new systems and applications are designed securely and tested for vulnerabilities before deployment.
System and Communication Protection FamilyProtects the integrity, confidentiality, and availability of communications within systems.
System and Information Integrity FamilyMonitors and protects systems against corruption or unauthorized modifications.
This deck outlines different security and privacy control families, emphasizing their implementation and testing to ensure compliance.
Share on...
Follow us on...