Uploaded on Apr 25, 2021
The process of identifying vulnerabilities and threats to the information resources used by an organization in achieving business objectives and what countermeasures to take in reducing risk to an acceptable level.
PART 3 – CISA Domain 2 – Governance and Management of IT
www.infosectrain.com
PART 3 – CISA Domain 2 – Governance and
Management of IT
InfosecTrain
About Us
InfosecTrain is one of the finest Security and Technology Training and Consulting organization, focusing on a range of IT
Security Trainings and Information Security Services. InfosecTrain was established in the year 2016 by a team of
experienced and enthusiastic professionals, who have more than 15 years of industry experience. We provide professional
training, certification & consulting services related to all areas of Information Technology and Cyber Security.
PART 3 – C ISA Domain 2 – Governance and
MWanh aatg ies mR ies kn tM aonfa gITe m e n t ?
W h a t a r e t h e s t e p s i n v o l v e d i n R i s k M a n a g e m e n t p r o c e s s ?
W h a t i s H u m a n R e s o u r c e M a n a g e m e n t ?
W h a t a r e t h e S o u r c i n g P r a c t i c e s ?
7.R isk Management :
T h e p r o c e s s o f i d e n t i f y i n g v u l n e r a b i l i t i e s a n d t h r e a t s t o t h e
i n f o r m a t i o n r e s o u r c e s u s e d b y a n o r g a n i z a t i o n i n a c h i e v i n g b u s i n e s s
o b j e c t i v e s a n d w h a t c o u n t e r m e a s u r e s t o t a ke i n r e d u c i n g r i s k t o a n
a c c e p t a b l e l e v e l .
e n c o m p a s s e s i d e n t i f y i n g , a n a l y z i n g , e v a l u a t i n g , t r e a t i n g , m o n i t o r i n g
a n d c o m m u n i c a t i n g t h e i m p a c t o f r i s k o n I T p r o c e s s e s
T h e B o a r d m a y c h o o s e t o t r e a t t h e r i s k i n a n y o f t h e f o l l o w i n g w a y s
1.Avoid—Eliminate the risk by eliminating the cause
2.Mitigate—Lessen the probability or impact of the risk by defining, implementing and
monitoring appropriate controls
3.Share/Transfer (deflect, or allocate)—Share risk with partners or transfer via insurance
coverage, contractual agreement or other means
4.Accept—Formally acknowledge the existence of the risk and monitor it.
4 C C I S O C e r t i fi c a t i o n
P o i n t s t o r e m e m b e r : T h e b e s t t o a s s e s s I T r i s k s i s a c h i e v e d b y –
e v a l u a t i n g t h r e a t s a s s o c i a t e d w i t h e x i s t i n g I T a s s e t s a n d I T
p r o j e c t s .
T h e s t e p s o f R i s k M a n a g e m e n t p r o c e s s i n v o l v e :
Step – 1: Asset identification – Examples: Information, Data, Software, Hardware, documents,
personnel.
Step – 2: Evaluation of threats and vulnerabilities:
1.T h r e a t – A t h r e a t i s a p e r s o n o r e v e n t t h a t h a s t h e p o t e n t i a l f o r
i m p a c t i n g a v a l u a b l e r e s o u r c e i n a n e g a t i v e m a n n e r. C o m m o n c l a u s e s o f
t h r e a t s a r e :
E r r o r s
M a l i c i o u s d a m a g e / a t t a c k
Fr a u d
T h e f t
E q u i p m e n t / s o f t w a r e f a i l u r e
5
1.Vu l n e r a b i l i t y – Vu l n e r a b i l i t y r e f e r t o w e a k n e s s e s i n a s y s t e m . T h e y m a ke
t h r e a t o u t c o m e s p o s s i b l e a n d p o t e n t i a l l y e v e n m o r e d a n g e r o u s . E x a m p l e s
a r e :
L a c k o f u s e r k n o w l e d g e
L a c k o f s e c u r i t y f u n c t i o n a l i t y
I n a d e q u a t e u s e r a w a r e n e s s / e d u c a t i o n ( e . g . , p o o r c h o i c e o f p a s s w o r d s )
U n t e s t e d t e c h n o l o g y
Tr a n s m i s s i o n o f u n p r o t e c t e d c o m m u n i c a t i o n s
S t e p 3 – E v a l u a t i o n o f t h e i m p a c t – T h e r e s u l t o f a t h r e a t a g e n t
e x p l o i t i n g a v u l n e r a b i l i t y i s c a l l e d a n i m p a c t
• In commercial organizations, threats usually result in
1.a d i r e c t fi n a n c i a l l o s s i n t h e s h o r t t e r m o r
2.a n u l t i m a t e ( i n d i r e c t ) fi n a n c i a l l o s s i n t h e l o n g t e r m
6
E x a m p l e s o f s u c h l o s s e s i n c l u d e :
• Direct loss of money (cash or credit)
• Breach of legislation (e.g., unauthorized disclosure)
• Loss of reputation/goodwill
• Endangering of staff or customers
• Breach of confidence
• Loss of business opportunity
• Reduction in operational efficiency/performance
• Interruption of business activity
S t e p 4 – C a l c u l a t i o n o f R i s k – A c o m m o n m e t h o d o f c o m b i n i n g t h e
e l e m e n t s i s t o c a l c u l a t e f o r e a c h t h r e a t : p r o b a b i l i t y o f o c c u r r e n c e ×
m a g n i t u d e o f i m p a c t . T h i s w i l l g i v e a m e a s u r e o f o v e r a l l r i s k .
S t e p 5 – E v a l u a t i o n o f a n d r e s p o n s e t o R i s k A f t e r r i s k h a s b e e n
i d e n t i fi e d , e x i s t i n g c o n t r o l s c a n b e e v a l u a t e d o r n e w c o n t r o l s d e s i g n e d
t o r e d u c e t h e v u l n e r a b i l i t i e s t o a n a c c e p t a b l e l e v e l .
• T h e s e c o n t r o l s a r e r e f e r r e d t o a s c o u n t e r m e a s u r e s o r s a f e g u a r d s a n d
i n c l u d e a c t i o n s , d e v i c e s , p r o c e d u r e s o r t e c h n i q u e s
• Re s i d u a l r i s k , t h e r e m a i n i n g l e v e l o f r i s k a f t e r c o n t r o l s h a v e b e e n
a p p l i e d , c a n b e u s e d b y m a n a g e m e n t t o f u r t h e r r e d u c e r i s k b y
i d e n t i f y i n g t h o s e a r e a s i n w h i c h m o r e c o n t r o l i s r e q u i r e d .
7
8.Human Resource Management :
O n H i r i n g p r o c e s s , t h e fi r s t s t e p b e f o r e h i r i n g a c a n d i d a t e i s
b a c k g r o u n d c h e c k s ( e . g . , c r i m i n a l , fi n a n c i a l , p r o f e s s i o n a l , r e f e r e n c e s ,
q u a l i fi c a t i o n s )
A r e q u i r e d v a c a t i o n ( h o l i d a y ) e n s u r e s t h a t o n c e a y e a r , a t a m i n i m u m ,
s o m e o n e o t h e r t h a n t h e r e g u l a r e m p l o y e e w i l l p e r f o r m a j o b f u n c t i o n .
T h i s r e d u c e s t h e o p p o r t u n i t y t o c o m m i t i m p r o p e r o r i l l e g a l a c t s . D u r i n g
t h i s t i m e , i t m a y b e p o s s i b l e t o d i s c o v e r f r a u d u l e n t a c t i v i t y a s l o n g a s
t h e r e h a s b e e n n o c o l l u s i o n b e t w e e n e m p l o y e e s t o c o v e r p o s s i b l e
d i s c r e p a n c i e s ( M a n d a t o r y l e a v e i s a c o n t r o l m e a s u r e )
J o b r o t a t i o n p r o v i d e s a n a d d i t i o n a l c o n t r o l ( t o r e d u c e t h e r i s k o f
f r a u d u l e n t o r m a l i c i o u s a c t s ) b e c a u s e t h e s a m e i n d i v i d u a l d o e s n o t
p e r f o r m t h e s a m e t a s k s a l l t h e t i m e . T h i s p r o v i d e s a n o p p o r t u n i t y f o r a n
i n d i v i d u a l o t h e r t h a n t h e r e g u l a r l y a s s i g n e d p e r s o n t o p e r f o r m t h e j o b
a n d n o t i c e p o s s i b l e i r r e g u l a r i t i e s .
O n Te r m i n a t i o n p o l i c i e s , p o l i c i e s b e s t r u c t u r e d t o p r o v i d e a d e q u a t e
p r o t e c t i o n f o r t h e o r g a n i z a t i o n ’ s c o m p u t e r a s s e t s a n d d a t a . T h e f o l l o w i n g
c o n t r o l p r o c e d u r e s s h o u l d b e a p p l i e d :
• Return of all devices, access keys, ID cards and badges
• Deletion/revocation of assigned logon IDs and passwords
• Notification to appropriate staff and security personnel regarding the employee’s status change to
“terminated”
• Arrangement of the final pay routines
• Performance of a termination interview
8
P o i n t s t o r e m e m b e r :
•T h e C I S A c a n d i d a t e s h o u l d b e a w a r e o f t h e a b o v e p r o c e s s – f r o m
h i r i n g t o t e r m i n a t i o n . I S AC A t e s t s o n t h e k n o w l e d g e a t e a c h s t e p –
o n w h a t t h e e n t e r p r i s e s h o u l d / s h o u l d n o t d o .
•T h e e m p l o y e e s s h o u l d b e a w a r e o f t h e e n t e r p r i s e I S p o l i c y. I f n o t ,
t h e l a c k o f k n o w l e d g e w o u l d l e a d t o u n i n t e n t i o n a l d i s c l o s u r e o f
s e n s i t i v e i n f o r m a t i o n
•W h e n a n e m p l o y e e i s t e r m i n a t e d , t h e i m m e d i a t e a c t i o n / m o s t
i m p o r t a n t a c t i o n / fi r s t s t e p t h a t t h e e n t e r p r i s e s h o u l d d o i s –
d i s a b l e t h e e m p l o y e e ’ s l o g i c a l a c c e s s a n d c o m m u n i c a t e o n t h e
t e r m i n a t i o n o f t h e e m p l o y e e
9.Sourc ing Pract i ces :
D e l i v e r y o f I T f u n c t i o n s c a n i n c l u d e :
• Insourced – Fully performed by the organization’s staff
• Outsourced – Fully performed by the vendor’s staff
• Hybrid – Performed by a mix of the organization’s and vendor’s staffs; can include joint
ventures/supplemental staff
9
I T f u n c t i o n s c a n b e p e r f o r m e d a c r o s s t h e g l o b e , t a k i n g a d v a n t a g e o f
t i m e z o n e s a n d a r b i t r a g i n g l a b o r r a t e s , a n d c a n i n c l u d e :
• Onsite – Staff work onsite in the IT department.
• Offsite – Also known as nearshore, staff work at a remote location in the same geographic
• Offshore—Staff work at a remote location in a different geographic region
O b j e c t i v e o f o u t s o u r c i n g – t o a c h i e v e l a s t i n g , m e a n i n g f u l i m p r o v e m e n t
i n b u s i n e s s p r o c e s s e s a n d s e r v i c e s t h r o u g h c o r p o r a t e r e s t r u c t u r i n g t o
t a ke a d v a n t a g e o f a v e n d o r ’ s c o r e c o m p e t e n c i e s
T h e m a n a g e m e n t s h o u l d c o n s i d e r t h e f o l l o w i n g a r e a s f o r m o v i n g
I T f u n c t i o n s o ff s i t e o r o ff s h o r e :
• Legal, regulatory and tax issues
• Continuity of operations
• Personnel
• Telecommunication issues
• Cross-border and cross-cultural issues
10
P o i n t s t o r e m e m b e r :
•T h e m o s t i m p o r t a n t f u n c t i o n o f I S m a n a g e m e n t i n o u t s o u r c i n g
p r a c t i c e s i s – m o n i t o r i n g t h e o u t s o u r c i n g p r o v i d e r ’ s
p e r f o r m a n c e
•T h e e n t e r p r i s e c a n n o t o u t s o u r c e t h e a c c o u n t a b i l i t y f o r I T
s e c u r i t y p o l i c y. T h e a c c o u n t a b i l i t y a l w ay s l i e s w i t h t h e s e n i o r
m a n a g e m e n t / B o a r d o f d i r e c t o r s
•W h e n t h e o u t s o u r c i n g s e r v i c e i s p r o v i d e d i n a n o t h e r c o u n t r y,
t h e m a j o r c o n c e r n f o r t h e I S a u d i t o r i s – t h e l e g a l j u r i s d i c t i o n
c a n b e q u e s t i o n e d
•T h e c l a u s e i n o u t s o u r c i n g c o n t r a c t t h a t c a n h e l p i n i m p r o v i n g
t h e s e r v i c e l e v e l s a n d m i n i m i z e t h e c o s t s i s – G a i n - s h a r i n g
p e r f o r m a n c e b o n u s e s .
11
12
A B O U T O U R C O M PA N Y
OUR CONTACT
InfosecTrain welcomes overseas customers to come and
attend training sessions in destination cities across the globe
and enjoy their learning experience at the same time.
https://www.facebook.com/Infosectr
1800-843-7890
ain/
sales@infosectrain. https://www.linkedin.com/company/infos
ec-train/
com
www.infosectrain.c https://www.youtube.com/c/Infose
cTrain
om
Comments