Information Security and Risk Management
- Information security and Risk Management system : 
- Primary Objective: Maintaining and conducting business operations in a secure environment. 
- Organization: what are business needs 
- Information: which are critical for business 
 
- What's your business/organization mission and vision? 
- Which sector your business/organization belongs to ? 
- identify and classify our organization's assets (tangible and intangible) 
- ensure the security of those assets is adequately protected by implementing core security principles 
- CIA Triad: 
- Confidentiality : deals with secrecy, restrict un authorized access 
- Security controls like encryption, access controls 
- Which security control we in placed to achieve this 
- Data encryption : data at rest 
- Hashing : data in transit (file integrity monitoring) 
- Sha 256 
- Sha 512 
 
- MFA (IAM and user access) 
- Privilege Access Management 
- Password rotations and policies 
- Secret Management 
 
- Physical Security 
- Default deny for critical data and infrastructure 
- Documented approval from leadership 
- Proper auditing/activity log management 
 
 
 
 
 
 
- Integrity : protecting reliability 
- Access restriction to make changes 
- Encryption policies to achieve integrity when data at rest 
- Hashing policies to achieve integrity when data at transit 
 
- Availability : having uninterrupted access 
- High availability of services or access to data. 
- What is org Disaster Recovery Plan? 
- What is org Business Continuity Plan? 
- Fail over clustering 
- Site reliability 
- Site resiliency 
- Automatic failover 
- Load balancing 
- Redundant components of software and hardware 
- Cold, hot and warm sites 
 
 
 
 
- AAA 
- Authentication 
- Authorization 
- Accounting 
 
 
- IAAAA 
- Identification 
- Authentication 
- Authorization 
- Auditing 
- Accounting 
 
 
- Information Security Management System and Risk Management 
- Information security policies, procedures and playbooks 
- Managing third party Risks 
- Cloud service provider 
- Third Party service provider 
- Policies with Third party service provider to know breach information 
- Service Level Agreements 
- Vendor Security Assessment https://opensource.google/projects/vsaq 
- Consensus Assessments Initiative Questionnaire 
- Data Loss Prevention 
 
 
- Asset Security 
- Assets Types 
 
 
- i. Physical 
- ii. Digital 
- iii. Non reputational 
- Asset Register/Inventory 
 
- i. Asset Owners 
- ii. Asset value 
- iii. Asset Classification 
- CMDB 
- Asset identification and classification 
 
- Security Awareness Training 
 
- a. Phishing simulations 
- Security Architecture and Engineering 
- Vulnerability Management 
- Network Security 
- Identity and Access Management 
- Security Testing 
- Disaster Recovery and Business Continuity plan 
- Security Operations 
- Software Development Security/DevSecOps 
 
- References: 
Last updated
Was this helpful?