Information Technology /Security+ (SY0-701): Lesson 14: Summarize Security Governance Part 3

Security+ (SY0-701): Lesson 14: Summarize Security Governance Part 3

Information Technology20 CardsCreated about 2 months ago

This flashcard deck covers key concepts from Lesson 14 of the Security+ (SY0-701) course, focusing on security governance roles, change management, and automation in security management.

Define the role of a 'processor' in security/data governance

An entity trusted with a copy of personal data to perform storage and/or analysis on behalf of the data collector; Ensures that data is handled securely and in accordance with the rules established by the owner and controller roles.
Tap or swipe ↕ to flip
Swipe ←→Navigate
SSpeak
FFocus
1/20

Key Terms

Term
Definition
Define the role of a 'processor' in security/data governance
An entity trusted with a copy of personal data to perform storage and/or analysis on behalf of the data collector; Ensures that data is handled secure...
How do processors adhere to security/data governance?
By maintaining records of their processing activities, cooperate with supervisory authorities, and implement appropriate security measures to protect ...
Define the role of a 'custodian' in security/data governance
Data steward - implements and enforces the security controls established by the data owner and controller; Responsible for managing the system on whic...
What must be included when proposing a change request in change management?
Documentation, including details describing what will be changed, the reasons for the change, any potential impacts, and a rollback plan in case the c...
When assessing a change request, what must be considered?
Each change must be subject to risk assessment to identify potential security impacts.
What the role of an 'owner' in change management
Project managers/team leaders accountable for ensuring change is implemented as planned, risks are managed effectively, and there's a clear plan for c...

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition
Define the role of a 'processor' in security/data governance
An entity trusted with a copy of personal data to perform storage and/or analysis on behalf of the data collector; Ensures that data is handled securely and in accordance with the rules established by the owner and controller roles.
How do processors adhere to security/data governance?
By maintaining records of their processing activities, cooperate with supervisory authorities, and implement appropriate security measures to protect the data they handle.
Define the role of a 'custodian' in security/data governance
Data steward - implements and enforces the security controls established by the data owner and controller; Responsible for managing the system on which data assets are stored, including being responsible for enforcing access control, encryption, and backup/recovery measures.
What must be included when proposing a change request in change management?
Documentation, including details describing what will be changed, the reasons for the change, any potential impacts, and a rollback plan in case the change does not work as planned.
When assessing a change request, what must be considered?
Each change must be subject to risk assessment to identify potential security impacts.
What the role of an 'owner' in change management
Project managers/team leaders accountable for ensuring change is implemented as planned, risks are managed effectively, and there's a clear plan for communication/training associated with the change.
Define a 'stakeholder'
A person who has a business interest in the outcome of a project or is actively involved in its work.
Define 'impact analysis'
Change management process of identifying and assessing the potential implications of a proposed change.
How do test results affect change management?
Test results provide valuable insight into the likelihood of success and help identify potential issues without impacting business operations.
How do 'back out plans' affect change management?
A well-defined back out plan helps to minimize downtime and reduces the risk of data loss or other severe impacts.
What is the role of maintenance windows in change management?
A predefined, recurring time frame for implementing changes.
How do 'Standard Operating Procedures (SOPs)' affect change management?
Written instructions that describe how to carry out routine operations or changes to ensure that changes are implemented consistently and effectively.
Define an 'allow list' in regards to change management
A list of approved software, hardware, and specific change types that are not required to go through the entire change management process.
Define a 'deny list' in regards to change management
Includes explicitly blocked software, hardware, and specific change types or high-impact changes that must always go through the full change management process, or individuals who are not authorized to implement or approve changes.
Define 'Version control'
Tracking and controlling changes to documents, code, or other important data.
How can automation be used for security management?
Monitoring for threats, applying patches, maintaining baselines, or responding to incidents.
What is the role of orchestration in security management?
Enhances automation by coordinating and streamlining the interactions between automated processes and systems.
Define a 'workforce multiplier'
A tool or automation that increases employee productivity, enabling them to perform more tasks to the same standard per unit of time.
Define 'Operator fatigue'
The mental exhaustion experienced by cybersecurity professionals.
Define 'technical debt'
Costs accrued by keeping an ineffective system or product in place, rather than replacing it with a better-engineered one.