Lesson 14
Lesson 14: Security Governance Concepts
Policies, Standards, and Procedures
Policies:
High-level rules guiding organizational behavior and decision-making
- Broad and rigid, organization-wide
- Focus: What must be done
- Examples:
AUP (Acceptable Use Policy),Incident Response Policy
Standards:
Specific technical guidelines supporting policies
- Detailed but adaptable, department/system specific
- Focus: How to meet policies (ensure uniformity and best practices)
- Examples:
ISO 27000 Series,NIST SP 800 Series,PCI DSS - Standard defines expected outcome (configuration state, performance baseline)
Procedures:
Step-by-step instructions for completing tasks
- Specific and repeatable, task/role specific
- Focus: Steps to complete a task
- Examples: Onboarding, patching, software provisioning
Key Procedures:
Onboarding: Setup new users (account creation, role assignment, access to systems, training)Offboarding: Remove access when employee leaves (disable accounts, revoke credentials, collect assets)Background Checks: Pre-employment verification (criminal history, identity, employment)Service Provisioning: Assign IT services (email, cloud apps, VPN) based on roleSoftware Provisioning: Grant access to specific applications needed for jobDesktop Deployment: Install/configure endpoint devices for new usersPatching & Updating: Ensure systems have latest security patchesGo-Live Actions: Checklist when deploying new system/user into productionAfter-Hours Support: Handle support requests outside normal hoursTicket Management: Track onboarding/offboarding actions
Legal and Regulatory Compliance
Global Laws:
GDPR (General Data Protection Regulation): EU law protecting personal data, requires consent, fines up to €20M or 4% revenueCCPA (California Consumer Privacy Act): Grants Californians rights over data (opt-out of sales)
Industry-Specific Regulations:
HIPAA (Health Insurance Portability and Accountability Act): Protects patient health data in U.S., safeguards for ePHIFERPA (Family Educational Rights and Privacy Act): Safeguards student records in U.S. schoolsPCI DSS (Payment Card Industry Data Security Standard): Security for credit card transactions, annual auditsGLBA (Gramm-Leach-Bliley Act): U.S. financial institutions protect consumer financial information
Other Regulations:
NERC (North American Electric Reliability Corporation): Cybersecurity for energy infrastructure (U.S. & Canada)CIPA (Children's Internet Protection Act): Requires schools/libraries to filter harmful contentCOPPA (Children's Online Privacy Protection Act): Restricts online data collection from children under 13FISMA (Federal Information Security Modernization Act): Cybersecurity protections for federal agenciesCJIS (Criminal Justice Information Services Security Policy): Security for criminal justice dataGSC (Government Security Classifications): U.K. system for classifying sensitive information
Consequences of Non-Compliance:
- Fines (GDPR up to €20M or 4% revenue)
- Legal penalties (civil/criminal lawsuits)
- Loss of contracts (PCI DSS non-compliance = can't process credit cards)
Governance Roles
Data Owner: Senior staff responsible for data classification (CFO owns financial data)Data Controller: Decides why and how personal data is collected/processedData Processor: Processes personal data on behalf of controller (cloud storage provider)Data Custodian: Manages data storage and security (IT department encrypting files)Data Subject: Individual whose personal information is collected/stored
Change Management
Process:
- Propose Change: Submit request (upgrade server hardware)
- Review by Change Board: Assess risks and impacts (downtime)
- Test: Validate in sandbox environment
- Implement: Deploy during maintenance windows
- Backout Plan: Revert if issues arise (snapshot can be part of backout but is technical tool, not detailed procedure)
Allow Lists vs Deny Lists:
Allow List: Pre-approved items only (only Microsoft Teams can be installed)Deny List: Blocked items (ban BitTorrent)
Documentation:
Version Control: Track changes to policies (using Git, GitHub, GitLab)Legacy Systems: Older systems needing special handling (compatibility testing for Windows 7)
Automation and Orchestration
Automation:
Using scripts/tools to perform tasks without manual effort
- Examples: PowerShell scripts to deploy patches, blocking malicious IPs
Orchestration:
Coordinating automated tasks across systems
- Example: Deploying updates to 100 servers simultaneously using Ansible
Challenges:
- Complexity: Requires skilled staff
Technical Debt: Poorly maintained scripts create security gaps
All Content
Lesson 0: Study Tips and Resources
Study Tips and Resources
Lesson 1: Fundamental Security Concepts
Study Tips and Resources
Lesson 2: Threat Types
Study Tips and Resources
Lesson 3: Cryptographic Solutions
Study Tips and Resources
Lesson 4: Identity and Access Management (IAM)
Study Tips and Resources
Lesson 5: Enterprise Network Architecture
Study Tips and Resources
Lesson 6: Cloud & Zero Trust
Study Tips and Resources
esson 7: Resiliency and Site Security
Study Tips and Resources
Lesson 8: Vulnerability Management
Study Tips and Resources
Lesson 9: Network Security Capabilities
Study Tips and Resources
Lesson 10: Endpoint Security
Study Tips and Resources
Lesson 11: Application Security
Study Tips and Resources
Lesson 12: Alerting and Monitoring
Study Tips and Resources
Lesson 13: Analyze Indicators of Malicious Activity
Study Tips and Resources
Lesson 15: Risk Management Processes
Study Tips and Resources
Lesson 16: Data Protection and Compliance Concepts
Study Tips and Resources