• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/180

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

180 Cards in this Set

  • Front
  • Back
What are the five essential characteristics of cloud computing as defined by NIST?
Broad Network Access
Rapid Elasticity
Measured Service
On-Demand Self Service
Resource Pooling
The level of attention and scrutiny paid to enterprise risk assessments should be directly related to what?
The value at risk
In the majority of data protection laws, when the data is transferred to a third party custodian, who is ultimately responsible for the security of the data?
The Data Controller
What is the most important reason for knowing where the cloud service provider will host the data?
So that it can address the specific restrictions that foreign data protection laws may impose.
What are the six phases of the data security lifecycle?
Create
Store
Use
Share
Archive
Destroy
Why is the size of data sets a consideration in portability between cloud service providers?
The sheer size of data may cause an interruption of service during a transition, or a longer transition period than anticipated.
What are the four D's of perimeter security?
Deter
Detect
Delay
Deny
In which type of environment is it impractical to allow the customer to conduct their own audit, making it important that the data center operators are required to provide auditing for the customers?
In multi-tenant environments the operator or provider cannot normally accommodate visits by every customer to conduct an audit.
What measures could be taken by the cloud service provider (CSP) that might reduce the occurrence of application level incidents?
SaaS providers that generate extensive customer-specific application logs and provide secure storage as well as analysis facilities will ease the IR burden on the customer.
How should an SDLC be modified to address application security in a Cloud Computing environment?
Organizations must adopt best practices for development, either by having a good blend of processes, tools, and technologies of their own or adopting one of the maturity models.
What is the most significant reason that customers are advised to maintain in-house key management?
To be able to prove that all data has been deleted from the public cloud environment when exiting that environment.
What two types of information will cause additional regulatory issues for all organizations if held as an aspect of an Identity?
PII - Personal Identifiable Information
SPI - Sensitive Personal Information
Why do blind spots occur in a virtualized environment, where network-based security controls may not be able to monitor certain types of traffic?
Virtual machines may communicate with each other over a hardware backplane, rather than a network.
When deploying Security as a Service in a highly regulated industry or environment, what should both parties agree on in advance and include in the SLA?
Agreement on the metrics defining the service level required to achieve regulatory objectives
Economic Denial of Service (EDOS), refers to...
The destruction of economic resources; the worst case scenario would be bankruptcy of the customer or a serious economic impact
How does SaaS alleviate much of the consumer's direct operational responsibility?
The provider is not only responsible for the physical and environmental security controls, but it must also address the security controls on the infrastructure, the applications, and the data.
In Europe, name the group that has enacted data protection laws and the principles on which they follow.
The European Economic Area (EEA) Member States follow principles set forth in the 1995 European Union (EU) Data Protective Directive and the 2002 ePrivacy Directive as amended in 2009.
What is the minimum that U.S. state laws require when using a Cloud Service Provider?
Written contract with the service provider with reasonable security measures.
What must be included between an organization and a Cloud Service Provider when the organization has contractual obligations to protect the personal information of their clients, contacts or employees, to ensure that the data are not used for secondary use and are not disclosed to third parties?
The organization must ensure contractually that it will have the continued ability to meet the promises and commitments that it made in its privacy notice(s) or other contracts.
What is a click-wrap agreement?
A non-negotiated contract
How does an organization respond to the evolving nature of the cloud environment?
Periodic monitoring, testing, and evaluation of the services.
What must a U.S. litigant provide during e-discovery?
All documents that pertain to the case whether favorable to its case or the other litigant's case.
What is ESI?
Electronically Stored Information
What are four considerations for a cloud customer to understand in reference to regulatory compliance?
- Cross-border or multi-jurisdiction
- Assignment of compliance responsibilities including the CSP's providers
- CSP capability to show compliance
- Relationship between all parties including customer, CSP, auditors and CSP's providers
What role do audits perform in the cloud relationships?
Audits must be independently conducted and should be robustly designed to reflect best practice, appropriate resources, and tested protocols and standards.
At what stage should compliance be addressed between an organization and CSP?
Requirements identification stage
What is multi-tenancy?
Use of same resources or application by multiple customers that may belong to the same organization or a different organization.
What does a cloud service model need to include for multi-tenancy consumers?
Policy-driven enforcement
Segmentation
Isolation
Governance
Service Levels
Chargeback/billing models
What services can be shared in multi-tenancy cloud service models?
Infrastructure
Data
Metadata
Services
Applications
What three cloud services make up the Cloud Reference Model?
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Define IaaS
IaaS delivers computer infrastructure as a service along with raw storage and networking.
Define PaaS
PaaS delivers computing platform and solution stack as a service.
Define SaaS
SaaS delivers software and its associated data hosted centrally typically in the cloud and are usually accessed by users via a web browser over the Internet.
List the four dimensions in the Jericho Cloud Cube Model
- Internal (I) / External (E): Physical Location
- Proprietary (P) / Open (O): State of Ownership
- Perimeterised (Per) / De-perimeterised (D-p): Architectural mindset
- Insourced / Outsourced: Who provides the cloud service
List the four cloud deployment models
Public
Private - internal/external
Hybrid
Community
What is the key takeaway for security architecture?
The lower down the stack the CSP stops, the more security capabilities and management consumers are responsible for implementing and managing themselves.
What are the risks and pitfalls to consider in the Cloud Security Reference Model?
- How / where cloud service are deployed
- Manner in which cloud services are consumed
- Re-perimeterization of enterprise networks
- Types of assets, resources and information being managed
- Who manages them and how
- Which controls are selected and how they are integrated
- Compliance issues
How do you determine the general security posture of a service and how it relates to an asset's assurance and protection requirements?
- Classify a cloud service against the cloud architectural model
- Map the security architecture and business, regulatory, and other compliance requirements as a gap-analysis exercise
What do cloud service brokers provide?
- Intermediation
- Monitoring
- Transformation/portability
- Governance
- Provisioning
- Integration services
- Relationship negotiation between CSP and consumers
What are included in a Service Level Agreement (SLA)?
- Service levels
- Security
- Governance
- Compliance
- Liability expectations of the service and provider
What are two types of Service Level Agreements (SLA)?
Negotiable
Non-negotiable
Name the five basic principles followed in Corporate Governance.
- Auditing supply chains
- Board and management structure and process
- Corporate responsibility and compliance
- Financial transparency and information disclosure
- Ownership structure and exercise of control rights
Define Corporate Governance
The set of processes, technologies, customs, policies, laws and institutions affecting the way an enterprise is directed, administered or controlled.
Define Information Risk Management
The process of identifying and understanding exposure to risk and the capability of managing it, aligned with the risk appetite and tolerance of the data owner.
Define Enterprise Risk Management
The methods and processes used by organizations to manage risks and seize opportunities related to the achievement of their objectives.
List four of the specific risks identified and analyzed by management in a cloud environment.
- Avoidance: exiting the activities giving rise to risk
- Reduction: taking action to reduce the likelihood or impact related to the risk
- Share or insure: transferring or sharing a portion of the risk to finance it
- Accept: no action is taken due to a cost/benefit decision
What should be specifically targeted in the assessment of a CSP's third party service providers?
- Incident management
- Business continuity
- Disaster recovery policies, processes and procedures
- Review of co-location and back-up facilities
What is a CSP's supply chain?
Their service provider relationships and dependencies
How should the cost savings obtained by cloud computing services be utilized?
Reinvest into increased scrutiny of the security capabilities of the provider, application of security controls, and ongoing detailed assessments and audits to ensure requirements are continuously met.
Define Public Cloud
The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.
Define Private Cloud
The cloud infrastructure is operated solely for a single organization. It may be managed by the organization or by a third party and may be located on-premise or off-premise.
Define Community Cloud
The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy or compliance considerations). It may be managed by the organizations or by a third party and may be located on-premise or off-premise.
Define Hybrid Cloud
The cloud infrastructure is a composition of two or more clouds (private, community of public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds).
Define Cloud Bursting
Where an enterprise shares the load with external cloud providers to meet peak demands
In most jurisdictions in the U.S., what types of information are a party obligated to produce?
Documents and data within its possession, custody or control.
What types of data hosted by a CSP could be outside the control of a client?
- Disaster recovery systems
- Certain metadata created and maintained by the CSP to operate its environment
What should a client account for during e-discovery?
Additional time and expense where a client may not have the ability or administrative rights to search or access all of the data hosted in the cloud.
In the U.S. what is generally considered to be the obligation of a client who knows or reasonably should know is relevant to a pending or reasonably anticipated litigation or government investigation?
To undertake reasonable steps to prevent the destruction or modification of data or information in its possession, custody or control.
Who is held liable for acts of a subcontractor?
Government agencies, such as the FTC or the state Attorney General, have consistently held organizations liable for the activities of their subcontractors.
What does the GLBA and HIPAA require between an organization and their subcontractor?
The security and privacy rules require organizations to compel their subcontractors in written contracts to use reasonable security measures and comply with data privacy provisions.
What two general categories do assets supported by the cloud fall into?
1. Data
2. Applications/Functions/Process
What is the first step in evaluating risk for the cloud?
Determine exactly what data or function is being considered for the cloud.
What is the second step in evaluating risk for the cloud?
Determine how important the data or function is to the organization.
For each asset, what three areas are assessed if all or part of the asset is handled in the cloud?
1. Confidentiality
2. Integrity
3. Availability requirements
For each asset, what six areas are examined in how the organization would be harmed if all or part of the asset is handled in the cloud?
1. If the asset became widely public and widely distributed
2. If an employee of the cloud provider accessed the asset
3. If the process or function were manipulated by an outsider
4. If the process or function failed to provide expected results
5. If the information/data were unexpectedly changed
6. If the asset were unavailable for a period of time
What is the third step in evaluating risk for the cloud?
Determine which deployment models are best suited to the organization
What is the fourth step in evaluating risk for the cloud?
Evaluate potential cloud service providers
How do you prevent scope creep?
Determine potential uses of the data or function being considered for the cloud.
Define cloud computing
A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources.
Define multi-tenancy in cloud service models
The need for policy-driven enforcement, segmentation, isolation, governance, service levels, and chargeback/billing models for different consumer constituencies.
In the Application & Interface Security control domain, which of the following architectural references apply to Application Security?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Network
- Computing
- Storage
- Application
- Data
In the Application & Interface Security control domain, which of the following architectural references apply to Customer Access Requirements?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Application & Interface Security control domain, which of the following architectural references apply to Data Integrity?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Network
- Computing
- Storage
- Application
- Data
In the Application & Interface Security control domain, which of the following architectural references apply to Data Security / Integrity?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Network
- Computing
- Storage
- Application
- Data
In the Audit Assurance & Compliance control domain, which of the following architectural references apply to Audit Planning?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Audit Assurance & Compliance control domain, which of the following architectural references apply to Independent Audits?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Audit Assurance & Compliance control domain, which of the following architectural references apply to Information System Regulatory Mapping?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Business Continuity Management & Operational Resilience control domain, which of the following architectural references apply to Business Continuity Testing?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Business Continuity Management & Operational Resilience control domain, which of the following architectural references apply to Datacenter Utilities / Environmental Conditions?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
In the Business Continuity Management & Operational Resilience control domain, which of the following architectural references apply to Documentation?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Network
- Computing
- Storage
- Application
- Data
In the Business Continuity Management & Operational Resilience control domain, which of the following architectural references apply to Environmental Risks?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
In the Business Continuity Management & Operational Resilience control domain, which of the following architectural references apply to Equipment Location?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
In the Business Continuity Management & Operational Resilience control domain, which of the following architectural references apply to Equipment Power Failures?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
In the Business Continuity Management & Operational Resilience control domain, which of the following architectural references apply to Impact Analysis?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Business Continuity Management & Operational Resilience control domain, which of the following architectural references apply to Management Program?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Business Continuity Management & Operational Resilience control domain, which of the following architectural references apply to Policy?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Storage
- Application
- Data
In the Business Continuity Management & Operational Resilience control domain, which of the following architectural references apply to Retention Policy?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Computing
- Storage
- Application
- Data
In the Business Continuity Management & Operational Resilience control domain, which of the following architectural references apply to Equipment Maintenance?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Business Continuity Management & Operational Resilience control domain, which of the following architectural references apply to Business Continuity Planning?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Change Control & Configuration Management control domain, which of the following architectural references apply to New Development / Acquisition?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Change Control & Configuration Management control domain, which of the following architectural references apply to Outsourced Development?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Network
- Computing
- Storage
- Application
- Data
In the Change Control & Configuration Management control domain, which of the following architectural references apply to Quality Testing?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Network
- Computing
- Storage
- Application
- Data
In the Change Control & Configuration Management control domain, which of the following architectural references apply to Unauthorized Software Installations?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Network
- Computing
- Storage
- Application
In the Change Control & Configuration Management control domain, which of the following architectural references apply to Production Changes?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Network
- Computing
- Storage
- Application
- Data
In the Data Security & Information Lifecycle Management control domain, which of the following architectural references apply to Classification?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Computing
- Storage
- Application
- Data
In the Data Security & Information Lifecycle Management control domain, which of the following architectural references apply to Data Inventory / Flows?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Data Security & Information Lifecycle Management control domain, which of the following architectural references apply to eCommerce Transactions?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Network
- Data
In the Data Security & Information Lifecycle Management control domain, which of the following architectural references apply to Handling / Labeling / Security Policy?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Computing
- Storage
- Application
- Data
In the Data Security & Information Lifecycle Management control domain, which of the following architectural references apply to Information Leakage?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Computing
- Storage
- Application
- Data
In the Data Security & Information Lifecycle Management control domain, which of the following architectural references apply to Non-Production Data?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Storage
- Application
- Data
In the Data Security & Information Lifecycle Management control domain, which of the following architectural references apply to Ownership / Stewardship?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Computing
- Storage
- Application
- Data
In the Data Security & Information Lifecycle Management control domain, which of the following architectural references apply to Secure Disposal?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Computing
- Storage
- Application
- Data
In the Datacenter Security control domain, which of the following architectural references apply to Asset Management?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Datacenter Security control domain, which of the following architectural references apply to Controlled Access Points?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
In the Datacenter Security control domain, which of the following architectural references apply to Equipment Identification?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
In the Datacenter Security control domain, which of the following architectural references apply to Off-Site Authorization?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Storage
- Application
In the Datacenter Security control domain, which of the following architectural references apply to Off-Site Equipment?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Datacenter Security control domain, which of the following architectural references apply to Policy?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
In the Datacenter Security control domain, which of the following architectural references apply to Secure Area Authorization?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Datacenter Security control domain, which of the following architectural references apply to Unauthorized Persons Entry?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
In the Datacenter Security control domain, which of the following architectural references apply to User Access?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
In the Encryption & Key Management control domain, which of the following architectural references apply to Entitlement?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Encryption & Key Management control domain, which of the following architectural references apply to Key Generation?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Network
- Storage
- Application
- Data
In the Encryption & Key Management control domain, which of the following architectural references apply to Sensitive Data Protection?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Network
- Computing
- Storage
- Application
- Data
In the Encryption & Key Management control domain, which of the following architectural references apply to Storage and Access?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Governance and Risk Management control domain, which of the following architectural references apply to Baseline Requirements?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Governance and Risk Management control domain, which of the following architectural references apply to Data Focus Risk Assessments?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Computing
- Storage
- Application
- Data
In the Governance and Risk Management control domain, which of the following architectural references apply to Management Oversight?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Governance and Risk Management control domain, which of the following architectural references apply to Management Program?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Governance and Risk Management control domain, which of the following architectural references apply to Management Support/Involvement?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Governance and Risk Management control domain, which of the following architectural references apply to Policy?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Governance and Risk Management control domain, which of the following architectural references apply to Policy Enforcement?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Governance and Risk Management control domain, which of the following architectural references apply to Policy Impact on Risk Assessments?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Governance and Risk Management control domain, which of the following architectural references apply to Policy Reviews?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Governance and Risk Management control domain, which of the following architectural references apply to Risk Assessments?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Governance and Risk Management control domain, which of the following architectural references apply to Risk Management Framework?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Governance and Risk Management control domain, which of the following architectural references apply to Risk Mitigation / Acceptance?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Human Resources control domain, which of the following architectural references apply to Asset Returns?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Human Resources control domain, which of the following architectural references apply to Background Screening?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Data
In the Human Resources control domain, which of the following architectural references apply to Employment Agreements?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Human Resources control domain, which of the following architectural references apply to Employment Termination?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Human Resources control domain, which of the following architectural references apply to Industry Knowledge / Benchmarking?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Human Resources control domain, which of the following architectural references apply to Mobile Device Management?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Human Resources control domain, which of the following architectural references apply to Non-Disclosure Agreements?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Data
In the Human Resources control domain, which of the following architectural references apply to Roles / Responsibilities?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Human Resources control domain, which of the following architectural references apply to Technology Acceptable Use?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Application
- Data
In the Human Resources control domain, which of the following architectural references apply to Training / Awareness?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Human Resources control domain, which of the following architectural references apply to User Responsibility?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Human Resources control domain, which of the following architectural references apply to Workspace?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Data
In the Identity & Access Management control domain, which of the following architectural references apply to Audit Tools Access?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Identity & Access Management control domain, which of the following architectural references apply to Credential Lifecycle / Provision Management?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Identity & Access Management control domain, which of the following architectural references apply to Diagnostic / Configuration Ports Access?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Application
In the Identity & Access Management control domain, which of the following architectural references apply to Policies and Procedures?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Identity & Access Management control domain, which of the following architectural references apply to Segregation of Duties?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Identity & Access Management control domain, which of the following architectural references apply to Source Code Access Restriction?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Computing
- Storage
- Application
- Data
In the Identity & Access Management control domain, which of the following architectural references apply to Third Party Access?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Identity & Access Management control domain, which of the following architectural references apply to Trusted Sources?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Identity & Access Management control domain, which of the following architectural references apply to User Access Authorization?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Network
- Computing
- Storage
- Application
- Data
In the Identity & Access Management control domain, which of the following architectural references apply to User Access Reviews?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Identity & Access Management control domain, which of the following architectural references apply to User Access Revocation?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Identity & Access Management control domain, which of the following architectural references apply to User ID Credentials?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Network
- Computing
- Storage
- Application
In the Identity & Access Management control domain, which of the following architectural references apply to Utility Programs Access?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Network
- Computing
- Storage
- Application
In the Infrastructure & Virtualization Security control domain, which of the following architectural references apply to Audit Logging / Intrusion Detection?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Infrastructure & Virtualization Security control domain, which of the following architectural references apply to Change Detection?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Infrastructure & Virtualization Security control domain, which of the following architectural references apply to Clock Synchronization?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Network
- Computing
- Application
In the Infrastructure & Virtualization Security control domain, which of the following architectural references apply to Information System Documentation?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Network
- Computing
- Storage
- Data
In the Infrastructure & Virtualization Security control domain, which of the following architectural references apply to Management - Vulnerability Management?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Infrastructure & Virtualization Security control domain, which of the following architectural references apply to Network Security?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Infrastructure & Virtualization Security control domain, which of the following architectural references apply to OS Hardening and Base Controls?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Infrastructure & Virtualization Security control domain, which of the following architectural references apply to Production / Non-Production Environments?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Infrastructure & Virtualization Security control domain, which of the following architectural references apply to Segmentation?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Infrastructure & Virtualization Security control domain, which of the following architectural references apply to VM Security - vMotion Data Protection?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Infrastructure & Virtualization Security control domain, which of the following architectural references apply to VMM Security - Hypervisor Hardening?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Infrastructure & Virtualization Security control domain, which of the following architectural references apply to Wireless Security?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Interoperability & Portability control domain, which of the following architectural references apply to each of the 5 controls?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Mobile Security control domains, which of the following architectural references apply to each of the 20 controls?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Security Incident Management, E-Discovery & Cloud Forensics control domain, which of the following architectural references apply to each of the 5 controls?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Supply Chain Management, Transparency and Accountability control domain, which of the following architectural references apply to Data Quality and Integrity?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Supply Chain Management, Transparency and Accountability control domain, which of the following architectural references apply to Incident Reporting?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Supply Chain Management, Transparency and Accountability control domain, which of the following architectural references apply to Network / Infrastructure Services?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Supply Chain Management, Transparency and Accountability control domain, which of the following architectural references apply to Provider Internal Assessments?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Supply Chain Management, Transparency and Accountability control domain, which of the following architectural references apply to Supply Chain Agreements?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Supply Chain Management, Transparency and Accountability control domain, which of the following architectural references apply to Supply Chain Governance Reviews?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Supply Chain Management, Transparency and Accountability control domain, which of the following architectural references apply to Supply Chain Metrics?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Supply Chain Management, Transparency and Accountability control domain, which of the following architectural references apply to Third Party Assessment?
- Physical
- Network
- Computing
- Storage
- Application
- Data
None
In the Supply Chain Management, Transparency and Accountability control domain, which of the following architectural references apply to Third Party Audits?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Physical
- Network
- Computing
- Storage
- Application
- Data
In the Threat and Vulnerability Management control domain, which of the following architectural references apply to Anti-Virus / Malicious Software?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Network
- Computing
- Storage
- Application
In the Threat and Vulnerability Management control domain, which of the following architectural references apply to Vulnerability / Patch Management?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Network
- Computing
- Storage
- Application
In the Threat and Vulnerability Management control domain, which of the following architectural references apply to Mobile Code?
- Physical
- Network
- Computing
- Storage
- Application
- Data
- Network
- Computing
- Application
Name two mechanisms to automate monitoring and testing of cloud supply chains.
- Cloud Audit
- Cloud Trust Protocol