Identify Possible Controls ( For Residual Risk)
Residual risk is the risk that remains to the information asset even after the existing control has been applied.
Three general categories of controls
· Policies
· Programs
· Technologies
3 Policies
· General Security Policy
· Program Security Policy
· Issue Specific Policy
· Systems Specific Policy
4 Programs
- Education
- Training
- Awareness
- Security Technologies
Access Controls
- Specially addresses admission of a user into a trusted area of the organization.
- Eg: Computer rooms, Power Rooms.
- Combination of policies , Programs, & Technologies
Types of Access controls
Mandatory Access Controls (MACs)
Give users and data owners limited control over access to information resources.
Nondiscretionary Controls
Managed by a central authority in the organization; can be based on individual’s role (role-based controls) or a specified set of assigned tasks (task-based controls)
Discretionary Access Controls ( DAC)
Implemented at discretion or option of the data user Lattice-based Access Cont
Variation of MAC - users are assigned matrix of authorizations for particular areas of access.