CRISC 2022 Domain4
CRISC 2022 Domain4
CRISC 2022 Domain4
Exam Relevance
The content area in this domain
will represent approximately 22% of 22
the CRISC examination (approximately 26
33 questions).
20
32
Domain 1 Domain 2
Domain 3 Domain 4
Topics
Enterprise Architecture
IT Operations Management
Project Management
Enterprise Resiliency
Emerging Technologies
Learning Objectives
Explain the key components of enterprise architecture and the
frameworks used to implement them.
Learning Objectives
Identify factors that can impact security and risk in the
enterprise.
Enterprise Architecture
Enterprise Architecture
Enterprise view of IT shows links between IT and
organizational objectives and produces a view of
current risk and controls to answer four basic
Strategic management of enterprise questions:
information technology begins with an Are we doing the right things?
enterprise-level understanding of the network Are we doing them the right way?
and information architecture. Are we getting them done well?
Are we seeing expected benefits?
Documentation Notation
Process Organization
Maturity Models
Consistent with total quality Goal: To reach an optimizing or
management (TQM) and continuous efficient level of operations through
process improvement (CPI) iteration and refinement
Nonexistent or Operation as
Reaction Integration
Entirely Notional Distinct Functions
CMM Alternatives
1 Some organizations are moving away from the use of maturity models
regarding cybersecurity. This trend originates from the assumption that
greater monitoring means less risk.
10
10
Review Question
During a risk assessment of a start-up enterprise with a bring your
own device (BYOD) practice, a risk practitioner notes that the
database administrator (DBA) minimizes a social media website on
his/her personal device before running a query of credit card account
numbers on a third-party cloud application. The risk practitioner
should recommend that the enterprise:
11
11
IT Operations Management
12
12
IT Operations Management
The risk practitioner should have knowledge of general IT, information security, and
cybersecurity concepts but is not required to be a technical expert.
13
13
It is not easy to detect tampering in network Risk practitioners should be aware of the
devices, point-of-sale terminals, applications risk of purchasing equipment and encourage
and smartphones from numerous countries their organizations to use trusted vendors or
and vendors. suppliers whenever possible.
14
14
Operating Applications
Hardware Software
Systems
15
15
16
17
17
18
18
19
19
Technology Refresh
The age, condition and complexity of technology used by an organization presents a substantial risk factor.
20
IT Operations IT Management
21
21
Configuration Management
22
22
Review Question
An excessive number of standard workstation images can be
categorized as a key risk indicator for:
A. change management.
B. configuration management.
C. IT operations management.
D. data management.
23
23
Virtualization
Instances of emulated hardware
that exist in computer memory
and can do everything physical
computers could do, including
24
24
Control
By keeping the risk register accurate and up to date, the risk practitioner ensures that it is
consistently available as a resource for risk management activities across the enterprise.
25
25
Cloud Computing
Cloud Clients
(web browser, mobile apps, thin clients)
26
26
27
27
Review Question
An enterprise wants to use a cloud solution for its travel booking
system that will store its employees’ information. Which of the
following cloud models presents the lowest risk to the risk
practitioner?
A. Hybrid
B. Private
C. Public
D. Community
28
28
Project Management
29
29
Project Management
A series of tasks that work towards a common purpose with a defined end-state.
2
Undertaken across enterprises Enterprises rely on projects and
and fields to deliver value by programs to execute the
bringing about some specific set decisions of management and
of conditions or outcomes. carry out their business functions.
30
30
31
31
Interim Evaluation
32
Project Failure
Project failure is surprisingly common and may include early cancellation, nondelivery
of expected outcomes or lack of expected value relative to invested resources.
It is important to balance time, quality and Risk practitioners who identify issues in
cost. Skipping steps and cutting corners project planning or execution should
can cause losses and limit opportunities. alert management through portfolio
channels as soon as possible.
33
33
Review Question
During project implementation, a relevant risk that was not previously
identified was discovered. What would be the NEXT step the risk
practitioner would recommend?
A. Update the risk treatment plan and report the risk to management.
C. Add the risk to the risk register and analyze the new risk.
34
34
35
Inefficient processes
Insufficient QA activities
36
36
Project Closeout
Projects unlike programs have a finite life span
37
37
Review Question
A business case developed to support risk mitigation efforts for a
complex application development project should be retained until:
38
38
Enterprise Resiliency
39
39
Enterprise Resiliency
Under the right circumstances, a threat Effective risk management considers the
actor may create effects that have real full spectrum of these possibilities with
business impact, which may range from the goal of creating resiliency across the
minor to catastrophic. enterprise.
40
40
May be established at the enterprise level, by each department or for each process
41
Starts with identifying the strategic business Risk depends on the magnitude of impact
processes for the permanent growth of the to the business if interrupted AND the
business and the fulfillment of the business goals. probability of interruption.
The overall target for enterprise recovery and • HR, data, infrastructure elements and
empowers those people involved in developing, other resources
testing and maintaining the plans. • A list of potential vulnerabilities
• The estimated probability of the
occurrence of these threats
Risk Practitioners should assess the
adequacy and completeness of BCPs, • The efficiency and effective ness of
depending on the levels of risk. existing risk countermeasures
42
42
Includes:
• Manual processing for previously
automated tasks
RPO RTO • Outsourced support
How much data can How quickly the process
be lost in recovery • Use of on-hand inventory in lieu of
must be accomplished
production
• Use of alternate facilities
• Displacement of less critical
Certain processes may be more or less important
at certain times of the month or year. Planning
functions on remaining capacity
should consider this variable prioritization.
43
43
Review Question
Which of the following activities is the MOST important related to
testing the IT continuity plan?
44
44
Disaster Recovery
The reestablishment of business and IT Includes specific information on hardware
services following a disaster or incident within and software requirements for restoration,
a predefined schedule and budget which systems, in what order, how to
accomplish the restorations under multiple
Commonly associated with recovery from an IT scenarios, and how many user logins are
perspective but can be considered a relative of required in what time frames.
business continuity
Examples:
Timeframes specified in the disaster recovery • Files
plan (DRP) are based on the cost and length of • Transactions
outage management is willing to accept • OSs
• Databases
• Patches
Include at least a primary and alternate for every • Configurations
activity and allow a wide variety of staff members • Applications
to complete assigned tasks
45
45
Review Question
Due to changes in the IT environment, the disaster recovery plan of a
large enterprise has been modified. What is the GREATEST benefit
of testing the new plan? To ensure that:
46
46
47
47
Data Management
Implementing a proper and complete data management program ensures the appropriate level of
protections at each stage, including data destruction.
Ensure that data is appropriately protected Store sensitive data in separate networks or on
relative to its value. systems accessible only to authorized personnel
(isolation) using appropriate controls.
Examples include:
Data protection applies to all formats, • Principle of least privilege
regardless of the medium • Role-based access controls
• Separation of duties
• Network segmentation
• Encryption in-transit, at-rest and in-use
Logical Physical People • Data minimization/anonymization
• Nondisclosure agreements
48
48
• Understand purpose and intent • Whitelist or blacklist of data • Changes made will not
of data collected negatively affect the data or
• Whitelisting preferred in
data processing operations
• Classify data (subject to environments based on static
validation) information • Requires control over
permissions and authorization
• Ensure appropriate formatting • Blacklisting preferred in
levels of users or process that
before acceptance or processing environments with broad ranges
can access data and the
of data values
• Detect embedded commands supporting applications
that adversely affect automated
processing systems
49
49
Review Question
The IT department wants to use a server for an enterprise database,
but the hardware is not certified by its manufacturer for the intended
operating system or database software. A risk practitioner determines
that introducing the hardware presents:
50
50
Enterprises that focus on data protection frequently implement specialized software for
data loss prevention (DLP).
These solutions leverage data classification Violations may result in automated alerts,
schemes to determine what controls should mandatory encryption, or other automated
apply to data and apply policies to access, protective actions meant to safeguard the
moved, shared or stored based classification. organization and prevent data loss.
51
51
52
52
Initiation
Disposal Development
Maintenance Implementation
53
53
Risk Identification
54
54
Agile
Work with the project team to identify threats and
determine optimal responses to risk. • Regular releases of a minimum viable product
• Regular engagement with stakeholders for
feedback on deliverables in progress
Distinguish between project risk and risk to enterprise • Helps ensure that projects focus on delivering
ability to achieve its target goals and objectives. what the organization expects or needs
55
55
Review Question
In which phase of the system development life cycle should the
process to amend the deliverables be defined to prevent the risk of
scope creep?
A. Feasibility
B. Development
C. User acceptance
D. Design
56
56
Review Question
Which of the following system development life cycle stages is MOST
suitable for incorporating internal controls?
A. Development
B. Testing
C. Implementation
D. Design
57
57
58
58
New
Technology
59
59
Omnipresent Connectivity
People are more accustomed than ever to using technology in their daily lives.
• Cost beneficial
• Personal devices may be superior to
The Internet
company provisioned devices
of Things (IOT)
• Considered a form of risk sharing
• Should be subject to controls
60
60
Review Question
When evaluating risk related to Internet of Things (IoT) devices used
on enterprise networks, which of the following would the risk
practitioner recommend addressing FIRST?
61
61
• Safeguards data if accessed • Manufactured audio and • Reduced storage costs and
by an unauthorized third- video created using digitally increased connectivity led to
party manufactured imitations of large expansion in data
a person based on samples volume
• Increases in available
computing power allows • Difficult to distinguish • Data analysis is necessary
individuals to more easily for many enterprises
• Poses challenges to
attempt to break encryption enterprises that require • Enterprises must consider
verbal approval impact of privacy
62
62
Blockchain
63
63
Artificial Intelligence
As machines become increasingly capable of processing logical decision matrices,
the parameters for intelligence tend to exclude what is accomplished, so that
artificial intelligence (AI) is sometimes seen as an unattainable standard.
In 1950, a computer was Today, computers can Distinction between human and
considered intelligent when accomplish tasks that mimic rational response and any rules
able to engage in behavior human behavior within narrow that can be positively verified
indistinguishable from a human constraints can also be exploited
If improvement is poorly
Decision trees and use cases Oversight of AI especially
defined, iteration to refine
are subject to testing aligned important in cases involving
outcomes results in lasting
with the potential impacts machine learning (ML)
deviation from goals.
64
64
Break
65
66
66
Consider:
• Training for users and administrators
The risk practitioner should ensure
• Creation of policies and procedures
the risk assessment and response
program: • Inclusion of systems in backup schemes and
continuity plans
• Evaluates new technology
• Assignment of risk ownership
• Provides effective advice on how
to deploy • Consent of information owners for any technology
that may handle sensitive information
• Directs use within acceptable risk
boundaries • Review of legal or regulatory requirements
• Assignment of responsibility for monitoring and
reporting on proper technology use
67
67
System Ownership
68
Review Question
Which of the following is the MOST important requirement for setting
up an information security infrastructure for a new system?
69
69
70
70
Legacy systems often require special attention because of gaps between their
designs and current security standards.
Risk Actions
• Can lack security features entirely • Work with the risk owner to create an
• Contain features misaligned with observed acceptable level of risk.
threats • Compensating controls may be effective
• More susceptible to failure as a result of supplements to existing security where
aging conventional improvements are either
• Options are limited due to cost of replacing technically infeasible or cost prohibitive.
or upgrading.
71
71
Review Question
An enterprise recently developed a breakthrough technology that
could provide a significant competitive edge. Which of the following
FIRST governs how this information is to be protected from within the
enterprise?
Encryption standards
72
72
Information security is the protection of information and information systems from risk events.
73
Integrity
Confidentiality
The accuracy and completeness of information
in accordance with business values and
expectations
Security
Availability
74
74
Review Question
Which of the following business requirements BEST relates to the
need for resilient business and information systems processes?
A. Effectiveness
B. Confidentiality
C. Integrity
D. Availability
75
75
Nonrepudiation
A positive guarantee that a given action was carried out by a given individual or process and is
an important part of tracing responsibility and enforcing accountability.
The risk practitioner should seek evidence of nonrepudiation in situations where actions could
have significant impact on an enterprise
76
76
System Authorization
• Determine the security of design, • Official decision by the senior • May operate the system
development, testing, deployment manager granting approval for according to restrictions or time
and operations operational use period granted
• Examine aspects of mitigating • Explicit acceptance of risk • Any substantial changes in the
controls in parallel with SDLC documented in evaluator’s report system or enterprise risk profile
may require new evaluation and
• Provide report to senior • Can come with caveats (time reauthorization of the system if
management recommending restrictions, in-progress updates) not continuously monitored
whether to authorize the system
77
77
Review Question
An information system that processes weather forecasts for public
consumption is MOST likely to place its highest priority on:
A. nonrepudiation.
B. confidentiality.
C. integrity.
D. availability.
78
78
Segregation of Duties
A basic internal control that prevents or detects errors and irregularities by assigning
separate individuals the responsibility certain tasks using mutual exclusivity.
79
79
Drawbacks
• Decreased efficiency during times of transition
• Employees with broader skill sets may be
more attractive to other employers • Less diligent employees
80
80
Authentication Methods
Method Challenges Good Practices
Knowledge
Subject to replay attacks. Encourage users to change
Password, code phrase or Less secure over time as they passwords on a regular basis.
other secret value can be figured out eventually.
Possession
Physical items can be damaged, Check for workarounds that
Item such as smart card, lost or stolen. Legitimate users can represent vulnerabilities.
token, code or ID badge can be denied access.
81
81
Review Question
The BEST control to prevent unauthorized access to an enterprise’s
information is user:
A. accountability.
B. authentication.
C. identification.
D. access rules
82
82
Isolation
Prevents a user from using account privileges at times when they are not required and
allows an organization to maximize the effectiveness of its controls by reducing the
potential scope of monitoring.
83
83
Encryption
Mathematical means of altering data from a readable form into an unreadable form in a manner
that can be reversed by someone who has access to the appropriate numeric value (key).
84
84
Review Question
Which of the following controls BEST protects an enterprise from
unauthorized individuals gaining access to sensitive information?
85
85
86
86
Digital Signatures
Only a message that is both Digitally signing a message Public key encryption
signed and encrypted is: applies encryption only to ensures that the holder of a
• protected against the digest and does not private key can decrypt what
unauthorized viewing make the message content is encrypted with the
• guaranteed to have arrived confidential. corresponding public key.
in the form that it was
originally sent A message may be: However, it does not prove
• known to have originated • Encrypted and not signed that the person who owns the
from the person who claims • Signed and not encrypted public key being distributed is
to have sent it. • Signed and encrypted who he or she claims to be.
87
87
Certificates
Certificates link public keys with specific owners by relying on the
endorsement of a trusted third party known as a certificate authority (CA).
88
89
89
Making human users more resilient to the tactics • Provide methods of alerting internal
of threat actors is a major purpose of security security response capabilities
awareness and training programs. • Outline policies and regulatory
requirements
• Incorporate role-based training
Educate and train the workforce on proper tenets • Implement ethical phishing email
of information and cybersecurity to counter the exercises
risk.
90
90
91
91
Review Question
Despite a comprehensive security awareness program annually
undertaken and assessed for all staff and contractors, an enterprise
has experienced a breach through a spear phishing attack. What is
the MOST effective way to improve security awareness?
92
92
93
93
Privacy is a dynamic field subject to regular changes and that rules applicable to certain contexts
may conflict with those that apply to other contexts, including geography and types of data.
Japan
GDPR CPRA GLBA Act
Australian
HIPAA PIPEDA LGPD
Privacy Act
Consider each set of laws and regulations specific to a given context and strive to maintain
awareness of new or changing regulations.
94
94
Minimization Destruction
95
95
Limit access to information subject to privacy Where specific jurisdictional security requirements
considerations to those with valid business exist, risk practitioners should ensure that these
need using the principle of least privilege are addressed by appropriate security control
96
96
Review Question
Which of the following would create the GREATEST benefit for an
enterprise deploying new IT infrastructure processing personal data?
A. Privacy by design
B. Privacy notices
C. Data encryption
D. Data classification
97
97
IT Operations Management
Project Management
Enterprise Resiliency
Emerging Technologies
98
98
Course Summary
99
99
Course Summary
Domain 1: Domain 3:
Governance Risk Response
Domain 2: and Reporting Domain 4:
IT Risk Information
Assessment Technology and
Security
100
100