CISM

Course
Time
8 hours 39 minutes
Difficulty
Intermediate
CEU/CPE
9

Video Transcription

00:02
so the definition of thes terms thes air. All administrative controls, like I've mentioned
00:07
and administrative controls come from management policies, procedure standards and guidelines. And just like other types of controls, they could be preventive. They can be deterrents. They can be corrective or detective or so on.
00:22
So when we talk about segregation of duties or separation of duties or separation of roles,
00:28
don't get married to the terms, get married to the ideas, right? So however, they're gonna refer to this idea of separation of duties, What we're trying to do is preventing
00:39
a single person from having too much power,
00:42
too much knowledge on the network.
00:45
We don't want a network administrator. We want a network administrator group each one with Sefer, separate rights and privileges.
00:53
Otherwise, we had somebody that has ultimate control over the network.
00:58
Um, segregation of duties means we don't have the person that prints the paycheque, signed the paycheck.
01:03
Otherwise, you know somebody could commit fraud.
01:07
All right, Job rotation Job rotation is a detective control. Segregation of duties we just talked about was a preventive control.
01:17
So the idea is we're gonna prevent anyone from being too powerful
01:19
with job rotation. Well, this so it's a detective control. It can also have the purpose of cross training and providing redundancy for employees. So that's a good thing, too,
01:32
but we'll probably see it on the exam is more of a detective mechanism.
01:37
So if your database administrator one after six months, you go and you administer database, too,
01:42
and then I step in behind you. In that way, we have a means of determining, if anything, fraudulence going on. So job rotation,
01:52
mandatory vacations associate that with the banking industry, and they're probably a couple of others. But that's where I've seen it.
02:00
So the bank is coming up a couple 100 bucks short every week, week after week after week. So one Monday morning, the bank manager comes to me and says, Kelly, you look tired.
02:13
Why don't you have a 14 day vacation where you get out of the office?
02:17
You don't check your email. You don't contact anyone at the bank, you know, access any files. You don't show up on physical premises. You are totally banned from anything having to do with this bank for 14 days. You go have a good time.
02:35
Well, of course, What they're doing is they're looking at how things operate without my presence versus how they operate with my present.
02:42
And I know many of us see mandatory vacations and they think I wish that was me. I feel that way sometimes, too. But it's in the financial industry, usually banking,
02:53
all right, dual control and then em of in control.
02:58
Sometimes we have actions so significant on the network
03:02
that we don't trust a single entity to do those,
03:06
you know, even in a trusted admin.
03:08
You know, think about recovery of private keys. If your private, he gets corrupted, that's okay, cause their archives.
03:15
But if any single individual is able to recover your private key will, then your private key is compromised, really?
03:23
Right. And the possibility of someone you know framing you for an activity or whatever that may be exists. And remember forever trying to get a conviction in criminal court.
03:36
We want beyond a reasonable doubt.
03:38
So rather than having a single administrator be able to recover keys, maybe we have two administrators and dual control, and we both have to enter our password in order for a key to be recovered.
03:51
It's much less likely that two of us are colluding to frame an individual.
03:55
And that starts to build up,
03:58
you know, getting beyond that reasonable doubt.
04:00
Now the problem with dual control, technically, is that you and I, whoever's named, would both have to be there.
04:08
Well, what if I'm sick that you're you're sick that day? You're often vacation.
04:13
So instead, MFN gives us a little bit more flexibility m and n or just variables.
04:17
And ultimately, what we're looking at, there is,
04:21
um, maybe out of seven network admin cz three have to be present
04:27
four out of eight. Whatever that may be, the variables don't matter. But the benefit there's we have many total at Mons.
04:33
Any three or any six or whatever it is would have to be there, so it's less bound to an individual
04:42
secure state.
04:43
Secure state means things should fail in such a way. Specifically, this applies to systems. A system should fail in such a way, no further compromise can happen.
04:54
Have you seen the beloved blue screen of death?
04:57
Blue screen of death means there's been a failure,
05:00
and it fails in such a way that you can't do anything else And that's defending
05:05
principle and lead of Lise privilege and need to know Lise Privileges about action. Need to knows about Gabby.
05:13
I won't let users install applications. That's principle of Lise privy.
05:17
If you're not in the sales team, you don't get access. The sales folder
05:21
that's need to know
05:24
are acceptable use policies where senior management lays out the expectations for how company resource is will be used.
05:31
Can you browse the Internet on company time on company system?
05:36
Maybe, Maybe not sin the acceptable use policy.
05:41
Can I make personal phone calls on the telephones? Can I print a personal material to the printer
05:46
so all of those things should be spelled out?
05:50
And the data ownership and system ownership
05:55
who owns the data?
05:56
And that's not always clear.
05:58
And if we don't have a clear data owner,
06:01
then how in the world are we gonna have a data owner that enforced that determines classifications?
06:06
If there's a conflict across department,
06:10
so there should be a well document process in place to determine who the owner of data is as well as the system, because they're the ones that dictate
06:18
section mechanisms

Up Next

CISM

Cybrary's Certified Information Security Manager (CISM) course is a great fit for IT professionals looking to move up in their organization and advance their careers and/or current CISMs looking to learn about the latest trends in the IT industry.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor