3rd September CISA Class Batch Notes
3rd September CISA Class Batch Notes
3rd September CISA Class Batch Notes
Airline
O
ITGovernance.co.uk
Risk Management
Training Awareness
Do they have a data classification policy to identify sensitive data and apply
controls there ?
Carrying out privacy checks : Carrying our privacy related leaks in your code
Secure Code Review but SCR does not include carrying our privacy checks in the
code.
https://docs.privado.ai/getting-started-with-privado/understanding-the-results
Cloud : Middle East - AWS had a data centre in Bahrain.UAE has a strong data
protection law.
If the company for whom you are doing an audit do they have third party security
audits clause documented in the contract.
https://frsecure.com/resources/
Incident REsponse
BCP
BCP plan
Whether did they undergo any BCP external audit in the last 12 months
Asking a company to share their contract and you are looking any of the security
clause for third parties ?
IF the company is sharing any customer data or their own data with third parties.
If a company is maintaining cloud assets you could ask them for their cloud
inventory and if they have applied patches across their all cloud resources.
Development environment is not to be overlooked.
Breach Management
Look at some specific areas : 1. As an auditor show us your reporting layer and
how the data is getting accessed there and for sensitive data
what security controls have been deployed.
2. ETL layer : What security controls are in place to secure sensitive data ?
3. Whether they are allowing any users to use their personal devices to access
corporate information ?
Usrs Having Access to Microsoft Teams on their personal devices as well.? Look at
developers or sales people and do a random audit of their devices.
Qualitative Risk Analysis : Risk is assessment from human judgement and experience.
Risk Register is a document used to track all going cyber security risks and it
serves as the document for remediation status., new risk.
Mobile devices
Do you have a BYOD policy ? have you defined any controls for the mobile
application ?
If somebody uses a mobile device to what commands have been on the mobile device
for accessing a corporate asset ? Mobile Device Management.
Data at rest , data in transit and data in use ? What security controls deployed ?
1. Data Encryption
Futhermore in Data Storage if you are encrypting the data where are you storing the
encryption key
DAta that you encrypt is encrypted using a key known as DEK ( Data Encryption Key)
and this DEK is further encrypted with another key known as
MK or MEK ( Master Encryption Key)
Data Security
Data Tokenization
Replace actual data with some junk data but behind the scenes when this data will
be used by the application the tokenization
server will replace junk data with actual data. There is some character mapping
done for actual data with some junk
data.
Development
Secure SDLC ?
Secure Monitoring
Data Privacy
Whether user can bypass corporate security controls and cause data leaks
Whether there is a provision for stopping access to Bad websites / Blocked sites
IF you a audit of a healthcare company may be you are not including HIPAA
regulations in the ITGC Audit
List of Questionnaires
Akasa Air Data Breach ?
For the Aviation Sector purely from a overall security point of view
Infrastrucure
Data Governance Policy : In a business what are the areas that generate data .
Passenger Traffic - Generating Data -- Bookings and other things we are storing
that data
CAN network : Controllable Area Network : all those in flight apparatus on the
cockpt
anybody has physical access to this can cause damage.A lot of new feature
s including wireless and bluetooth there are chances of remote accees.
LAPP --
baways.com
Stuxnet
10 to 11 pm IST
Saturday : 5 hrs
Saturday : 5 hrs