ISMS
Access
SDLC
Operations
Communications
100
What clauses of ISO 27001 required a risk assessment? 

Clause 6 and Clause 8

100

Name 5 systems we would care about testing when it comes to access control. 

Examples: Active Directory (Network), AWS (Infrastructure), O365 or G-Suite (Network), Source Code Repo

100

What SDLC methodology do most of our clients follow? 

DevOps or Agile

100

Why should dev, test, and production environments be separated? 

Development, testing, and operational environments should be separated to reduce the risks of unauthorized access or changes to the operational environment.


100

When considering the security of electronic messaging (13.2.3) what are 2 things to consider? 

Page 52 of ISO 27002:

- Authentication and Access

- Protecting messages from modification 

- Correct addressing and transportation

200

What clause requires that you identify interested parties and what are examples? 

Clause 4. Examples include internal stakeholders such as executives and external stakeholders such as clients. 

200

In control 9.4.5 what are examples of tools that can "control program source code"? 

Any tools that are used to check code in or out such as: Subversion (SVN), Github, GitLab, MSTFS
200

When inspecting SDLC documentation, what are aspects of the SDLC you would look for in a change ticket? 

Evidence of: Development, Testing, QA, Approval before promotion to production

200

What are 3 considerations for the "management of technical vulnerabilities" in clause 12.6.1? 

Page 47 of ISO 27002. Examples include:

- How to scan/identify vulnerabilties

- Roles (who will scan, who will fix)

- Identifying assets that need management

- How to patch

200

Who are confidentiality or non-disclosure agreements applicable? 

External parties or employees of the organization (page 53 of ISO 27002)
300

Who are the governing bodies for ISO 27001 certification in the US and the United Kingdom? 

US - ANAB

UK: UKAS

300

In control 9.4.4 what are examples of "privileged utility programs"? 

Programs that might be capable of overriding system and application controls.


300

In control 14.2.6 it requires "secure development environment". What are examples of a secure development environment? 

See ISO 27002 implementation guidance items a-j on page 60. 

300

What are examples of things one would expect to see in capacity management monitoring? (12.1.3)

System Usage, Current and future capacity needs, Deletion of obsolete data, optimization of batch processes (see 12.1.3 on page 40 of ISO 27002)

300

What is network segmentation and why is it important? 

Segmentation divides a computer network into smaller parts. The purpose is to improve network performance and security.

400

During the external audit, when is the ISMS typically tested by the auditor? 

During Stage 1

400
In control A.9.4.2 what are examples of "secure log-on procedures"? 

Where strong authentication and identity verification is required, authentication methods alternative to passwords, such as cryptographic means, smart cards, tokens or biometric means, should be used.


400

What resource does risk3sixty have available to learn more about DevSecOps/Security in the SDLC? 

Our DevSecOps whitepaper. 
400

In AWS, what are examples of event logging toolsets? 

AWS Cloudwatch, Datadog, many others

400

When considering "Network Security" what are three systems we often consider? 

- Active Directory

- G-Suite

- MS365

500

Which clause requires that security teams create a "strategic roadmap" for information security? 

Clause 6.2

500

What are example administrative accounts and or groups in Active Directory? 

Administrator, Admin, Enterprise Admins, Schema Admins

500

In control 14.1.3 what are examples of how one can "protect application services transactions"? 

Encryption in transit leveraging a trusted authority (such as digital certificates)

500

What are 3 best practices to secure endpoint devices?

- Standard secure hardening configurations

- Use of an MDM

- Antivirus/Malware

500

What are effective techniques to secure data in transit? 

Encryption such as HTTPS, TLS 1.2, or SSL
M
e
n
u