EANx wrote: » They apply specifically to the Federal government but trickle down to corporate. You'll want to start poking around the NIST 800 series documents. I'd start off with 800-37 and 800-53. You can access the NIST directory of publications at https://csrc.nist.gov/publications/search?requestserieslist=1&requeststatuslist=1,3&requestdisplayoption=brief&itemsperpage=100&requestsortorder=5
infosec123 wrote: » What is the risk here and what do you do? edit: please, no one reply with what you would do, let OP try.
Cyber_space wrote: » I like the question posed. I’ve experienced a number of those scenarios. Can I point out one thing I noticed. OP mentioned getting into GRC but the answered from an engineering standpoint. I would say to look at this from a GRC viewpoint as all risk aren’t solved by technical means.
--chris-- wrote: » This ^ GRC is (from my short experience working in/with/near it) is focused on applying organizational standards, identifying and minimizing risk and working with IT, dev, others towards compliance with a standard like PCI, GLBA, HIPPA, etc...less technical, which may be why OP is having a hard time finding examples. I work in a smaller shop (6 IT total). I handle all of the "security" branded work, including policy creation, due dilligence & risk ID (and the steps associated with management of it). The best way to learn what and how this stuff works would be to find a policy (like this: https://www.sans.org/security-resources/policies/general#clean-desk-policy) and think of somewhere you have worked and how it would apply (and how users would adapt to it, or fail to adapt to it, how mgmt would resist or adhere, etc...). You can find many sample policies here:https://www.sans.org/security-resources/policies/
--chris-- wrote: » This ^ GRC is (from my short experience working in/with/near it) is focused on applying organizational standards, identifying and minimizing risk and working with IT, dev, others towards compliance with a standard like PCI, GLBA, HIPPA, etc...less technical, which may be why OP is having a hard time finding examples
kiki162 wrote: » @kabooter What's your background/experience? It's not that hard to translate some of these compliance controls into real life examples. If you are in an interview, the first thing you want to know is the product. So if Company A that you are interviewing for has a cloud product, you would need to understand the network architecture setup. Does it have a firewall, WAF, proxies, data encryption, etc. It's very possible that you don't have the knowledge / experience yet. The biggest thing is to understand the concepts. One good place to start is NIST 800-53, and do a search by Family at the top. For Access Control, you'll see different stuff like Least Privilege, Separation of Duties, Remote Access, etc. One easy one would be Unsuccessful Logon Attempts. So if Company A has a Windows domain, and they want to ensure that Unsuccessful Logon Attempts are being logged and prevented. What would need to be done in order for Company A to be "in compliance" with that control. Start by looking at FEDRAMP, SOC2, and CSA STAR.