2025/2026
Key Areas of Concern to Protect - Answers 1. Access control
2. Encryption status
3. Review polices/standards for equipment
4. Collection limitation
5. Minimum necessary access
6. Training assessments
7. Previous audit results
8. Third party access
9. Vendor contracts
What privacy functions are valuable in mitigating a data breach - Answers 1. Data inventory and
mapping
2. Data minimization
3. Privacy impact assessments
4. Privacy policies
Building Information Security - Answers 1. Identify risk
2. Select and implement measures to mitigate risk
3. Track and evaluate risk (to validate the first two steps)
Information Security Controls - Answers 1. Administrative Controls
2. Physical Controls
3. Technical Controls
Role-based information security access control - Answers 1. least privilege
2. Need-to-know or access
3. Segregation of duties
User access management IS access control - Answers 1. Formal process for access
granting/removal