Certified Authorization Professional (CAP) Exam Guide Questions and Answers 2024
System Authorization - Risk management process that helps in assessing risk associated with a system and takes steps to mitigate the vulnerabilities to reduce risk to an acceptable level. System authorization was formerly known as Certification and Accreditation used to ensure that security controls are established for an information system. Risk Management - A process of identifying, controlling, and extenuating IT system related risk. It includes risk assessment, analysis of cost benefit, selection, implementation, test and measurement of security controls. Certification and Accreditation - The process of implementing information security. It is a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system is in operation. C&A is extensively used in the Federal Government. Four New Process Models - - Frame - Assess - Respond - Monitor What are the 6 RMF Steps - Step 1 - Categorize Step 2 - Select Step 3 - Implement Step 4 - Assess Step 5 - Authorize Step 6 - Monitor Benefits of system authorization - System authorization provides benefits to organizations, some of which are as follows: •It helps in maintaining the visibility of the information technology security program by drawing attention to it at multiple organization levels. •It allows management to prove that it is doing the right thing in protecting its assets, and providing a process for meeting requirements and managing risk. •It provides a means for integrating security across all of its computer systems, allowing consistency in the implementation of security controls. •It ensures that minimum security control requirements are met. •It saves effort and resources by consolidating individual processes into an integrated program. Elements of an enterprise system authorization program - A system authorization program consists of a wide variety of people, processes, and technologies. Each of these various elements is important. The key elements of an enterprise system authorization program are as follows: •The Business Case: A strong business case is required for the establishment of an enterprise system authorization program. The business case describes the reasons why the program is required for the organization. •Goal Setting: Goals and objectives for the program must be established and effectively communicated across the enterprise. •Tasks and Milestones: It is very important that the program manager of the SISO establish tasks that need to be performed and a schedule for their completion. •Program Oversight: The execution of the system authorization program must be regularly measured to ensure that it is being implemented effectively. It is also important to ensure that established program requirements are being met. •Visibility: The system authorization program requires visibility of the SISO. The SISO needs to work hard to maintain management support by discussing frequent updates on program status, needs, and benefits. •Resources: Funds play a vital role in an effective system authorization plan. It is important to revise the budget of system authorization plan as per the requirement. System Authorization Plan - The creation of System Authorization Plan (SAP) is mandated by System Authorization. System Authorization Plan (SAP) is a comprehensive and uniform approach to the System Authorization Process. It consists of four phases: •Phase 1 - Pre-certification •Phase 2 - Certification •Phase 3 - Authorization •Phase 4 - Post-Authorization Guidance on organization-wide risk management - NIST SP 800-37 (Revision 1) is designed to provide guidance on managing risk at the information system level. It facilitates guidelines for applying the Risk Management Framework to federal information systems to include conducting the activities of security categorization, security control selection and implementation, security control assessment, information system authorization, and security control monitoring. NIST pays attention to anchoring its system-level guidance to a framework that examines risks at various organizational levels. It discusses that risk-related concerns are addressed at the enterprise or organization level, the mission and business process level, as well as the information system level. Multitiered Risk Management - Tier 1 - The organization level is Tier 1, and it addresses risks from an organizational perspective. It includes the following points: •The techniques and methodologies an organization plans to employ to evaluate information system-related security risks.
Geschreven voor
- Instelling
- Certified Authorization Professional
- Vak
- Certified Authorization Professional
Documentinformatie
- Geüpload op
- 2 maart 2024
- Aantal pagina's
- 11
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
cap exam
-
certified authorization professional cap exam
-
certified authorization professional
Voorbeeld van de inhoud
Ook beschikbaar in voordeelbundel