15. Exercise: Frameworks in Practice
Below is an excerpt from a basic completed risk framework. Review the excerpt and keep it in mind when answering the questions below.

Risk Management Framework Matching
QUIZ QUESTION::
Match the statements below to the appropriate part of a risk management framework.
ANSWER CHOICES:
Statement |
Parts of the framework |
---|---|
A statement that segregation of duties does not exist within the database management function and could cause data leakage |
|
An assessment that exploitation of an operating system vulnerability would result in "minimal" damage. |
|
A statement that temporary passwords are all initially set to the same password which could result in account hijacking. |
|
An assessment that the residual risk of allowing unsigned SMB traffic is "medium" given an assessment of the likelihood and impact of the vulnerability. |
|
"Database Security" used as a convention for grouping several risk statements. |
|
A plan to implement continuous firewall monitoring to address a number of risks associated with an organization's firewalls. |
|
A firewall which disallows all ingress traffic other that port 443 |
SOLUTION:
Statement |
Parts of the framework |
---|---|
A plan to implement continuous firewall monitoring to address a number of risks associated with an organization's firewalls. |
|
An assessment that the residual risk of allowing unsigned SMB traffic is "medium" given an assessment of the likelihood and impact of the vulnerability. |
|
"Database Security" used as a convention for grouping several risk statements. |
|
A statement that segregation of duties does not exist within the database management function and could cause data leakage |
|
A statement that temporary passwords are all initially set to the same password which could result in account hijacking. |
|
A statement that segregation of duties does not exist within the database management function and could cause data leakage |
|
A statement that temporary passwords are all initially set to the same password which could result in account hijacking. |
|
A firewall which disallows all ingress traffic other that port 443 |
|
An assessment that exploitation of an operating system vulnerability would result in "minimal" damage. |
Risk Management Framework Matching
QUIZ QUESTION::
Match the statements below to the appropriate part of a risk management framework.
ANSWER CHOICES:
Statement |
Parts of the Framework |
---|---|
"Encryption Management" used as a convention for grouping several risk statements. |
|
An assessment that it is unlikely that an attacker could social engineer their way into an organization's data center. |
|
A procedure which details appropriate steps for users to change their system passwords. |
|
A statement that database tables contain information about different customers in the same table which might result in data leakage. |
|
A plan to address multi-factor authentication deficiencies by Jun 18th. |
SOLUTION:
Statement |
Parts of the Framework |
---|---|
A procedure which details appropriate steps for users to change their system passwords. |
|
A plan to address multi-factor authentication deficiencies by Jun 18th. |
|
An assessment that it is unlikely that an attacker could social engineer their way into an organization's data center. |
|
"Encryption Management" used as a convention for grouping several risk statements. |
|
A statement that database tables contain information about different customers in the same table which might result in data leakage. |