• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

D320 (C838) Laws, Regulations, and Organizations

Latest WGU Jan 12, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

D320 (C838) Laws, Regulations, and Organizations 5.0 (5 reviews) Students also studied Terms in this set (105) Western Governors UniversityD 281 Save WGU Course C838 - Managing Clou...1,037 terms WieldyStone2 Preview D320 - Managing Cloud Security 701 terms SpaceChimpanzee Preview D337 - Internet Of Things and Infras...408 terms SpaceChimpanzee Preview CompT 170 term Jaiv (ISC)2 - International Information System Security Certification Consortium A security certification granting organization that has a long history of certifications that were difficult to get. This difficulty has made their certificates seen as having higher value in the industry.(ISC)2 Cloud Secure Data Life CycleBased on CSA Guidance. 1. Create; 2. Store; 3. Use; 4. Share; 5. Archive; 6. Destroy.(SAS) 70_____ was a recognized standard of the American Institute of Certified Public Accountants (AICPA) in response to the issues that also lead to Sarbanes-Oxley (SOX). Deprecated in 2011 by the Statement on Standards for Attestation Engagements (SSAE) No. 16.AICPAestablished SAS 70 and later SAAE 16.AICPAAmerican Institute of Certified Public Accountants Organizational Normative Framework (ONF)Concepts of ISO 27034. There is only one _____ for an organization but potentially as many ANF's as applications.ASHRAE - American Society of Heating, Refrigerating and Air-Conditioning Engineers a professional association seeking to advance heating, ventilation, air conditioning and refrigeration systems design and construction.Bibaan access control model designed to preserve data integrity. It has 3 goals.Maintain internal and external consistency; prevent unauthorized data modification even by authorized parties; prevent data modification by unauthorized individuals.

Capability Maturity Model (CMM)a development model where the maturity relates to the formality and optimization of processes. When applied to cloud security it would focus on those aspects as they relate to cloud security.Child Online Protection Act (COPA)An attempt to restrict access by minors to material defined as harmful to minors. A permanent injunction against the law in 2009.Cloud Access Security Brokers (CASBs)monitors network activity between users and cloud applications and enforces security policy and blocking malware.Cloud Security Alliance (CSA)publishes the Notorious Nine: 1) Data breaches; 2) Data Loss; 3) Account service traffic hijacking; 4) Insecure Interfaces and APIs; 5) Denial of Service; 6) Malicious Insiders; 7) Abuse of Cloud Services; 8) Insufficient Due Diligence; 9) Shared technology Vulnerabilities. There are also implications and controls associated with each.CSA STAR - Cloud Security Alliance (CSA) Security, Trust, and Assurance Registry (STAR) _______ uses the Consensus Assessments Initiative Questionnaire (CAIQ), Cloud Controls Matrix (CCM), and GDPR Self-Assessment as inputs to certify an organization to Level 1.Level 2 integrates the CSA Cloud Controls Matrix and the AICPA Trust Service Principles - AT 101 for STAR attestation.STAR Certification for level to uses the CSA Cloud Controls Matrix and the

requirements of the ISO/IEC 27001:2013 management system standard together

with the CSA Cloud Controls Matrix.Certification certificates follow normal ISO/IEC 27001 protocol for a 3rd party assessment.Cloud Security Alliance Cloud Controls Matrix (CSA CCM) Composed of 17 domains covering key elements of cloud. It contains 170 objectives within the domains. They integrate with the STAR program.COBIT or Control Objectives for Information and Related Technologies a framework for IT governance and management. Initially used to achieve compliance with Sarbanes-Oxley and focused on IT controls. Since 2019 the emphasis has shifted to information governance. It is focused on these 5 principles: 1: Meeting Stakeholder Needs; 2: Covering the Enterprise End-to-End; 3: Applying a Single Integrated Framework; 4: Enabling a Holistic Approach; and

5: Separating Governance from Management.

Common Criteria and the EALis assigned to an IT product after it has been evaluated by an independent lab.The level indicates the degree and type of testing with 1 the least and 7 the most._____ contains 60 functional requirements in 11 classes and is an accepted standard among the military organizations of the US and many allies.Consensus Assessments Initiative Questionnaire (CAIQ) an initiative of the Cloud Security Alliance to provide an industry-accepted documentation of security controls and as of 2020 is combined with the Cloud Controls Matrix.They can be used as evidence for entry to the CSA STAR registry.Digital Millennium Copyright Act (DMCA)controversial act intended to align the US copyright act with the requirements of treaties and the World Intellectual Property Organization.

DLP (Data Loss Prevention)is ensured by a set of tools, procedures, and policy to ensure sensitive, proprietary, and PII is not lost or misused. It helps to provide compliance with numerous laws and compliance requirements by enforcing preventative and detective measures in the organization.ENISA - European Union Agency for Cybersecurity a Cyber Security awareness association that provides support, information, and collaboration on security issues. They also publish a top x threats each year. The last few years they have included 15 threats each year.EU Data Directiveregulates the processing of PII in the EU. Since it is a directive, each country must pass the laws that establish how each country will enforce the directive. It includes the 7 principles governing the OECD's recommendations for protection of personal data.Eurocloud Star Audit Certification (ESAC)a nonprofit organization that maintains information security standards or best practices and provides assessments and certification of compliance.ENISAEuropean Union Agency for Network and Information Security Family Education Rights and Privacy Act (FERPA) a Federal law that protects the privacy of student education records. It applies to all schools that receive funds under an applicable program of the U.S.Department of Education.Federal Information Processing Standard (FIPS) 140-2 mandatory for all US government, military, contractors doing business with the government and regulated industries such as financial and health-care institutions.____ has four levels with 1 being the lowest level of security through 4 as the highest. Testing under ____ is done by 23 accredited Cryptographic Module Testing laboratories.Federal Information Systems Management Act (FISMA) a US law that makes mandatory requirements for federal agencies to develop, document, and implement management cyber security. NIST plays a major role in implementing ____ and has promulgated numerous security standards and guidelines. One key guideline is the Risk Management Framework (RMF). Office of Management and Budget (OMB) monitors compliance with NIST programs.FCoE (Fibre Channel over Ethernet)a data transfer protocol used to connect servers to Storage Area Networks (SAN) in data centers. It typically runs on fiber optic cables but can also run on copper.Data rates range from 1 to 128 gigabit/sec.FIPS 140-2Used for protecting sensitive but unclassified information by the federal government. The standard provides four increasing, qualitative levels of security: Level 1, Level 2, Level 3, and Level 4.Cryptographic Module Validation Program (CMVP) validates cryptographic modules to Federal Information Processing Standard (FIPS) 140-2 and other cryptography-based standards such as CMVP.CMVPa joint effort between NIST and the Communications Security Establishment (CSE) of the Government of Canada. Products validated as conforming to FIPS 140-2 are accepted by the Federal agencies of both countries.

GDPR - General Data Protection Regulationgives individuals control over their personal data. It also simplified regulation by forcing all member states to comply with a single regulation. ____ specifies rights of the data subject, including access rectification, erasure, object to use of PII. It poses requirements on data controllers and data processors.Generally Accepted Privacy Principles described by the

AICPA (GAPP)

agreed upon by 23 countries in response to investors and regulators concerned about transparency, independence, and governance of the accounting industry. It was based on 24 principles in the areas of legal, institutional, and investment and risk.Gramm-Leach-Bliley Act (GLBA)requires companies that offer financial products or services to safeguard sensitive data about customers and inform the customers of those requirements.Health Insurance Portability and Accountability Act

(HIPAA)

modernized healthcare information and stipulated how PII kept by healthcare and healthcare insurance industries should be protected. The act was vague HITECHact that motivated the implementation of electronic health records (HER) and the supporting technology. Some penalties for non-compliance of HIPAA were increased under ____, as well as establishing breach notification to impacted patients.IDCA or International Data Center Authority____ is attempting to be "the ultimate standardization, education, and certification body for the Application Ecosystem and its supporting digital infrastructure, helps deliver comprehensive, effective, up-to-date and uniquely innovative data compliance audits. The Application Ecosystem and digital infrastructure audits." Auditors certified by ____ will engage with cloud providers to assess their compliance to ____ Grade Levels.International Standards Organization (ISO)an international standards body composed of representatives from various standards organizations.Internet Small Computer System Interface (iSCSI) a storage networking standard used to link data storage to systems using the Internet Protocol (IP).ISO/IEC 27001Standard on managing Information Security. It includes requirements for establishing , implementing, maintaining, and continually improving information management.ISO/IEC 27002provides best practices on information security controls for those attempting to be ISO/IEC 27001.ISO/IEC 27017created to supplement ISO/IEC 27002 to provide additional security controls for the cloud.ISO/IEC 27034-1mandates a framework for application security within an organization.ISO/IEC 28000:2007a standard for ensuring security assurance in the supply chain.

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

The practical examples offered by this document enhanced my understanding. A excellent purchase!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 12, 2026
Description:

D320 (C838) Laws, Regulations, and Organizations 5.0 (5 reviews) Students also studied Terms in this set Western Governors UniversityD 281 Save WGU Course C838 - Managing Clou... 1,037 terms Wieldy...

Unlock Now
$ 11.00