02. Information Asset Identification and Classification Flashcards
Information Asset Identification and Classification
Assets are things of value that an organisation protects in an information security program, and include…
- Information Systems Hardware
- Software
- Virtual Assets
- Information
- Facilities
- Personnel
- Servers, laptops, tablets etc..
- Operating systems, subsystems, applications etc…
- Operating system guests, containers etc..
- Databases, PII etc..
- Data centers, development centers etc..
- Staff
203
Asset Identification and valuation
After security leadership have determined the scope of a security program, the initial step of the program development is…
identification of assets and determination of their value
203
Asset Identification and valuation
IT needs to acquire and track several characteristics of every asset, including…
- Identification
- Value
- Location
- Security Classification
- Asset Group
- Owner
- Custodian
204
Asset Identification and valuation
The purpose of performing a periodic “true up”, a process by which it is confirmed if assets still physically exist through whatever means used, is performed so that discrepancies can be investigated to verify that assets have not been..
moved/removed without authorization or stolen
204
Asset Identification and valuation
Software assets are considered to have..
Tangiable value
Althought software itself is intangiable in that it cannot physically be touched, if software is used to deliver goods and services it can be classified as a tangible asset (source)
204
Asset Identification and valuation
Information assets are considered to be less tangible than hardware assets and include…
- Customer Information
- Intellectual property
- Business Operations
- Virtual Assets
205
Asset Identification and valuation
A significant challenge related to information assets, where it will be next to impossible for an organisation to idetnify or know what services are in place, is the use of…
Cloud-Based Information Assets
An example is people taking it upon themselves to use services such as Dropbox to upload significant amounts of information as part of an exchange with a third party
The intent is not malicious but is not tracked and sight of the data is lost
205
Asset Identification and valuation
The term that defines where users purchase their own computing services and bypass corporate IT
Shadow IT
Implies not all assets can be identified
205
Virtual Assets
A term used which defines the ability for virtual servers to be created at the click of a button without additional cost to the organisation and often without approval…
Virtual Sprawl
aka
Virtualisation Sprawl
206
Virtual Assets
Significant risks associated with virtualisation or cloud based computing that make it difficult for virtual assest to be managed or tracked
- Virtual Sprawl
- Elasticity
- Containerization
- Software-Defined Network (SND)
- Virtual servers spun up often without authorization
- Additional resources automatically spun up to meet demand
- Multiple software instantiations execut on running operating system
- Virtual network devices can be created at will or by automatic means
206
Asset Classification
The process by which an organisation assigns an asset to a category representing usage or risk
Asset Classification
206
Asset Classification
Within the information security program, the purpose of asset classification is to determine…
its level of criticality to the organisation
206
Asset Classification
2 key measures of criticality…
- Information Sensitivity
- Operational Dependency
206
Asset Classification
Criticality measurements of an asset form the basis for…
- Information Protection
- System Redundancy and Resilience
- Business Continuity Planning
- Disaster Recovery Planning
- Access Management
206
Asset Classification
Scarce resources in the form of infomration protection and resilience need to be allocated to…
assets that require it the most
Makes no sense to protect all assets to the same degree
206
Asset Classification
The best approach for asset classification by an organisation is to..
Identify and classific information assets first, followed by system classification
206
Information Classification
A process whereby different sets and collections of data in an organisation are analysed for various types of value, criticality, integrity, and sensitivity
Information Classification
207
Information Classification
Information classification considers different characteristics to evaluate the value, criticality, integrity, and sensitivity of information…
- Monetary Value
- Operational Criticality
- Accuracy or Integrity
- Sensitivity
- Reputational Value
- Loss of this type of information may cause direct financial losses
- Corruption or loss of this type of information may significantly impact ongoing busines operations.
- Corruption or loss of this type of information ipacts business operations by causing incomplete or erroneous transactions
- Information of a sensitive nature, typically associated with individual citizens
- Denotes information that will or could cause potential loss of business reputation i.e. PII or even trade secrets that would not be looked on favorably by the public
207
Information Classification
In terms of an information classification scheme, the most successful organisations will build a scheme that is…
simple and easy to understand
If the scheme is to complex, staff will not understand it and misclassify information easily
207
Information Classification
4 typical classifications of information
- Secret
- Restricted
- Confidential
- Public
- Merger and acquisition plans, account passwords, encryption keys
- Credit card numbers, bank accounts, financial records etc..
- System documentation i.e. network diagrams
- Marketing collateral, published financial reports, press releases
207
Information Classification
Once information has been adequately classified, the next step in the information classification development is…
handling procedures
The classification and handling guidelines show various differnt forms of information handling for different classification levels
Information Handling Requirements Table
208
Information Classification
With to many levels of classification levels, there is a greater chance that information will be…
misclassified and put at risk
209
Information Classification
With to few levels of classification, the organisation will either have…
excessive resources protecting all information
OR;
insufficient resources protecting information inadequately
209
System Classification
Once information classification has been satisfied, the next step in the process will be…
system classification
209
System Classification
The purpose of system classification is to identify and categorize system assets according to…
the classification of information stored, processed, or transmitted by them so that appropriate level of protection can be determined and implemented
209
System Classification
A typical approach to system classification and protection is that for each level of classification and each type of system, a…
system hardening standard is developed that specifies features and configuration requirements
209
System Classification
A network architectural design element that can support system classification segmentation and decisions and costs associated with protection controls require
Zoning
A server may be classified as secret, but other servers in the zone are restricted. It may be decided that all servers in that environment have the same level of protection applied, as compromise of a restricted server may result in the compromise of the secret server.
in organisations with large flat networks, this could suddenly become a very expensive exercise.
210
Facilities Classification
A method of assigning classification or risk levels to work centers and processing centers based on their operational criticality or other risk factors i.e. a data center vs a sales office
Facilities Classification
210
Personnel Classification
Come organisations may be require personnel to meet specific clearance levels dependant on the nature of the information they will be interacting with. For example trade secrets, government secrets etc. It makes sense for these sorts of organisations to establish a…
classification scheme for personnel in the organisation
211
Personnel Classification
Treatment of personnel at higher security levels may include…
- Assigned devices with higher levels of security protection
- Frequent access reviews
- More stringent authentication requirements
- Different colour identity badges
- Assigned to work in facilities with more stringent security measures
211
Asset Valuation
Even in instances were qualitative risk valuation is employed, the abscence of an assets value will make it more difficult to…
calculate risks associated with an asset
212
Qualitative Asset Valulation
A common method of applying qualitiative asset valuation to an asset is to assign..
values using a scale. For example;
low, medium, high
or
1 to 5
212
Qualitative Asset Valulation
A means for an organisation to establish which assets have more or less value relative to others without the assignment of dollar value
Qualitative Asset Valulation
212
Quantitative Asset Valulation
A process more common in large or mature organisations that want to understand all the costs associated with loss events
Quantitative Asset Valulation
Process of assigning a dollar value to each asset
212
Quantitative Asset Valulation
In a typical Quantitative Asset Valulation an asset value may be one of the following…
- Replacement cost
- Book value
- Net Present Value (NPV)
- Redeployment Cost
- Creation or Reacquisition Cost
- Consequential Financial Cost
- The cost of purchasing or replacement of an asset. A database replacement cost could be operational cost to replace it
- Value of asset in the financial system i.e. purchase cost less depreciation
- The asset may directly or indirectly generate revenue, which can be used to evaluate its value
- Cost to set an asset up again somewhere else
- The cost associated, for example with a database, to reset it up again or reacquire the information, or effort involved for developers to re-create code
- A measure of financial costs that result from theft or compromise
212
Asset Valulation
In terms of asset valuation, security managers shuld document their…
rationel and methods of evaluation
213
Asset Valulation
In large, more mature organisations, the specification methods and formulas for information asset valuation will be documented within…
Guidelines
213