4: Classification of information assetys Flashcards
Objectives/benefits for data classification
To reduce RISK of under protection of information assets
To reduce COST of over protection of information assets
Logical steps for data classification
1- Inventory of information Assets
2-Establish ownership for each information Assets
3-Classification of information Assets (public/private/sensitive)
4-Labeling of information Assets
5- Creation of Access control list
With whom resides the accountability for the maintenance of proper security controls over assets
With the data owner/system owner
Who is ultimately responsible for defining the access rules
Data owner/system owner
What are the requirements that data classification must take into account
- Legal/Regulatory/Contractual
- Confidential
- Integrity
- Availability
Why should data owner and data custodian have knowledge and awareness about data classification policy of the company
To ensure proper classification of data as per organizational requirement.
First step in classification of information assets
Inventory of information assets
(1)Responsibility for the maintenance of proper control measures over information resources resides
with the:
A. database administrator
B. security administrator
C. data and systems owners
D. systems operations group
Answer: C. data and systems owners
Explanation:
In any given scenario, accountability for the maintenance of security controls over information
assets resides with the data owner/system owner. Even though owner may delegate responsibilities
to other specialized functions, owners remain accountable for the maintenance of appropriate
security measures. Management should ensure that all information resources to have an appointed
owner who makes decisions about classification and access rights.
(2)An IS auditor is evaluating data classification policy of an organization. The FIRST step in data classification is to:
A. the labelling of IS resources
B. establish ownership
C. perform a impact analysis
D. define access control rules
Answer: B. establish ownership
Explanation:
In any given scenario, following are the logical steps for data classification:
-First step is to have inventory of IS resources
-Second step is to establish ownership
-Third step is classification of IS resources
-Fourth step is labelling of IS resources
-Fifth step is creation of access control list
In the above question, step with respect to inventory of IS resource is not in option. Hence second
logical step i.e. establishing ownership will be our answer. The data owner is responsible for
defining the access rules; hence, establishing ownership is very critical.
(3)An IS auditor is evaluating access control policy of an organization. The implementation of access controls FIRST requires:
A. creation of an access control list
B. an inventory of IS resources
C. perform a impact analysis
D. labelling of IS resources
Answer: B. an inventory of IS resources
.
Explanation:
In any given scenario, following are the logical steps for data classification and implementation of
access control:
-First step is to have inventory of IS resources
-Second step is to establish ownership
-Third step is classification of IS resources
-Fourth step is labelling of IS resources
-Fifth step is creation of access control list
The first step in implementing access controls is an inventory of IS resources.
(4)Which of the following is the MOST important objective of data protection?
A. creation of an access control list
B. ensuring the integrity of information
C. reduction in cost of control
D. to comply with risk management policy
Answer: B. ensuring the integrity of information
Explanation:
In any given scenario, most important objective of data protection is to ensure
integrity/confidentiality of data.
(5)Proper classification and labelling for system resources are important for access control because
they:
A. help to avoid ambiguous resource names
B. reduce the number of rules required to adequately protect resources
C. serve as stringent access control
D. ensure that internationally recognized names are used to protect resources
Answer:B. reduce the number of rules required to adequately protect resources.
Explanation:
Proper classification and labelling for system resources are important for the efficient administration of security controls. Proper labelling reduces the number of rules required to adequately protect resources, which in turn facilitates security administration and maintenance efforts. Reducing the number of rules makes it easier to provide access. Proper classification and labelling does not necessarily ensures option A, C and D.
(6)In co-ordination with database administrator, granting access to data is the responsibility of:
A. data owners
B. system engineer
C. security officer
D. librarians
Explanation: A. data owners
Explanation:
In any given scenario, accountability for the maintenance of proper security controls over
information assets resides with the data owner/system owner. Data owners are responsible for the
use of data. Written authorization for users to gain access to computerized information should be
provided by the data owners.
(7)An IS auditor is reviewing data classification policy of an organization. From a control perspective, the PRIMARY objective of classifying information assets is to:
A. ensure that all assets are insured against losses.
B. to assist in risk assessment
C. establish appropriate access control guidelines
D. ensure all information assets have access controls
Answer: C. establish appropriate access control guidelines
Explanation:
First step of establishing access control is to ensure well defined information assets classification
policy. By assigning levels of criticality to information resources, management can establish
guidelines for the level of access controls that should be assigned. Hence from control perspective,
primary objective of classification is to establish appropriate access control guidelines. All assets are
not required to be insured. Also access control may not be required for all assets. Classification
helps in risk assessment however same is not prime objective
(8)From control perspective, access to application data should be given by:
A. database administrator
B. data custodian
C. data owner
D. security administrator
Answer: C. data owner
Explanation:
In any given scenario, accountability for the maintenance of proper security controls over
information assets resides with the data owner/system owner. The ultimate responsibility for data
resides with the data owner.
Data owners should have the authority and responsibility for granting access to the data and
applications for which they are responsible. Data custodians are responsible only for storing and
safeguarding the data. The DBA is responsible for managing the database.