5. Cloud information Governance domains - DONE Flashcards
What is the definition of information/data governance?
CSA - “Ensuring the use of data and information complies with organizational policies, standards and strategy—including regulatory, contractual, and business objectives.”
*NIST - “A set of processes that ensures that data assets are formally managed throughout the enterprise. A data governance model establishes authority and management and decision-making parameters related to the data produced or managed by the enterprise.”
As covered in the NIST definition, information governance consists of a series of processes to manage data formally throughout the enterprise. The processes involved are broken down into the following domains of information governance, all of which must be in place to ensure that data is secured appropriately:
List them
*Ownership and custodianship
*Information classification
*Information management policies
*Location and jurisdiction policies
*Authorizations
*Contractual controls
*Security controls
information governance consists of a series of processes to manage data formally throughout the enterprise. The processes involved are broken down into the following domains of information governance
Describe Ownership and custodianship
*Ownership and custodianship - Your company is always legally accountable if anything happens to data that you are in control of.
information governance consists of a series of processes to manage data formally throughout the enterprise. The processes involved are broken down into the following domains of information governance
Describe Information classification
*Information classification - Classification can serve as decision criteria as to where data can and should be stored and processed. From a cloud perspective, this classification may determine whether or not the information can be stored in the cloud. You may not have used information classification systems in the past, but this is the basis upon which all future cloud-based information governance decisions should depend.
As covered in the NIST definition, information governance consists of a series of processes to manage data formally throughout the enterprise. The processes involved are broken down into the following domains of information governance, all of which must be in place to ensure that data is secured appropriately:
Describe Information management policies
This directive control states how data and information should be managed. As available controls can widely vary based on SPI tiers (SaaS, PaaS, IaaS) and the providers themselves, acceptable service models and controls made available by the provider for the different classifications used in your organization should be considered. For instance, if you require encryption of data at rest and your SaaS provider doesn’t offer it, you should find a different provider for such data.
As covered in the NIST definition, information governance consists of a series of processes to manage data formally throughout the enterprise. The processes involved are broken down into the following domains of information governance, all of which must be in place to ensure that data is secured appropriately:
Describe Location and jurisdiction policies
As you know, the cloud can be global, and different jurisdictions have different requirements. Any geographical considerations must be part of your information governance. This can be addressed as part of your information management policies or as a stand-alone policy, but acceptable locations and jurisdictions must be addressed by your organization.
As covered in the NIST definition, information governance consists of a series of processes to manage data formally throughout the enterprise. The processes involved are broken down into the following domains of information governance, all of which must be in place to ensure that data is secured appropriately:
Describe Authorizations
This covers who is allowed to access certain information and/or data and how the concepts of least privilege and segregation of duties are addressed. The concept of authorizations doesn’t change for cloud-based systems compared to traditional data centers, but the importance of authorizations is much greater in a cloud environment, because, in some cases, authorizations may be the only control exposed to you by a provider and you will not be able to rely on physical controls as a form of compensating control (for example, for data accessible only from inside the building).
As covered in the NIST definition, information governance consists of a series of processes to manage data formally throughout the enterprise. The processes involved are broken down into the following domains of information governance, all of which must be in place to ensure that data is secured appropriately:
Describe Contractual controls
These are your company’s only legal tools to ensure that appropriate governance requirements are implemented and followed by the cloud provider.
As covered in the NIST definition, information governance consists of a series of processes to manage data formally throughout the enterprise. The processes involved are broken down into the following domains of information governance, all of which must be in place to ensure that data is secured appropriately:
Describe Security controls
These tools are required to implement data governance. Controls exposed to customers, and how these controls are configured, will vary based on the provider and potentially the service you are consuming
What is the data security lifecycle?
The data security lifecycle is a CSA modelling tool that is based on the common IM lifecycle, but the CSA tool focuses on security aspects and locations throughout the various stages of creation through the ultimate disposal of the lifecycle.
You must understand that this lifecycle is meant to be a high-level framework. The goal here is to use the lifecycle to understand controls that should be implemented to stop a possible security breach from happening. It is not meant to be applied to every bit of data throughout your organization, because, quite frankly, that would drive everyone off the deep end.
“There are six stages in the data security lifecycle:
*Create - Data is created or existing content is modified.
*Store - Data is committed to some form of storage repository.
*Use - Data is viewed, processed, or otherwise used in some way. This doesn’t include data modification, because that’s jumping back to the creation of a new file.
*Share - Data is made available to other parties.
*Archive - The data’s useful life is over, but it may be kept to address regulatory or legal requirements, for example.
*Destroy - Data is deleted from storage.”
Data (be it structured or unstructured) doesn’t go through all the phases in order, nor does it need to go through all the stages.
give an example:
For example, you can create a document and share it with others, who make changes. After the changes have been made, a new file has basically been created. Using this example, you can easily see how data can jump back and forth between the stages.
What are some possible controls for each phase of the data security lifecycle
crypto shedding is in the delete phase of the data security lifecycle. why is it important?
It is essentially impossible to be certain that data in a cloud is actually deleted when you press the DELETE key. If your risk tolerance requires that you have certainty that data can never be retrieved once deleted, you can implement crypto shredding.
what is crypto shedding?
In theory, crypto shredding is the process of storing encrypted data with an encryption key and then simply deleting the data and the encryption key that was used to encrypt the data in the first place. I’m sure you can see the complexity involved with all of these data keys being generated, tracked, and destroyed. It’s great in theory, but basically impossible in real life.