5.4: Classification of information Assets (Doshi) Flashcards
Objectives/benefits for data classification
(1) To reduce RISK of under protection of information assets
(2) To reduce COST of over protection of information assets
5 Logical steps for data classification:
(1) Inventory of information Assets
(2) Establish ownership for each information Assets
(3) Classification of information Assets (public/private/sensitive)
(4) Labeling of information Assets
(5) Creation of Access control list
With whom does the ACCOUNTABILITY reside for the MAINTENANCE of proper security controls over assets?
the Data owner/System owner
Who is ULTIMATELY responsible for defining the access rules?
Data owner/System owner
What are the requirements that data classification must take into account?
(1) Legal/Regulatory/Contractual
(2) Confidential
(3) Integrity
(4) Availability
Why should data owner and data custodian have knowledge and awareness about data classification policy of the company?
To ensure proper classification of data as per organizational requirement.
FIRST step in classification of information assets:
Inventory of information assets
Responsibility for the maintenance of proper control measures over information resources resides with the:
A. database administrator
B. security administrator
C. data and systems owners
D. systems operations group
C. data and systems owners
In any given scenario, accountability for the maintenance of security controls over information assets resides with the data owner/system owner. Even though owner may delegate responsibilities to other specialized functions, owners remain accountable for the maintenance of appropriate security measures. Management should ensure that all information resources to have an appointed owner who makes decisions about classification and access rights.
An IS auditor is evaluating data classification policy of an organization. The FIRST step in data classification is to:
A. the labelling of IS resources
B. establish ownership
C. perform a impact analysis
D. define access control rules
B. establish ownership
In any given scenario, following are the logical steps for data classification:
-First step is to have inventory of IS resources
-Second step is to establish ownership
-Third step is classification of IS resources
-Fourth step is labelling of IS resources
-Fifth step is creation of access control list
In the above question, step with respect to inventory of IS resource is not in option. Hence second logical step i.e. establishing ownership will be our answer. The data owner is responsible for defining the access rules; hence, establishing ownership is very critical.
An IS auditor is evaluating access control policy of an organization. The implementation of access controls FIRST requires:
A. creation of an access control list
B. an inventory of IS resources
C. perform a impact analysis
D. labelling of IS resources
B. an inventory of IS resources
In any given scenario, following are the logical steps for data classification and implementation of access control:
-First step is to have inventory of IS resources
-Second step is to establish ownership
-Third step is classification of IS resources
-Fourth step is labelling of IS resources
-Fifth step is creation of access control list
The first step in implementing access controls is an inventory of IS resources.
Which of the following is the MOST important objective of data protection?
A. creation of an access control list
B. ensuring the integrity of information
C. reduction in cost of control
D. to comply with risk management policy
B. ensuring the integrity of information
In any given scenario, most important objective of data protection is to ensure integrity/confidentiality of data.
Proper classification and labelling for system resources are important for access control because they:
A. help to avoid ambiguous resource names
B. reduce the number of rules required to adequately protect resources
C. serve as stringent access control
D. ensure that internationally recognized names are used to protect resources
B. reduce the number of rules required to adequately protect resources.
Proper classification and labelling for system resources are important for the efficient administration of security controls. Proper labelling reduces the number of rules required to adequately protect resources, which in turn facilitates security administration and maintenance efforts. Reducing the number of rules makes it easier to provide access. Proper classification and labelling does not necessarily ensures option A, C and D.
In co-ordination with database administrator, granting access to data is the responsibility of:
A. data owners
B. system engineer
C. security officer
D. librarians
A. data owners
In any given scenario, accountability for the maintenance of proper security controls over information assets resides with the data owner/system owner. Data owners are responsible for the use of data. Written authorization for users to gain access to computerized information should be provided by the data owners.
An IS auditor is reviewing data classification policy of an organization. From a CONTROL perspective, the PRIMARY objective of classifying information assets is to:
A. ensure that all assets are insured against losses.
B. to assist in risk assessment
C. establish appropriate access control guidelines
D. ensure all information assets have access controls
C. establish appropriate access control guidelines
First step of establishing access control is to ensure well defined information assets classification policy. By assigning levels of criticality to information resources, management can establish guidelines for the level of access controls that should be assigned. Hence from control perspective, primary objective of classification is to establish appropriate access control guidelines. All assets are not required to be insured. Also access control may not be required for all assets. Classification helps in risk assessment however same is not prime objective
From control perspective, access to application data should be given by:
A. database administrator
B. data custodian
C. data owner
D. security administrator
C. data owner
In any given scenario, accountability for the maintenance of proper security controls over information assets resides with the data owner/system owner. The ultimate responsibility for data resides with the data owner. Data owners should have the authority and responsibility for granting access to the data and applications for which they are responsible. Data custodians are responsible only for storing and safeguarding the data. The DBA is responsible for managing the database.