Asset Security Flashcards
Information lifecycle
classification
categorization
ownership
maintenance
Asset classification
asset is anything that has value to an org
Tangible (h/w,s/w,firmware, n/w device )
Intangible (information, data, trademark,copyright, patent, IP, image, reputation)
Product life cycle :
EOL (end of life),
EOS (End of support)
EOS - no longer supported y vendor (sunsetting)
EOL - no longer sold by vendor but support may still be available)
Info systems lifecycle (8 phases) -
NIST SP 800 - 160
Stakeholders requirements
Analysis
Architectural design
Development/implement
Integration
Verification/Validation
Transition/deployment
Operate and maintenance
Retirement/disposal
Data Classification
- Controlled Information:
PII - Personally identifiable information
PHI - protected healthcare information
CHD - card holder data - Intellectual Property
- Financial data
- Others such as HR data, sensitive emails n texts, security reports
Data Classification Labels
Top secret : highest level - exceptional grave damage
secret : serious damage
confidential : damage
sensitive , but unclassified (SBU) : doesn’t cause damage
Unclassified : doesn’t violate confidentiality
Commercial terms - classification labels
Public, official use only, internal use only, and company proprietary
Most critical data
credit cards
financial information
healthcare data
customer PII
data classification criteria
Value : info worth to the company
Age : how current is the info, does org need 5yr old data
Useful life: at what point is data in your sys no longer worth protecting
Personal association: medical records, case files, personnel files
Distribution of classified information
Court orders/legal mandates such as FOIA requests release of info that would otherwise remain protected
FOIA - Freedom of info act
Management can approve distribution of classified info outside of the org, in conjunction with NDA
Regulated data-based classification
PHI
- associated with HIPAA
PII
- name, address, SSN, DOB, license
CHD
- cc number
- cardholder name
-exp date
- CVV
- PCI DSS - payment card industry data security standard
Data Ownership
Business/Mission Owner
Data/Information Owner
System Owner
Custodians
Users
Business/Mission Owner
Responsible for the success of an org
high ranking officials are responsible for establishment of an orgs computer security prg n goals
set priorities to support the mission of the org
Data Owner
Member of mgmt
corporate responsibility for protection of specific data
take into consideration laws, policies, regulations, budget
System Owner - NIST 800-18
responsible for the comp system (h/w n s/w)
Focus on system design, plan n updates
hands on responsibilities (patching, backup) are delegated to custodians
Custodian
Perform hands on activities to achieve data protection requirements dictated by data owners
not decision makers
actions taken will be in accordance with policy, procedure, / owner approved changes
User
Individuals who have been granted access to, n leverage data during the course of their function
operate within bounds of AUP helps to ensure data security is maintained
responsible to report security incidents that they are aware of
Sensitive data collection limitation
OECD - Org for economic cooperation n development directly addresses collection limitation
Data controllers and processors
Controllers: Org that creates /manages sensitive data
eg: salary data managed by HR dept
Processors: 3rd party companies that access an org’s sensitive data
eg: outsourced payroll company
data controller bears the legal responsibility that the processor actually implements the necessary security measures
Data retention policies
Determine how long specific types of data should be retained by the org
ESI - Electronically stored info destroyed as per data retention/destruction policy
Records retention issues : email
Orgs should purge email after the retention period has expired
also consider local archives (pst files) - personal storage table
Object reuse
concept of reusing storage media after its initial use
Data Remanence
Info that persists on media after attempted removal
Remnants might only be accessible with forensic tools
Media Storage
Paper printouts
Data backup tapes
CDs
Diskettes
Hard drives
Flash drives
storage ares: onsite, offsite
Data storage and memory terms
Real, main or primary memory
Secondary memory
WORM - Write once, read many
Volatile storage
non-volatile storage