Asset Security Flashcards
VALUE OF ASSETS
Qualitative or
Quantitative
PROTECTION OF VALUABLE ASSETS
SHOULD BE BASED ON VALUE
EXAMPLES OF VALUABLE ASSETS
People
Information/data
Hardware
Reputation
Architectures
Software
Products
Processes
Intellectual Property/Ideas
IDENTIFICATION AND DISCOVERY OF ASSETS
Inventory
Needs to be formal process
ASSET CLASSIFICATION
Requires management support, commitment, and conviction
Accountability
Policies
Training/awareness/education
CLASSIFICATION PROCESS
- Asset inventory
- Determine and assign ownership
- Classify based on value
- Protect and handle based on classification
- Reassess (back to step 1)
Ensures information is market in such a way that only those with an appropriate level of clearance can have access to it.
CATEGORIZATION
The process of determining the impact of the loss of confidentiality, integrity, or availability of the information to an organization.
ASSET LIFECYCLE
- Identify and classify
- Secure and store
- Monitor and log
- Recover
- Disposition
- Archive or
- Destruction (defensible)
EQUIPMENT LIFECYCLE
- Define requirements
- Acquire and implement
- Operations and maintenance
- Disposal and decommission
CLASSIFICATION VS. CATEGORIZATION
CLASSIFICATION The act of forming into a class or group A distribution into groups, as classes according to common attributes
CATEGORIZATION
The process of sorting or arranging things into classes
CLASSIFICATION AND CATEGORIZATION SYSTEMS
Canada’s - Security of Information Act
China’s - Guarding State Secrets
UK’s - Official Secrets Act
US NIST’s - Federal Information Processing Standards (FIPS 199)
NIST’s SP800-60 - Guide for Mapping Types of Information and Information Systems to Security Categories
DATA CLASSIFICATION POLICY
Who will have access to data How the data is secured How long the data is to be retained What methods should be used to dispose of data Whether the data needs to be encrypted The appropriate use of the data
EXAMPLES OF CLASSIFICATION LEVELS
Top Secret
Company Restricted
Company Confidential
Public
CLASSIFICATION ACTIONS
Done by owners
Data owner should decide the classification
Owners should review the classification on a regular basis and adjust it as necessary
Classification should allow for increase or decrease
Changes need to be documented
PURPOSE OF CLASSIFICATION
Ensure that data receive appropriate level of protection
Provide security classifications that will indicate the need and priorities for security protection
Minimize the risks of unauthorized information alteration
Avoid unauthorized disclosure
Maintain competitive edge
Protect legal tactics
Comply with privacy laws, regulations, and industry standards
CLASSIFICATION BENEFITS
Awareness among employees and customers of in the organization’s commitment to protect the information
Identification of critical information
Identification of vulnerabilities to modification - enable focus on integrity controls
Sensitivity to the need to protect valuable information
ASSETS MANAGEMENT TERMS
DATA SUBJECT DATA OWNER DATA CUSTODIAN DATA STEWARD PERSONAL DATA PROCESSING DATA CONTROLLER DATA PROCESSOR
DATA OWNERSHIP
Accountable for important information security activities surrounding the life-cycle of information to:
Protect it
Ensure it is available to only those who require access
Destroy it when it is no longer needed
INFORMATION OWNER
Have broader responsibilities than Data Owners
Responsibilities:
Determine the impact the information has on mission
Understand the replacement cost of the information
Know when the information is no longer accurate, needed , or should be destroyed
Determine who has a need for the information and under what circumstances it should be released
DATA CUSTODIAN
Deals with consequences of the use of the data and responsible for integrity
Adherence to appropriate and relevant data policies, and procedures, baselines and guidelines
Ensuring accessibility to appropriate users, maintaining appropriate levels of security
Fundamental data maintenance, including but not limited to data storage and archiving
Data documentation, including updates to documentation
Assurance of quality and validation of any additions to data, including supporting periodic audits to ensure ongoing data integrity
DATA PROTECTION BY ROLE
DATA OWNER - Accountable
DATA CONTROLLER - Accountable
DATA CUSTODIAN - Responsible
DATA STEWARD - Responsible
DATA PROCESSOR - Responsible
DATA SUBJECT - Control
SOUND RECORD RETENTION POLICY
Train staff
Audit retention and destruction practices
Periodically review policy
Document policy, implementation, training and audits
RECORD RETENTION HINTS
Information and data should only be kept as long as it is required (preferably legally required)
Keeping data longer than needed keeps RISK longer than needed
Data is a “snapshot” of information, which si always changing.
ASSET RETENTION BEST PRACTICES
Promote cross-functional ownership
Promote cross-functional ownership for archiving, retention, and disposal policies
Plan and practice data retention and orderly disposal
Key areas of focus: media, hardware and personnel
EXAMPLES OF DATA RETENTION POLICIES
European Document retention Guide 2013
State of Florida Electronic Records and Records Management Practices, November 2010
The Employment Practices Code, Information Commissioner’s Office, UK, November 2011
Wesleyan University, Information Technology Services Policy Regarding Data Retention for ITS-Owned Systems, September 2013
Visteon Corporation, International Data Protection Policy, April 2013
Texas State Records Retention Schedule (Revised 4th Edition)
ESTABLISHING INFORMATION GOVERNANCE AND RETENTION POLICIES
Understand where the data is
Classify and define data
Archive and manage data
EFFECTIVE ARCHIVING AND DATA RETENTION POLICIES
INVOLVE ALL STAKEHOLDERS
ESTABLISH COMMON OBJECTIVES FOR SUPPORTING ARCHIVING AND DATA RETENTION BEST PRACTICES WITHIN THE ORGANIZATION
MONITOR, REVIEW, AND UPDATE DOCUMENTED DATA RETENTION POLICIES AND ARCHIVING PROCEDURES
SOUND RECORD RETENTION POLICY
EVALUATE STATUTORY REQUIREMENTS, LITIGATION OBLIGATIONS AND BUSINESS NEEDS
CLASSIFY TYPES OF RECORDS
DETERMINE RETENTION PERIODS AND DESTRUCTION PRACTICES
DRAFT AND JUSTIFY RECORD RETENTION POLICY
TRAIN STAFF
AUDIT RETENTION AND DESTRUCTION PRACTICES
PERIODICALLY REVIEW POLICY
DOCUMENT POLICY, IMPLEMENTATION, TRAINING AND AUDITS
DATA QUALITY
DATA CAPTURE AND RECORDING AT THE TIME OF GATHERING
DATA MANIPULATION PRIOR TO DIGITIZATION
IDENTIFICATION OF THE COLLECTION AND ITS RECORDING
DIGITIZATION OF THE DATA
DOCUMENTATION OF THE DATA
DATA STORAGE AND ARCHIVING
DATA PRESENTATION AND DISSEMINATION
USING THE DATA