CCSP Domain 2: Cloud Data Security Flashcards
Encryption approaches for DAR, DIT, and DIU
The high-level architecture for encryption has three (3) components: the data, the encryption engine, and the encryption keys.
DAR / data at rest is idle within storage; encryption aligned to the characteristics / features of the Store type is recommended – i.e. field level, transparent (if supported by the db), or whole disk encryption, etc.
DIT / data in transit is under active transport across the network – TLS/SSL, VPN, IPSec, and HTTPS are recommended to protect DIT.
DIU / data in use is being actively accessed or processed; IRM / information right management or DRM / data right management are recommended to protect DIU.
Tokenization
Substitutes non-sensitive data (the token) for sensitive data using a process that allows for mapping between the token and the sensitive data.
To illustrate: the token server stores the token and sensitive data; token stored and used by the user / application is translated to the sensitive data for downstream processes, when a request from the user / application is granted to the downstream process by the token server. (i.e. User / Application only ever sees the token.)
High-level architecture of DLP
High-level architecture for Data Loss Prevention (DLP):
1) Discovery and Classification: crawls data and uses profiles to match and classify data – e.g. if ###-##-#### then mark as social security number (SSN) and classify as Restricted Use, etc.
2) Monitoring: classified data is monitored to ensure its use falls within the limits and constraints (i.e. policies) of the firm
3) Enforcement: violations of policy result in alerts or are dis-allowed automagically – e.g. if e-mail of Restricted Use data is not allowed, an email with SSN in the body is not sent.
Data De-Identification: static and dynamic methods
Use of masking or obfuscation to make sensitive data less volatile to disclosure – e.g. SSN is reduced last four of SSN.
Static masking creates a separate and distinct copy of the data with masking in place – one copy masked, one copy in the clear – and is often used in pre-production environments to support development without undue risk to sensitive data.
Dynamic masking applies masking between the data and the application layers to limit exposure in production environments.
CSA CCM
Cloud Security Alliance Cloud Control Matrix
Security domains of the CCM:
Application and Interface Security
Audit Assurance and Compliance
Business Continuity Management & Operation Resilience
Change Control & Configuration Management
Data Security & Information Lifecycle Management
Data Center Security
Encryption & Key Management
Governance & Risk Management
Human Resources
Identity & Access Management
Infrastructure & Virtualization Security
Interoperability and Portability
Mobile Security
Security Incident Management, eDiscovery, and Cloud
Supply Chain Mgmt, Transparency, and Accountability
Threat & Vulnerability Management
DRM
Digital Rights Management
In the context of CCSP, DRM applies to the protection of consumer media such as music, publications, video, movies, etc.
Note that (ISC)2 training materials equate DRM to IRM / information rights management.
IRM tools breakdown
Information Rights Management
Auditing
Expiration
Policy Control
Protection
Auditing: monitors and records who accesses what data
Expiration: bounds access to a given period of time – allows for expiration of access rights
Policy Control: granular control of data use and storage – who can copy, save, print, forward, or access data; with the ability to change these policies, at any point in time and have those policy changes affect the whole of the user base
Protection: IRM systems provide persistent protection of data – i.e. DAR and DIT (data at rest and data in transit)
Data Archiving Concepts
Regulatory Requirements Disaster Recovery Requirements Format Technology Testing
Regulatory requirements: what specification applies to the data – i.e. PCI, HIPPA, etc.?
Disaster recovery: RPO / recovery point objective, RTO / recovery time objective, and RSL / recovery service level need to be factored into your people, process, and technology decision.
Format: How is the data represented and stored?
Technology: What are the technologies that will be used to create and maintain the archive? What media will be used and with what redundancy / fail safes in place?
Testing: ensure that the data can be retrieved and used if needed / QA the recovery process.
What are the six (6) phases of the cloud data lifecycle?
The cloud data lifecycle consists of :
1) Create
2) Store
3) Use
4) Share
5) Archive
6) Destroy
Describe the “create” phase of the cloud data lifecycle.
What controls should a CSP consider in this phase?
Data is newly imported, created, or modified in this phase.
At “create” data classification should occur as controls in all other phases of the cloud data lifecycle can benefit from this classification tag – i.e. it enables customization of controls based on the value of the data to the firm.
Describe the “store” phase of the cloud data lifecycle.
What controls should a CSP consider in this phase?
Data is moved into ephemeral and persistent storage (e.g. volume, object, structured, unstructured, etc.).
At “store” securing data transport and data at rest via encryption is essential; as with all phases post Create, controls / control strength may vary dependent upon information classification.
Describe the “use” phase of the cloud data lifecycle.
What controls should a CSP consider in this phase?
Data is utilized by an application or user – it goes from data at rest to data in transit to data in use.
As data is “in the clear” when in use, identity and access management (IAM), network security (e.g. NAC, etc.), and data rights / information rights management (DRM / IRM) controls are needed to secure data use; as with all phases post Create, controls / control strength may vary dependent upon information classification.
Describe the “share” phase of the cloud data lifecycle.
What controls should a CSP consider in this phase?
Data is moved outside of the system where Create occurred.
Share requires process controls to ensure the rights of the data subject, data owner, and data partner are maintained; data rights / information rights management (DRM / IRM) may be used to enforce process and mitigate the options available to bad actors. As with all phases post Create, controls / control strength may vary dependent upon information classification.
Describe the “archive” phase of the cloud data lifecycle.
What controls should a CSP consider in this phase?
Data is removed from the active system and placed into long term storage.
Archive relies on identity and access management (IAM) controls to ensure least privilege, encryption to protect data in transit and at rest, and should include a process to test and ensure data recovery is possible.
Describe the “destroy” phase of the cloud data lifecycle.
What controls should a CSP consider in this phase?
Data is made irretrievable.
Destroy may utilize deletion, overwriting, cryptographic erasure, or a mixture of all three of these to ensure irretrievability; as with all phases post Create, controls / control strength may vary dependent upon information classification.