CISSP Domain 2 Flashcards
Information lifecycle
Creation
Classification
Storage
Usage
Archive
Destruction
Data classification and damage level
Value of data by labeling
Top secret: Gracve damage
Secret: Serious damage
Confidential: Damage
Unclassified : No damage
Data classification non governmental
Confidential or Proprietary - Grave damage
Private - Serious damage - PII or PHI
Sensitive - Damage - IP address, OS, software
Public - No damage
Data States
Data at rest - Strong symmetric encryption
Data in transit - combo
Data in use -
Steps in Data management
Define data
Asset classification
Define security requirements
Identify security controls to implement
Establishing information and asset handling requirements
Data maintenance
DLP: Network and Endpoint
Marking sensitive data and assets: Tags and meta tags
Handling assets and data
Data collection limitation
Data location: Data center and redundancy
Storing sensitive data
Data destruction
Eliminating data remnanence
Ensuring appropriate data and assets retention
Data destruction
Data remnanence
Left over data after supposedly erased
Slack space
Unused space within disk cluster
Degausser and SSD
Heavy magnetic field and effective only in magnetic media
Does not effect cd, dvd and SSD
SSD include built in earse command
Erasing
Delete operations in file but actual data remains on drive
Clearing
Overwrite for reuse and ensure clear data cannot be recovered and three separate phases
First character
Complement
Seperate bits
Purging
A level of assurance that data is not recoverable
Repeat clearing process several times
But not always trusted
Destruction
Most Secure method for sanitizing
Cryptographic erasures
If data is encrypted then crypto shed to destroy
They only destroy encryption key and decryption keys but data remains encrypted
Better overwrite the data just in case if encryption isn’t strong
Especially cloud destroy cryptography keys
Retention policies (lawsuit)
Cannot delete potential evidence after a lawsuit is filed however if retention policy dictates it’s legal to delete
Data protection methods - DRM solutions methods
DRM liscencing : Grants access to product
Persistent online authentication: System to be connected to internet to use product
Continus audit trail
Automatic expiration
They use steganography to detect person who pirated
Cloud access security broker
Monitors all activities and enforces admin defined security policies
Software placed logically between users and cloud based resources
Can be on premise or cloud
Effective detection of shadow IT- By collecting and analysis of network logs
Psudonymization
Replace data with artificial identifiers
Tokenization
Use of random string of characters to replace other data..
Credit card transactions
Anonymization
Removing all relevant data
Randomised masking
Anonymization cannot be reversed unlike psudonymization and tokenization
Data owners
Identify classification of data and label
Asset owners
Owns asset
Devlop security plan
Maintain and devlop
Aup
Updates
Business owners/ Mission owners
Own processes - like sales department
System provides value to organization
Data processor
Natural or legal person processes data on behalf of data controller
Dara controller
Person or entity that controls data
Data custodian
Helps protect cia
Admins
Elevated previliges
4 types of baseline
Low impact baseline: Loss of CIA will have low impact
Moderate impact
High impact
Privacy control baseline: PII
Tailoring
Modify list of security controls within a baseline to align with organization mission
Scoping
Part of tailoring process and review the baseline security controls and selecting those which are applicable
homomorphic encryption
Data in use - some cases, it’s possible for an application to work on encrypted data using homomorphic encryption (in cipher text format itself . This limits the risk because memory doesn’t hold unencrypted data.
Air gap
One network processes unclassified data only. Another network processes classified data. Techniques such as air gaps ensure the two networks never physically touch each other. An air gap is a physical security control and means that systems and cables from the classified network never physically touch systems and cables from the unclassified network.
DLP discovery
Most DLP solutions also include discovery capabilities. The goal is to discover the loca- tion of valuable data within an internal network. When security administrators know where the data is, they can take additional steps to protect it. As an example, a database server may include unencrypted credit card numbers. When the DLP discovers and reports this, database administrators can ensure the numbers are encrypted. As another example, company policy may dictate that employee laptops do not contain any PII data. A DLP content discovery system can search these and discover any unauthorized data. Additionally, many content dis- covery systems can search cloud resources used by an organization.
What are the criteria to be considered (esp. csp) when data location of backups ?
Some organizations maintain data in large data centers. It’s common to replicate this data to one or more other data centers to maintain the availability of the critical data. These data centers are typically located in separate geographical locations. When using cloud storage for backups, some organizations may need to verify the location of the cloud storage to ensure it is in a separate geographical location.
What is sanitisation ?
Sanitization can refer to the destruction of media or using a trusted method to purge clas- sified data from the media without destroying it.
pseudonymization and tokenization, anonymization
Unlike pseudonymization and tokenization, anonymization cannot be reversed. After the data is randomized using an anonymization process, it cannot be returned to the original state.
Randomized masking can be an effective method of anonymizing data.
Pseudo aka Artificial identifiers and token needs db and vault to maintain original data