CISSP Domain 2- Flashcards
Information Life Cycle - Introduction
* Information is created and has value for a time until it is no longer needed: It has a life cycle
* Encryption is useful at any of the stages
Information Life Cycle - Acquisition
* Occurs when information can be created within or copied into a system
* Steps
- Meta data describing the information is attached along with the classification
- Information is extracted so that it can be quickly located later
- Sometimes we must apply policy controls to the information
Information Life Cycle - Use
* Addressing the CIA triad
* While the information is in active use it must remain available while still enforcing confidentiality and integrity
* If an organization duplicates data, the consistency of that duplication must be an enforced process
Information Life Cycle - Archival
* At some point, the info will become dated, but will still need to be accessible for a time
* Information usually moved to a secondary storage point not as optimized for reading
* It’s not the same as a backup
Information Life Cycle - Disposal
Two possible steps
* Transfer: In case you want to sell it (The transfer must be carried out safely)
* Destruction: Depending on the sensitivity of the information, the media may need to be physically destroyed
Information Classification - Classification Levels
* Commercial
- Confidential
- Private
- Sensitive/Propietary
- Public
* Military
- Top Secret
- Secret
- Confidential
- Secretive but unclassified
- Unclassified
Information Classification - Commercial classification levels
* Confidential
* Private
* Sensitive/Propietary
* Public
Information Classification - Military classification levels
* Top Secret
* Secret
* Confidential
* Secretive but unclassified
* Unclassified
Information Classification - Classification Attributes
* How the data is related to security
* Legal or regulatory requirements
* How old the data is
* How valuable the data is
* How useful the data is
* How damaging it would be if there data were disclosed
* How damaging it would be if there data were lost or compromised
* Who can access or copy the data
Information Classification - Classification Controls - Steps for classifying data
1) Define the classification levels
2) Define criteria on how to classify
3) Identify those who will be classifying data
4) Identify the data custodian
5) Indicate the security controls required for each classification
6) Document exceptions to the previous step
7) Specify how custody of data may be internally transferred
8) Create a process to periodically review classification and ownership, and communicate any changes to the data custodian
9) Create a process for declassifying data
10) Incorporate the above into the security-awareness training
Layers of Responsibility - Executive Management
* Chief Executive Officer (CEO)
* Chief Financial Officer (CFO)
* Chief Information Officer (CIO)
* Chief Privacy Officer (CPO)
* Chief Security Officer (CSO)
* Chief Information Security Officer (CISO)
Layers of Responsibility - Executive Management - Chief Executive Officer (CEO)
* Highest ranking officer in the company
* Acts like the visionary
* Can delegate tasks but not responsibility
Layers of Responsibility - Executive Management - Chief Financial Officer (CFO)
Responsible for the financial structure of a company
Layers of Responsibility - Executive Management - Chief Information Officer (CIO)
* Oversees information systems and technologies
* Ultimately responsible for the success of the security program
Layers of Responsibility - Executive Management - Chief Privacy Officer (CPO)
* Usually an attorney
* Ensures the company’s data is kept safe
Layers of Responsibility - Executive Management - Chief Security Officer (CSO)
* Responsible for understanding company risks and for mitigating them to acceptable levels
* Extends into the legal and regulatory realm
Layers of Responsibility - Executive Management - Chief Information Security Officer (CISO)
Technical role reporting to the CSO
Layers of Responsibility - Data Owner
* Usually a member of MGMT
* Responsible for data owned by his department
* Responsibilities
- Classification of data
- Ensure security controls are in place
- Approving disclosure activities and access requests
- Ensuring proper access rights are enforced
Layers of Responsibility - Data Custodian
* Responsible for storing and keeping the data safe, including backup and restorative duties
* Ensure that the company’s security policy regarding Information Security and data protection are being enforced. This results in the data custodian being responsible for maintaining controls to enforce classification levels as set by the data owner
Layers of Responsibility - System Owner
* Responsible for one or more systems, each of which may contain or process data owned by more than one data owner
* Ensures the systems under his or her purview align with the company’s policies regarding
- Security controls
- Authentication
- Authorization
- Configurations
* Ensures the systems have been assessed for vulnerabilities and report incursions to the data owners
Layers of Responsibility - Security Administrator
* Implements and maintains security network devices and software
* Manages user accounts and access
* Tests security patches