D2. Asset Security Flashcards
This is a critical first step toward ensuring the security of your systems and data.
Identifying and classifying information assets
These are the foundational steps in establishing an information security asset management program.
- Creating an inventory of what assets an organization has
- Where the assets are located?
- Who is responsible for the assets?
Is the process of organizing data into groups or categories that describe the data’s sensitivity, criticality, and value.
What is data classification?
A cornerstone of data security and risk management, this helps to determine the security controls necessary to manage and safeguard the confidentiality, integrity, and availability of data.
What is data classification?
What are the three (3) primary steps of data classification?
- Context-based
- Content-based
- User-based
Derived from metadata like ownership, location, or other values that can indirectly indicate sensitivity or criticality.
What is context-based?
Derived by inspecting the contents of files and directly identifying sensitive data, rather than inferring it from metadata.
What is content-based?
Involves manual assignment of data classification and is based on user’s understanding of the data and your organization’ classification scheme.
What is user-based?
Generally considered the highest level of classification outside of government or military organizations. The loss of this data can cause serious risk to the organization.
What is confidential classification scheme?
Losing this data will raise the risk to the organization, even if it is just repetitional damage (strategy documents or inter organizational correspondence can be considered sensitive).
What is sensitive classification scheme?
Usually compartmental data that might not do the company damage but must be kept private for other reasons (employee renting statistics and salary ranges).
What is private classification scheme?
Data that is disclosed outside the company on a limited basis or contains information that could reduce the company’s competitive advantage, such as technical specification of a new product.
What is proprietary classification scheme?
Data that if lost would have little or no impact to the company.
What is public classification scheme?
Other labels used to designate documents (but not considered classifications).
For Official Use Only (FOUO) and Limited Official Use
Is the process of grouping types of data with comparable sensitivity labels.
What is data categorization?
Identifying the sensitivity, criticality, and value of the information systems and assets that store, process, and transmit that data, as well as the data itself.
What is asset classification?
Involves grouping assets based on their relative level of sensitivity and the impact to the organization should the assets be compromised.
What is asset classification?
What are the major benefits of classification?
- Accurate asset inventory
- Insight into the environment
- Optimize change, vulnerability, and management programs
- Maintenance windows
- Security controls and segmentation
- Protection of sensitive data
- Identify rouge assets
- Understand potential risks posed by vulnerabilities
- Identify proprietary assets and intellectual property
- Forecast cost
- Compliance and Regulation controls
Assets should be identified and controlled based on their level of.
What is sensitivity?
While data classification is the most important element on a data label, asset labels may contain other information, such as.
- Title of the asset
- Data owner
- Data retention period (if applicable)
This helps keep asset handling efficient and cost-effective.
What is marketing and labeling of public data or unclassified information?
This aids by using digital marketing to identify and prevent sensitive information from leaking out of an organization.
What is Data Loss Prevention (DLP)?
These are critical to your organization’s overall asset security management.
What are handling and storage guidelines?
What are the consideration to data storage?
- Encryption
- Limiting the volume of data retained
- Backups
The process of modifying the assigned classification of an asset to a lower level of sensitivity.
What is declassification?
Methods to declassify assets include.
What is de-identification and tokenization?
The process of removing information that can be used to identify an individual (PII).
What is Data de-identification?
The data de-identification process involves taking any personally identifying data fields and converting them to.
What is masked, obfuscated, encrypted, or tokenized data fields?
Is the process of substituting a sensitive data element with a nonsensitive set of characters or numbers called a token.
What is tokenization?
This is the source to trust, if there is a conflict between what the tools are reporting, and also the source used for official reports and other data requests, such as part of an audit.
What is the system of record?
What the components of a typical asset management lifecycle?
- Strategy
- Plan
- Design
- Procure
- Operate
- Maintain
- Modify
- Dispose
Activities critical to implementing a formal asset management program include.
- Assignment of ownership
- IT asset management
- Configuration management
- Change management
Is a set of business practices related to governing and maintaining IT assets, including hardware, software, data, and related processes.
What is Information technology asset management (ITAM)?
The International Standards Organization (ISO) has established this official set of standards related to ITAM.
What is the ISO 19770 family of standards?
The ISO 19770 family of standards consist of
ISO/IEC 19770-1: Best practices and demonstrate compliance
ISO/IEC 19770-2: Software identification (SWID)
ISO/IEC 19770-3: Common terminology for describing software entitlement rights, limitations, and metrics
ISO/IEC 19770-4: Standardize reporting of resource utilization
ISO/IEC 19770-5: overview of ITAM and defines volcabulary
Relates to asset management and asset security, this keeping inventory current, system and software configurations must be controlled and documented
What is configuration management?
Identifies the version and settings of all configuration items (CI) in a product, system, or subsystem; and answers the question ‘what do I need to build the system correctly?’
What is a system baseline?
Is a minimum set of safeguards required to protect a given system.
What is a security baseline?
This enables validate security products to automatically perform configuration checking using NCP checklists.
What is Security Content Automation Protocol (SCAP)?