Domain 2 Flashcards
Asset
An asset is any data, device, or other component of the environment that supports information or information system related activities.
The value of an Asset
The value of an asset is the worth of the asset to the owners, authorized users, and unauthorized users.
- Asset value can include the cost of liability or compromise.
The cost of an asset
The cost of an asset is the monetary value it takes to acquire, develop, maintain, or replace it.
Asset Classification purpose
The purpose of asset classification is to ensure that assets are properly identified and protected throughout their life-cycles.
Asset classifications inform handling instructions, control decisions, audit score, and regulatory compliance activity.
- Information assets are generally classified by content.
- Infrastructure and physical assets are generally classified by operational criticality.
Data Classification Schemas
- Government and Military
- Classifications for the private sector.
FIPS 199
Federal Information Processing Standard 199 (FIPS 199) requires that information and information systems be categorized as low, medium, or high security based upon confidentiality, integrity, and availability.
Government / Military Data Classifications.
- Top Secret (TS): Expected to cause exceptionally grave danger to national Security.
- Secret (S): Expected to cause serious damage to national security.
- Confidential: Expected to cause damage to national security.
- Unclassified: No threat to national interest.
Sensitive but Unclassified (SBU)
US federal agencies use the Sensitive byt Unclassified (SBU) designation when information is not classified but still needs to be protected and requires strict controls over its distribution.
Information System Asset
An information system asset is any data, device, or other component of the environment that supports information or information systems related activities.
- Information and information system assets should be assigned an owner and a custodian.
Asset Ownership Responsibilities
- Defining the asset.
- Assigning Value (AV).
- Classifying the asset.
- Confirming the level of protection required.
- Authorizing access rights and permissions.
- Authorizing disclosure.
- Ongoing governance.
Asset Custodian Responsibilities.
- Implementing protection mechanisms.
- Monitoring for problems or violations.
- Reporting suspected incident.
Asset Management
Asset Management is a set of activities that focus on th protection, accounting and integrity of infrastructure and physical:
Asset Management = Classification + Inventory + Configuration Management.
Inventory Management
Inventory Management is a set of policies, standards, and procedures used to maintain optimum inventory levels, track assets, and schedule replacements. Benefits:
- Tracking.
- Providing context for vulnerability and patch management.
Software Asset Management (SAM)
Software Asset Management (SAM) is the practice of managing the life-cycle of software assets within an organization. The two significant benefits of the SAM program are control and risk reduction.
Configuration Management (CM)
Configuration Management (CM) is a set of activities focused on establishing and maintaining the integrity of systems through control of the processes of initializing, changing, and monitoring the configurations.
Baseline Configuration.
A Baseline Configuration (BC) is a set of specifications for a configuration item (CI), that has been reviewed and agreed on (authorized), and which can be changed only through change control procedures.
Configuration Management
- Research | Plan.
- Approve Baseline Configuration.
- Assign CM version and update library.
- Implement.
- Configuration Changes.
- Monitor.
- Report.
- Repeat.
Commonly used privacy framework
OECD Privacy Principles.