Domain 2 - Asset Security Flashcards
Regarding Information Classification, define Categorization.
– Process of determining the impact of loss of CIA of information to an organization.
Identifies the value of the data to the organization. Not all data has same value, demonstrates business commitment to security.
Identify which information is most sensitive and vital
Information classification : Criteria
Value, age, useful life, personal association
Information classification : Levels - Government, military
- Unclassified (have FOUO also)
- Sensitive but unclassified
- Confidential (some damage)
- Secret (Serious damage) (Can have Country specific restrictions also
– NZAUS SECRET for New Zealand, Australia and US secret)
- Top Secret (Grave damage)
Information classification : Levels - Private sector
- Public; used by public or employees
- Company Confidential; viewed by all employees but not for general use
- Company Restricted – restricted to a subset of employees
- Private; Ex. SSN, credit card info., could cause damage
- Confidential; cause exceptionally grave damage, Proprietary; trade secrets - Sensitive; internal business
TS = Confidential/Prop, Secret = Private, Confidential = sensitive
What is a Policy?
Policies are high-level management directives that are mandatory.
Senior management Statement of Policy
Stating importance, support and commitment
Types of Senior management Statement of Policy
Regulatory
Advisory
Informative
Regulatory Policy
Required due to laws, regulations, compliance and specific industry standards!)
Advisory Policy
Not mandatory but strongly suggested
Informative
To inform the reader
What is an Information Policy?
Classifications and defines level of access and method to store and transmit information
What are Securities Policy?
A document that defines the security requirements for an organization but it does not provide details how to fulfill the security needs or how to implement the policy.
Authenticates and defines technology used to control information access and distribution
Policies, standards, baselines, guidelines, and procedures.
What are Standards?
Specify use of specific technologies in a uniform way
Standards are tactical documents that define the steps or methods to accomplish the goals and overall direction defined by security policies.
What are Guidelines?
Same as standards but not forced to follow
Guidelines offer recommendations on how standards and baselines are implemented and serve as an operational guide for both security professionals and users.
What are Procedures?
Detailed steps to perform a task
A procedure is a detailed, step-by-step how-to document that describes the exact actions necessary to implement a specific security mechanism, control, or solution.
What is a Baseline?
Minimum level of security
Describe Security planning.
Involves security scope, providing security management responsibilities and testing security measures for effectiveness
Strategic
5 years
Tactical
Shorter than strategic
Operational
Day to day, short term
Data Classification Policy
- Who will have access to data?
- How is the data to be secured?
- How long is data to be retained?
- What method(s) should be used to dispose of data?
- Does data need to be encrypted?
- What is the appropriate use of the data?
IT Asset Management (ITAM)
Full life cycle management of IT assets - CMBD; holds relationships between system components
– incidents, problems, known error, changes, and releases
- Single repository - Organizationally aligned
- scalable
US-EU (Swiss) Safe Harbor
The EU Data Protection Directive To be replaced, in 2018, by the General Data Protection Regulation (GDPR) Bridge differences in approach and provide a streamlined means for U.S. organizations to comply with European Commissions.
General Data Protection Regulation (GDPR)
STRENGTHING INDIVIDUALS RIGHTS
- Data obtained fairly and lawfully
- Data only used for original purpose
- Adequate, relevant, and not excessive to purpose
- Accurate and up to date
- Accessible to the subject
- Kept secure
- Destroyed after purpose is complete