Domain 2 - Asset Security Flashcards
Regarding Information Classification, define Categorization.
– Process of determining the impact of loss of CIA of information to an organization.
Identifies the value of the data to the organization. Not all data has same value, demonstrates business commitment to security.
Identify which information is most sensitive and vital
Information classification : Criteria
Value, age, useful life, personal association
Information classification : Levels - Government, military
- Unclassified (have FOUO also)
- Sensitive but unclassified
- Confidential (some damage)
- Secret (Serious damage) (Can have Country specific restrictions also
– NZAUS SECRET for New Zealand, Australia and US secret)
- Top Secret (Grave damage)
Information classification : Levels - Private sector
- Public; used by public or employees
- Company Confidential; viewed by all employees but not for general use
- Company Restricted – restricted to a subset of employees
- Private; Ex. SSN, credit card info., could cause damage
- Confidential; cause exceptionally grave damage, Proprietary; trade secrets - Sensitive; internal business
TS = Confidential/Prop, Secret = Private, Confidential = sensitive
What is a Policy?
Policies are high-level management directives that are mandatory.
Senior management Statement of Policy
Stating importance, support and commitment
Types of Senior management Statement of Policy
Regulatory
Advisory
Informative
Regulatory Policy
Required due to laws, regulations, compliance and specific industry standards!)
Advisory Policy
Not mandatory but strongly suggested
Informative
To inform the reader
What is an Information Policy?
Classifications and defines level of access and method to store and transmit information
What are Securities Policy?
A document that defines the security requirements for an organization but it does not provide details how to fulfill the security needs or how to implement the policy.
Authenticates and defines technology used to control information access and distribution
Policies, standards, baselines, guidelines, and procedures.
What are Standards?
Specify use of specific technologies in a uniform way
Standards are tactical documents that define the steps or methods to accomplish the goals and overall direction defined by security policies.
What are Guidelines?
Same as standards but not forced to follow
Guidelines offer recommendations on how standards and baselines are implemented and serve as an operational guide for both security professionals and users.
What are Procedures?
Detailed steps to perform a task
A procedure is a detailed, step-by-step how-to document that describes the exact actions necessary to implement a specific security mechanism, control, or solution.
What is a Baseline?
Minimum level of security
Describe Security planning.
Involves security scope, providing security management responsibilities and testing security measures for effectiveness
Strategic
5 years
Tactical
Shorter than strategic
Operational
Day to day, short term
Data Classification Policy
- Who will have access to data?
- How is the data to be secured?
- How long is data to be retained?
- What method(s) should be used to dispose of data?
- Does data need to be encrypted?
- What is the appropriate use of the data?
IT Asset Management (ITAM)
Full life cycle management of IT assets - CMBD; holds relationships between system components
– incidents, problems, known error, changes, and releases
- Single repository - Organizationally aligned
- scalable
US-EU (Swiss) Safe Harbor
The EU Data Protection Directive To be replaced, in 2018, by the General Data Protection Regulation (GDPR) Bridge differences in approach and provide a streamlined means for U.S. organizations to comply with European Commissions.
General Data Protection Regulation (GDPR)
STRENGTHING INDIVIDUALS RIGHTS
- Data obtained fairly and lawfully
- Data only used for original purpose
- Adequate, relevant, and not excessive to purpose
- Accurate and up to date
- Accessible to the subject
- Kept secure
- Destroyed after purpose is complete
Directive on Data Protection; Seven Tenets
“Daisy DANCES”
“Daisy DANCES”
Disclosure Data Integrity Access Notice Consent Enforcement Security
- Notice; data subjects should be given notice when their data is being collected
- Consent; data should not be disclosed without the data subject’s consent
- Disclosure - Onward Transfer; data subjects should be informed as to who is collecting their data
- Security; collected data should be kept secure from any potential abuses
- Data Integrity; reliable, only stated purpose
- Access; data subjects should be allowed to access their data and make corrections to any inaccurate data
- Enforcement; accountability, data subjects should have a method available to them to hold data collectors accountable for not following the above principles
Data Processors
Example: When US Org classify and handle data
Data processors have responsibility to protect privacy of data
Business/Mission owners
EU company would be Business/Mission owners, US org. would also be Data Administrators
What are the Roles and responsibilities of the Information security Officer?
Functional responsibility
- Ensure policies etc. are written by app. Unit
- Implement/operate CIRTs
- Provide leadership for security awareness
- Communicate risk to senior management
- Stay abreast of current threats and technology
What is the role of a Security Analyst?
Strategic, develops policies and guidelines
Data Life
- Creation, use, destruction(subservient to security policy)
Roles and responsibilities of the Data/Information Owner
- Ultimate organizational responsibility for data
- Categorize systems and data, determine level of classification
- Required controls are selected for each classification
- Select baseline security standards
- Determine impact information has on organization
- Understand replacement cost (if replaceable)
- Determine who needs the information and circumstances for release
- Determine when information should be destroyed
- Responsible for asset - Review and change classification
- Can delegate responsibility to data custodian
- Authorize user privileges
Roles and responsibilities of the Data Custodian
- Day-to-day tasks, grants permission to users in DAC
- Adhere to data policy and data ownership guidelines
- Ensure accessibility, maintain and monitor security
- Dataset maintenance, , archiving
- Documentation, including updating
- QA, validation and audits
- Run regular backups/restores and validity of them
- Insuring data integrity and security (CIA)
- Maintaining records in accordance to classification
- Applies user authorization
- Implement security controls
Roles and responsibilities of the System Owners
Select security controls