Domain 2 Data Security Flashcards
Data Lifecycle
Create Store Use Share Archive Delete
Create Phase
New data created
Data added to system
Data modified
Classification should always be done
Store Phase
. Must be stored in a way that is usable
. First place where security controls are used for data at rest
. Ensure that all storage methods employ the tech necessary for the classification level
Use Phase
. Data is consumed and processed by an application or user
. Exposed in an unencrypted state
Share Phase
. Data is made available for use outside the system it was intended for
. Ensure proper protections are in place
Archive Phase
. Moving data to long term storage.
. Must be able to retrieve and recover
Destroy Phase
. Where data is either made inaccessible or permanently erased and protected.
. Method and approach being based on the classification and sensitivity
Overwriting
Cryptographic erasing
Storage Types - IaaS
.Volume - virtual hard drive, see live a traditional server model.
. Object - File storage that operates as an API or web service call.
. Files are stored as objects in an independent system and given a key value. for reference and retrieval
Storage Types - PaaS
Structured - data is organized and categorized in a way to be easily placed within a database or other storage system that is created with rule sets and a normalized design.
. Allows application developed to easily import from other data sources or non-productions
Unstructured - data that cannot be used or easily used in a rigid and formatted database structure.
. Multimedia, photos, MS office files
Storage Types - SaaS
Information and Storage Management - data within databases that the application uses and maintains
. generated by the application or imported via the application interfaces.
Content and file storage - allows for uploading of the data that is not part of the underlying database.
DLP Components
Discovery and classification - focuses on finding of the data that is pertinent to the DLP strategy and insuring that is know to the DLP.
. Determining the security classification
Monitoring - watching the data as it move through various states of usage to ensure used in appropriate and controlled ways.
Implementation - enforcement of policies and any potential violations
Data Security Strategies
. Encryption . Key Management . Masking . Obfuscation . Anonymization . Tokenization
Encryption
. Key management central challenge
. Ensures confidentiality, not integrity
. Applied to data at wholesale or granular level.
. For object storage applied at the file level.
Data Masking or Obfuscation
. Hide or remove data from sensitive data from data sets.
. Use random or substitute data
. Non-production and development environments
Static masking - a separate and distinct cope of data set is created with masking in place.
Dynamic masking - masking process is implemented between the application and data layers of the application.
Data Anonymization
Data is manipulated in a way to prevent the identification of an individual through the various data objects.