CEO Domain 2
Edit me

Certification Exam Outline

2.1 Identify and classify information and assets

classification is a critical first step to better and more secure asset and data management, providing valuable insight into an environment

  • Data classification civil vs mil+gov: public –> confidential, unclassified –> top secret
  • Asset Classification -inventory of assets & their owners/responsible persons

2.2 Determine and maintain information and asset ownership

  • data owners and data processors will have clearly outlined roles 2.3 Protect privacy
  • Data owners
  • Data processers
  • Data remanence
  • Collection limitation (Collection Limitation Principle: Collection of personal data should be limited, obtained by lawful and fair means, and with the knowledge of the subject.)

2.4 Ensure appropriate asset retention

  • applies to record & media: data is kept in a usable state while needed & destroyed when no longer needed
  • audit trail data must be kept to reconstruct past incidents
  • 2.5 Determine data security controls
  • Understand data states at rest/in motion/in use
  • Scoping and tailoring

SCOPING –> which portions of a standard will be used

TAILORING –> customize a standard to implement in an org

  • Standards selection

org need to ensure the controls comply w/ certain external security standards (PCI-DSS, GDPR for example)

need to identify the standards that apply and assure controls comply w/ them

  • Data protection methods
  • confidentiality –> encryption (at rest/in motion)
  • backups: full, differential (only data changed from last full), incremental (only changed data from last diff/full)
  • db mirroring, snapshots, availability zones (cloud), vaulting (physical)
  • data deduplication
  • RAID (0-6, 10)

2.6 Establish information and asset handling requirements

  • combinations of phy/adm/tech controls that assist security professionals in establishing the handling requirements for sensitive information and valued assets.
  • marking, handling, declassification, storage
  • declassify data –> remove/obfuscate sensitive elem: de-identification, obfuscation, anonymization, tokenization

Tags: domain_2