Notes for Domain 2
Edit me
SENSITIVITY --> amount of damage that would be done if info is disclosed
CRITICALITY --> time sensitivity of data - how much revenue the asset generates; damage done if info unavailable
Data classification policies
- FORMAL ACCESS APPROVAL –> data owner approves access (written document)
- NEED TO KNOW –> (applied to DATA) need VALID reason to access the data
- LEAST PRIVILEGE –> (applied to ACTIONS) users have minimum necessary access to perform their job duties
Sensitive information
- DATA HANDLING –> policies for HOW/WHERE/WHEN/WHY data was handled
- DATA STORAGE –> where is data kept
- DATA RETENTION –> not kept beyond its period of usefulness/legal req’s
STATES OF DATA
state | protection method |
---|---|
at rest | FS encryption |
in use | physical security, screen protectors |
in transit | SSL/TLS (VPN, IPv6 built-in encryption |
THREATS TO DATA AT REST (on storage)
threat | countermeasure |
---|---|
unauth usage/access | - strong auth |
- encryption | |
- obfuscation, anonymization, tokenization, masking | |
- org policies & layered defence | |
liability due to non compliance | - due care & due diligency |
- SLAs | |
DoS/DDoS | - redundancy |
- data dispersion | |
corruption, modification, destruction of data | - hashes/digitally signed files |
data leakage/breaches | - DLP - Data Loss Prevention |
theft/accidental media loss | - encryption |
malware attack | - anti-malware |
improper sanitization at end of data lifecycle | - destroy data if end of life |
DATA DISPERSION --> data replicated in multiple physical locations (cloud).
DATA FRAGMENTATION --> dataset split into smaller fragments (shards) distributed across several servers
DLP - Data Loss/Leakage Prevention
- controls put in place to ensure that certain types of data remain under org control in line w/ policies/standards/procedures
- help ensure compliance w/ PCI-DSS, HIPAA, etc
OBFUSCATION --> hide/replace/omit sensitive info MASKING --> use specific chars to hide parts of a dataset DATA ANONYMIZATION --> encrypt/remove PII from datasets TOKENIZATION --> access to tokenized data, not real data PSEUDONYMIZATION --> aliases to represent other data (id instead of username)
DRM - DATA rights management
- aka IRM - Information Rights Management
- extra layer of access controls on top of the data object to control print/save/copy/etc.
- travels w/ the data, agnostic of its location; IRM travels w/ the file
DATA REMANCENCE residual data that remains on storage/memory after a file/data has been deleted/erased.
ILM - Information Lifecycle Management
stage | remarks |
---|---|
CREATION | -classified & owner is assigned |
DISTRIBUTION | - “data in motion” |
- vulnerable to compromise | |
- encryption, DLP (Data Loss Prevention) technologies | |
USE | -“data in use” |
- accessed by user/app & actively being used | |
- must be accessed only on auth systems by auth ppl | |
MAINTENANCE | - “data at rest” |
- data on any kind of storage for backup, archive, etc. | |
- review of classif levels, encryption | |
- protect for CIA | |
- Confidentiality: system/dir/file permissions & encryption | |
- Integrity: hashes, CRC, file locking | |
- Availability: db/file clustering, backup, real-time replication | |
DISPOSITION | - data has no longer value –> properly destroyed |
Removing data remnants
- ERASING –> OS delete, only marks storage space as unavailable (if not overwritten, can be read)
- CLEARING –> overwriting, data inaccessible by normal means
- PURGING –> data overwritten several times
- DEGAUSSING –> magnetic field; ineffective against SSD’s
- DESTRUCTION –> phy destruction, **irreversible
CONTROL SELECTION FRAMEWORKS
- PCI-DSS
- ISO 27001/2
- OCTAVE —> self-directed risk management
- COSO –> goals for the entire organisation
- COBIT –> goals for IT
- ITIL –> IT service mgmt
- FRAP –> Facilitated Risk Analysis Process
SCOPING --> which portions of a standard will be used
TAILORING --> customize a standard to implement in an org
CERTIFICATION --> certified to meet the security reqs of the data owner
ACCREDITATION --> data owner's acceptance of certification & residual risk, before it goes into prod
SECURITY MARKING –> use of human-readable security attr; reflects laws, policies, standards; enable organisational process-based enforcement of policies
SECURITY LABELING –> use of security attr for internal data structures withing information systems
GDPR
data processor | processes personal data on behalf of data controller |
data controller | controls processing |
data transfer | not outside EU |
anonymization | remove all relevant data to make id of the subject impossible (if done ok, GDPR is no longer relevant; data is modified |
pseudonymization | use aliases to represent other data |
Security Test & Evaluation Program
- req’d for certif & accred of all US gov agencies according to FISMA
- management controls –> risk mgmt & management of info sec (perform risk assess/ensure inventory of all assets exists)
- operational controls –> processes exec/implem by people (sec training program/AUP signed)
- technical controls –> processes implem/exec by hw/sw mech. (change passwd regularly/logon display)