Domain 2: Asset Security- CISSP Notes 2019

Published by

on

Types of Sensitive Data:

  • Personally Identifiable Information
  • Protected Health Information
  • Proprietary Data

Classifying Data:

  • The day-to-day management of access control requires management of label
  • These formal mechanisms are typically used to protect highly sensitive data.
  • Categorization – Process of determining the impact of loss of CIA of information to an organization

Government:

  • Top Secret” – grave damage to national security.
  • Secret” – cause serious damage to national security.
  • Confidential” – damage to national security
  • “Unclassified” – Public release from Govt officials.

Private sector:

  • confidential (or proprietary),” – grave damage to private organizations.
  • private,” – cause serious damage to private organizations.
  • sensitive,” – damage to private organizations
  • “public” – Posted posts in company official websites.

Ownership

  • Primary information security roles include business or mission owners, data owners, system owners, custodians, and users.
  • BUSINESS OR MISSION OWNERS – senior management
  • DATA OWNERS – information owner.
  • The system owner is a manager who is responsible for the actual computers that house data.
  • A custodian provides hands-on protection of assets, such as data.
  • Users must follow the rules; they must comply with mandatory policies, procedures, standards, etc.
  • Data controllers create and manage sensitive data within an organization.
  • Data processors manage data on behalf of data controllers.
  • Organizations should collect the minimum amount of sensitive information that is required.

Memory and Remanence

  • It is important to understand data remanence when discussing media sanitization and data destruction.
  • RAM is volatile memory used to hold instructions and data of currently running programs. It loses integrity after loss of power.
  • ROM is nonvolatile; data stored in ROM maintains integrity after loss of power.
  • SRAM is fast, expensive memory that uses small latches called “flip-flops” to store bits.
  • Flash memory, such as a USB thumb drive.
  • programmable read-only memory (PROM),
  • erasable programmable read-only memory (EPROM)
  • PROM can be written to once, typically at the factory. EPROM and EEPROM may be “flashed,” or erased and written to multiple times.
  • A SSD is a combination of flash memory (EEPROM) and
  • This issue is called data remanence, referring to “remnants” of data left behind.
  • OVERWRITING – Simply “deleting” a file removes the entry from a file allocation table (FAT) and marks the data blocks as “unallocated.” Reformatting a disk destroys the old FAT and replaces it with a new one.
  • Degaussing – destroys the integrity of magnetic medium, such as a tape or disk drive.
  • Destruction physically destroys the integrity of media by damaging or destroying the media itself, such as the platters of a disk drive.
  • SHREDDING: A simple form of media sanitization is shredding, a type of physical destruction.

Data Security Controls

  • OCTAVE® stands for Operationally Critical Threat, Asset, and Vulnerability Evaluation, a risk management framework from Carnegie Mellon University. OCTAVE® describes a three-phase process for managing risk.
  • Phase 1 identifies staff knowledge, assets, and threats.
  • Phase 2 identifies vulnerabilities and evaluates safeguards.
  • Phase 3 conducts the risk analysis and develops the risk mitigation strategy.
  • The Common Criteria uses specific terms when defining specific portions of the testing process.
  • Target of evaluation (ToE): The system or product that is being evaluated
  • Security target: The documentation describing the ToE, including the security requirements and
  • operational environment
  • Protection profile: An independent set of security requirements and objectives for a specific
  • category of products or systems, such as firewalls or intrusion detection systems
  • Evaluation assurance level (EAL): The evaluation score of the tested product or system
  • The Common Criteria levels are
  • EAL1: Functionally tested
  • EAL2: Structurally tested
  • EAL3: Methodically tested and checked
  • EAL4: Methodically designed, tested, and reviewed
  • EAL5: Semi Formally designed, and tested
  • EAL6: Semi Formally verified, designed, and tested
  • EAL7: Formally verified, designed, and tested 6.
  • ISO 17799 was a broad-based approach for the information security code of practice by the International Organization for Standardization.
  • ISO/IEC 17799:2005 Information technology—Security Techniques—Code of Practice for Information Security Management. Changed to ISO 27002 in 2005.
  • ISO/IEC 27001:2005 Information technology—Security techniques—Information Security Management Systems—Requirements.
  • COBIT is a control framework for employing information security governance best practices within an organization – ISACA.
  • ITIL® (Information Technology Infrastructure Library) is a framework for providing best services in IT Service Management
  • Tailoring is the process of customizing a standard for an organization.

Destroying Sensitive Data:

  1. Erasing:Erasing media is simply performing a delete operation against a file, a selection of files, or the entire media.
  2. Clearing:Clearing, or overwriting, is a process of preparing media for reuse and ensuring that the cleared data cannot be recovered using traditional recovery tools.
  3. Purging:Purging is a more intense form of clearing that prepares media for reuse in less secure environments. It provides a level of assurance that the original data is not recoverable using any known methods.
  4. Degaussing: A degausser creates a strong magnetic field that erases data on some media in a process called degaussing. Technicians commonly use degaussing methods to remove data from magnetic tapes with the goal of returning the tape to its original state.
  5. Destruction:Destruction is the final stage in the life cycle of media and is the most secure method of sanitizing media. When destroying

Security policies, standards & guidelines:

  • Policies first and highest level of documentation.
  • Regulatory (required due to laws, regulations, compliance and specific industry standards!)
    Advisory (not mandatory but strongly suggested
    Informative to inform the reader
  • Standards – Specify use of specific technologies in a uniform way.
  • Guidelines – same as standards but not forced to follow.
  • Procedures – detailed steps to perform a task.
  • Baseline – minimum level of security
  • Security planning – involves security scope, providing security management responsibilities and testing security measures for effectiveness.

US-EU (Swiss) Safe Harbor:

  • The EU Data Protection Directive To be replaced, in 2018, by the General Data Protection Regulation (GDPR).Bridge differences in approach and provide a streamlined means for U.S. organizations to comply with European Commissions.

XMIND Diagram:

XMIND Protecting Security of Assets
Asset security

 

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.