** These are my compiled notes from the Accelerated CISSP (2021) course put on by ITProTV **
CISSP Domain 2 - Asset Security
Key Points
- Classification and Categorization
- Data owners are responsible for classifying data, making sure it is labelled in such a way that only authorized subjects are able to interact with it.
- The value that data has as an asset to the organization, ensuring that if the data became inaccessible for any reason, that we understand the impact of the loss; allows us to assign value upfront and apply appropriate controls and countermeasures
- How to manage sensitive information
- importance of asset labelling; everyone should know what classification of data is on the media
- Data/retention policies
- help us understand the lifecycle and scope of the data
- Data policy
- how to govern and manage data
Asset Inventory Classification Labeling Handling - Data Classification Schemes (2 types - Government and Private Sector)
- Government
- Top Secret
- Secret
- Confidential
- Unclassified
- Private Sector
- Confidential
- Private
- Sensitive
- Public
- Government
- NIST NICE Framework: Securely Provision (SP) NICE Specialty Areas
- Risk Management (RSK)
- Software Development (DEV)
- Systems Architecture (ARC)
- Technology R&D (TRD)
- Systems Requirements Planning (SRP)
- Test & Evaluation (TST)
- Systems Development (SYS)
- Data Lifecycle Management (DLM) vs. Information Lifecycle Management (ILM)
- Data Management Lifecycle (PLAN + 5 Phases)
- PLAN FIRST!!
- Data Creation
- Storage
- Usage/Share
- Archival
- Destruction
- ILM is focused on the accuracy of the data
- DLM focusses on the lifecycle of the data overall
- Data Management Lifecycle (PLAN + 5 Phases)
- QA (external) vs. QC (internal) & Collection Limitation on data
- QA makes sure we align with external standards and regulations to prove that we are building and doing things in an appropriate fashion
- QC focusses on standards driven internally by the organization and making sure we are meeting internal quality goals
- Collection limitations, particularly around PII and PHI; cannot use data outside what has been communicated and agreed to with the data subject
- Roles to know:
- Data Subject - subject of personal data
- Data Owner - master of all
- Data Controller - determines processing purpose(s)
- Data Processor - managers of all (on behalf of the controller)
- Data Custodian - custody, transport, storage & business rules
- Data Steward - fitness of data elements; integrity and accuracy
- Administrator - grants permissions / access to data
- Data, data, data - Remanence & Sanitization
- Clearing - basic built-in tools; formatting; cleaning the surface (used when recycling the media for use in the same classification zone)
- Purging - multi-overwriting; low-level formatting
- Destruction
- Overwriting
- Degaussing
- Encryption
- Crypto-Shredding or Crypto-Sharding
- encrypting data, re-encrypting it, separating the data from the key, and destroying
- used in cloud environments when you do not actually have access to the data
- Physical Destruction
- Chemical ALteration
- Phase Shift/transition (Curie Temp)
- ** SSD and HDD cannot be handled the same way; SSD cannot simply format, must use built-in vendor tools i.e. Secure Erase
- Simple Delete = Erase
- ** Cloud data - encrypt data while in storage and use ==> upon exit crypto-shred remaining data
- Asset Retention - What are the stages?
- GA/Sale Date
- End of Life/End of Sale
- End of Development
- End of Service Life/End of Support
- End-of-Life Management
- Maintaining inventories
- Approved end-of-life or sunset policy
- Tracking changes, availability of updates, and end of support
- Risk assessments to determine end-of-life; may need to keep an asset around after vendor EoL given business requirements and risk appetite
- Plan for the replacement of systems and comply with policy requirements
- Procedures for secure destruction or data wiping of hard drives
- Data States
- ** Data exists in 3 well defined states:
- At Rest (Storage)
- In Motion (Transmit/on the wire)
- In Use (Application in Memory)
- ** Data exists in 3 well defined states:
- Link vs. End-to-End Encryption
- Link encryption secures all elements of the data package
- End-to-End encryption only secures the data payload/message
- Scoping & Tailoring (Supplementation)
- Scoping is about what is covered and what is excluded
- Tailoring is how we modify and customize the scope to make a one-size-fits-one solution
- Supplementation is used to add in and bring additional things that allow us to create an exact solution to what is needed
- Allow us to determine what controls are required and how to best apply them to deal with risk
- Standards…
- ISO
- NIST
- CIS Controls
- Basic
- Foundational
- Organizational
- NIST SCAP (Security Content Automation Protocol)
- Assessment platform that helps us understand the current state of our systems, looking for gaps or weaknesses, and identifying them for remediation
- Data Protection Methods (Digital Rights Management (DRM), Data Loss Prevention (DLP), Cloud Access Security Broker (CASB))
- At Rest (Storage)
- Encryption
- Obfuscation/Tokenization
- Archive/Disposal/Destruction
- Mobile Device Protection
- Physical Media Control
- In Motion (Transit)
- Encryption
- Perimeter Security
- Web Content Filtering
- NEtwork Traffic Monitoring
- VPN’s
- In Use (Application)
- Encryption
- User Monitoring
- Workstation Restrictions
- Application Controls (whitelist/blacklist)
- Data Labeling
- At Rest (Storage)