Domain 2: Asset Security

  1. Asset Types
  2. Asset Classification
  3. Asset Storage
  4. Asset Security
  5. Data Classification
  6. Type of Data
  7. Data Stakeholders
  8. Data Remanence
  9. Data Destruction
  10. Scoping
  11. Tailoring
  12. Tokenization
  13. Anonymization
  14. Data Security
  15. Cloud Access Security Broker (CASB)
  16. Data Loss Prevention (DLP)

Asset Types

  • Tangible – anything you can physically touch. For e.g.: Laptops, Buildings
  • Intangible – anything of value that you can’t physically touch. For e.g.:
    • Trademarks
    • Trade Secrets
    • Copyrights
    • Patents

Asset Classification

  • Personally Identifiable Information – Can be used to distinguish an individual’s identity 
  • Personal Health Information – Processed by health organizations, schools, employer
  • SPI 

Asset Storage

Apply appropriate controls based on classification 

  • Encryption – AES256 
  • Physical Security
    • Safes 
    • Secure Rooms 
    • Cabinets 
    • HVAC 

Data is more valuable than the media 

  • Buy high quality media 
  • Buy media with built-in security

Asset Security

  • EOL – OEM will no longer manufacture a particular product
  • EOS – OEM will no longer provide service to a particular product

Data Classification

  • Confidential – Disclosure = damage 
  • Top Secret – Disclosure = exceptionally grave damage
  • Secret – Disclosure = serious damage
  • Private – Disclosure = grave damage
  • Public – Disclosure = no damage

Type of Data

  • Data at rest – Stored on media. E.g. data stored in hard drive
    • Controls – Symmetric Encryption
  • Data at motion – Moving across a network
    • Controls – Transport Encryption
  • Data in use – Data in temporary storage buffer while being used
    • Controls – Purging after use

Data Stakeholders

  • Business Owner – Senior executive that makes policy to govern data security
  • Data Owners – Management level who owns the data
  • Data Custodians – Technical people who do configurations
  • System Owner – Person who owns the hardware where data is kept

Data Remanence

Data left over after a removal and deletion process

Data Destruction

  • Shredding – Shred to 2 mm
  • Degaussing – Degaussing don’t work on SSD
  • Overwriting
  • Purging

Scoping

Portion of standards that will be applicable for organization

Tailoring

Customizing standards as per the organization’s need.

Tokenization

Using random string of characters in place of actual data

Anonymization

Process of removing all relevant data so that it is theoretically impossible to identify the original subject

Data Security

Digital Rights management

Protects copyright data by:

DRM license

  • License grants access to product and terms of use
  • Contains decryption key to access the product
  • Used for: Music, books,etc.

Cloud Access Security Broker (CASB)

Sits between cloud app users and cloud services to control access.

  • Network Based – Intercepts traffic to monitor and take actions
  • API Based – Blocks unauthorized queries via API

Data Loss Prevention (DLP)

Works using various mechanisms:

  • Pattern matching – Detects specific regular expressions and takes action as per the defined rule
  • Keyword based – Detects specific keyword like SPI, PII, etc. and block the communication
  • Network Based – Restrict email and other network sharing mechanisms
  • Endpoint based – Restricts copy and printing of data

Discover more from Information Security Blogs

Subscribe to get the latest posts sent to your email.

Leave a comment

Discover more from Information Security Blogs

Subscribe now to keep reading and get access to the full archive.

Continue reading