CISSP Domain2 - 2024
CISSP Domain2 - 2024
2024
Asset Security
Gizli 1
Topics
10.04.2024
Gizli 2
Data Classification
10.04.2024
Gizli
Data Classification (cont’d)
Gizli
Asset Identification and Valuation
• Effective resource
valuation is best based on
loss scenarios.
Provide identification and classification
of assets that need protection: • Apply a consistent
approach to prioritize
Inventory information assets efforts ahead of
calculating exact valuation
Determine relative business value figures.
• Consider the range of
Leverage classification and potential loss and impacts:
justification for protection
• Cost to create or restore
Discover possible unidentified
assets • Contribution to revenue
• Legal or regulatory
sanctions
©2022 ISACA. All rights reserved.
Gizli
Sensitive Data
10.04.2024
Gizli 7
Government Data Classification
10.04.2024
Classification Description
Top Secret Disclosure of top secret data would cause severe damage
to national security.
Secret Disclosure of secret data would cause serious damage to
national security. This data is considered less sensitive than
data classified as top secret.
Sensitive But SBU data is data that is not considered vital to national
Unclassified (SBU) security, but its disclosure would do some harm. Many
agencies classify data they collect from citizens as SBU. In
Canada, the SBU classification is referred to as protected
(A, B, C).
Unclassified Unclassified is data that has no classification or is not
sensitive.
Gizli 8
COMMERCIAL DATA CLASSIFICATIONS
10.04.2024
ClassificationDescription
Sensitive Data that is to have the most limited access and requires a high degree
of integrity. This is typically data that will do the most damage to the
organization should it be disclosed.
Confidential Data that might be less restrictive within the company but might cause
damage if disclosed.
Private Private data is usually compartmental data that might not do the
company damage but must be keep private for other reasons. Human
resources data is one example of data that can be classified as private.
Gizli 9
Criteria for Setting Data Classification
10.04.2024
Gizli 10
Asset Classification Questions
• How many classification levels are • What is the life cycle of the information?
suitable for
• What are the processes associated with
the enterprise?
the
• How will information be located? various stages in the information asset
life cycle?
• What process is used to determine
classification? • How will it be retained according to policy
or law?
• How will classified information be
identified? • How will it be safely destroyed at the end
of the retention period?
• How will it be marked?
• Who has ownership of information?
• How will it be handled?
• Who has access rights?
• How will it be transported?
• Who has authority for determining access
• How will confidential information be
to the data?
stored
and archived? • What approvals are needed for access?
Gizli
Question
A. Threat analysis
B. Impact assessment
C. Controls evaluation
D. Penetration testing
Gizli
Question
Gizli
Question
14
Gizli
Question
A. establish ownership.
B. perform a criticality analysis.
C. define access rules.
D. create a data dictionary.
Gizli
Asset Classification
10.04.2024
Gizli 16
Information and Asset Handling Requirements
10.04.2024
Gizli 17
DLP Solutions
• Data at rest
• Data in motion
• Data in use
• Policy creation and management
• Directory services integration
• Workflow management
• Backup and restore
• Reporting
• DLP risk, limitations and
considerations
Gizli
Data Leakage
Gizli
Information and Asset Handling Requirements
10.04.2024
Gizli 20
Secure Data Destruction
10.04.2024
Gizli 21
Secure Provision of Resources
10.04.2024
• Data Owner
• Data Custodian
• Data Stewart
• Systems Owners
• Administrators
• End User
Gizli 23
Data Owner
10.04.2024
Gizli 24
Data Custodian
10.04.2024
Gizli 25
Data Steward
10.04.2024
Gizli 26
Data Quality
Contextual
Security/
Intrinsic
accessibility
Data
Quality
27
Gizli
Systems Owners/Administrators/End Users
10.04.2024
• System Owners
– Apply Security Controls
• System Administrators
– Grant permission for data handling
• End Users
– Uses information for their tasks/jobs
– Adhere security policies and procedures
Gizli 28
BREAK
Gizli
Manage Data Lifecycle
10.04.2024
• Data Collection
• Data Location
– the location of data backups or data copies
• Data Maintenance
– managing data as through the data lifecycle (creation,
usage, retirement).
– Data maintenance is the process (often automated) of
making sure the data is available (or not available) based
on where it is in the lifecycle
Gizli 30
Data Life Cycle
Plan
Dispose Design
Monitor Build/acquire
Use/operate
31
Gizli
Asset Retention
10.04.2024
Gizli 32
Asset Retention (e.g. EOL, EOS)
10.04.2024
Gizli 33
Data States
10.04.2024
• Data at rest: any data stored on media such as hard drives or external
media
• Data in transit: any data transmitted over a network
• Encryption methods protect data at rest and in transit
• Data in use: refers to data in memory and used by an application
• Applications should flush memory buffers to remove data after it is no
longer needed
Gizli 34
Data Security Controls & Compliance Requirements
10.04.2024
Gizli 35
Scoping and Tailoring Security Controls
10.04.2024
Gizli 36
Security Standards Selection
10.04.2024
• Standards Selection
• Organizations need to identify the standards (e.g. PCI DSS, GDPR etc) that
apply and ensure that the security controls they select fully comply with
these standards
• Even if the organization doesn't have to comply with a specific standard,
using a well-designed community standard can be helpful (e.g. NIST SP
800 documents)
• Standards selection is the process by which organizations plan, choose and
document technologies or architectures for implementation. (For example,
you might evaluate three vendors for a security control; you could use a
standards selection process to help determine which solution best fits the
organization)
• Vendor selection is closely related to standards selection but focuses on
the vendors, not the technologies or solutions
• The overall goal is to have an objective and measurable selection process.
If you repeat the process with a totally different team, the alternate team
should come up with the same selection
Gizli 37
Data Protection Methods
10.04.2024
Gizli 38
Question
A.Pseudonymization
B.k-anonymization
C.Hashing
D.Data minimization
Gizli
Review Question - Discussion
Gizli
Question
Gizli
Question
A. Data in use
B. Data in archived status
C. Data at rest
D. Data in motion
42
Gizli
Question
A. Erasing
B. Destruction
C. Degaussing
D. Purging
43
Gizli
Question
A. RAM
B. Network transmission
C. SSD
D. Magnetic disk
44
Gizli
Question
A. System owner
B. Business owner
C. Asset owner
D. Data owner
45
Gizli
Question
A. Persistence
B. Continous audit trail
C. Automatic expiration
D. Virtual licensing
46
Gizli
Question
47
Gizli
Question
49
Gizli