Cissp d2 Slides
Cissp d2 Slides
2
Course Agenda (continued)
3
Domain 2
Asset Security
4
Domain Objectives
1. Understand key asset terms such as assets, information, data,
resources, etc.
2. Explain how security controls are dictated by the value of
assets, including information.
3. Understand that information/data is only one example of
valuable assets that organizations need to protect based on
the value of those assets to the organization.
4. Explain how asset classification drives the protection of assets
based on value.
5. Describe the asset lifecycle.
5
Domain Objectives (continued)
6. Understand how data classification and categorization applies to
the asset lifecycle.
7. Understand the importance of establishing accountability and
responsibilities for information ownership and custodianship.
8. Explain accountabilities and responsibilities for protection of assets
by owner, custodians, stewards, controllers, and processors.
9. Explain key terms associated with asset protection.
10. Understand how privacy of personal information is affected by
today’s technologies.
6
Domain Objectives (continued)
11. Explain the expectations of subjects according to privacy laws
and regulations.
12. Explain the importance of the Organization for Economic
Cooperation and Development (OECD) guidelines on Privacy
Protection.
13. Express the eight principles for privacy protection according to
the OECD guidelines.
14. Understand the concept of collection limitation as it applies to
privacy.
15. Understand asset retention and how retention policies are driven
by organizational requirements.
7
Domain Objectives (continued)
16. Explain the reasons that drive data and records retention,
including compliance or organizational requirements.
17. Understand the issues associated with long-term storage of assets.
18. Define baseline protection.
19. Explain how baselines can help an organization achieve minimum
levels of security associated with valuable assets.
20. Understand how baselines include security controls and how to
implement them.
21. Describe baseline protection and scoping and tailoring in
reference to asset protection.
8
Domain Objectives (continued)
22. Understand the different data states and explain how to
secure each.
23. Explain the difference between end-to-end and link encryption
as it relates to data in motion.
24. Understand how media requires controls to protect its content.
25. Understand labeling and marking requirements of assets that
have been classified.
26. Understand how the handling of media and assets that have
been classified should be allowed only to those that are
authorized.
9
Domain Objectives (continued)
27. Understand how storing, retention, and destruction of assets
is dictated by classification.
28. Understand data remanence and its impact to the value of
assets.
29. Explain the various options in addressing data remanence,
including clearing, purging, and destruction.
30. Explain methods used to clear, purge, and destroy data.
10
Domain Agenda
Asset Lifecycle
Protect Privacy
Asset Retention
11
Domain Agenda (continued)
Data Remanence
Domain Review
12
Module 1
Information and Assets
13
Module Objectives
14
Assets, Information, and Resources
Assets Resources
Value
15
Assets, Information, and Other Valuable Resources
Value of Protection of
an Asset Valuable Assets
• Quantitative • Should be
• Qualitative based on the
value
16
Examples of Valuable Assets
Corporate
People Reputation/Bran Products
d
Information/
Architectures Processes
Data
Intellectual
Hardware Software
Property/Ideas
17
Identification/Discovery and Classification of Assets
Based on Value
Identify/Discover Assets Asset Classification
18
Classification Process
19
Process of Protection of Valuable Assets Based on
Classification
Identify and Locate Classify Based Protect Based on
Assets Including on Value Classification
Information
20
Module 2
Asset Lifecycle
21
Module Objectives
22
Asset Lifecycle
Steps:
1. Identify & Classify
2. Secure & Store
3. Monitor & Log
4. Recover
5. Disposition
6. Archive
OR
6. Destruction
23
Asset Lifecycle
24
Differences between Classification and Categorization
Classification Categorization
26
Categorization
The process of determining the impact of the loss of confidentiality,
integrity, or availability of the information to an organization.
27
Data Classification Policy
Who will have How the data How long the data
access to the data is secured is to be retained
28
Activity: Applying Policy Considerations in
Your Organization
INSTRUCTIONS
Working with a partner, discuss how you would apply each of the
policy considerations in your organization.
Who has access How the data How long the data
to the data is secured is to be retained
29
Examples of Classification Levels
30
Classification – Done by Owners
• The individual who owns the data should decide the classification
• Owners should review the classification on a regular basis and
adjust based on value at that particular time
o Classification system should allow the increase or decrease in
classification
o Change needs to be documented to allow system to adjust based
on new classification
31
Purpose of Asset Classification
32
Purpose of Asset Classification (continued)
33
Classification Benefits
34
Issues Related to Classification
36
Module Objectives
37
Asset Protection and Classification Terminology
The following are key terms associated with asset management:
• Data subject
• Data owner
• Data custodian
• Data steward
• Personal data
• Processing
• Data controller
• Data processor
38
Data Ownership
39
Information Owner
The data owner typically has the following example accountabilities:
• Determine the impact the information has on the mission of the
organization.
• Understand the replacement cost of the information (if it can be
replaced).
• Know when the information is inaccurate or no longer needed and
should be destroyed.
• Determine who has a need for the information and under what
circumstances the information should be released.
40
Data Custodianship
Typical responsibilities include the following:
• Adherence to appropriate and relevant data policies, standards,
procedures, baselines and guidelines
• Ensuring accessibility to appropriate users, maintaining appropriate
levels of data security
• Fundamental data maintenance, including but not limited to data
storage and archiving
• Data documentation, including updates to documentation
• Assurance of quality and validation of any additions to data, including
supporting periodic audits to ensure ongoing data integrity
41
Difference Between Data Owner/Controller and
Data Custodian/Processor
42
Difference Between Data Owner/Controller and Data
Custodian/Processor (continued)
Data Owner/Controller Data Custodian/Processor
The natural or legal person, public The processor processes data on
authority, agency or any other body behalf of the owners (example
that alone or jointly with others cloud provider). Therefore, is
determines the purposes and means responsible for the adherence of
of the processing of personal data; policies, standards, procedures,
where the purposes and means of baselines, and guidelines to ensure
processing are determined by national protection while in their custody.
or community laws or regulations, the
controller or the specific criteria for
his nomination may be designated by
national or community law.
43
Activity: Understanding Accountability and
Responsibility
INSTRUCTIONS
Fill in each of the spaces with either the word “accountable” or
“responsible” as it relates to protection of data and each of the roles:
44
Activity: Understanding Accountability and
Responsibility – Answers
INSTRUCTIONS
Fill in each of the spaces with either the word “accountable” or
“responsible” as it relates to protection of data and each of the roles:
45
Module 4
Protect Privacy
46
Module Objectives
47
Privacy – Introduction
• Individuals should have control over their personal information
• According to many data protection laws, personal information must be
o Obtained fairly and lawfully
o Used only for the original specified purpose
o Adequate, relevant, and not excessive to purpose
o Accurate and up to date
o Not kept longer than necessary
o Accessible to the subject
o Kept secure
o Not transmitted to a country without adequate level of protection
48
OECD Privacy Guidelines
The OECD guideline principles are as follows:
Purpose
Collection Data Quality Use Limitation
Specification
Limitation Principle Principle Principle
Principle
Individual
Security Safeguards Openness Accountability
Participation
Principle Principle Principle
Principle
49
Example – Collection Limitation Principle
50
Module 5
Asset Retention
51
Module Objectives
52
Establishing Information Governance and Retention
Policies
53
Building Effective Archiving and Data Retention
Policies
Involve all stakeholders in the process
54
Creating a Sound Record Retention Policy
55
Creating a Sound Record Retention Policy
(continued)
Train staff
56
Activity: Review an Organization’s Sample
Policy
INSTRUCTIONS
• Working with a partner, review the following sample policy
• For your assigned section, note your ideas about why each
aspect of the policy is in place or the risks to the organization
if the policy is not implemented
• Be prepared to share your thoughts with the group
57
Important Considerations
• Who needs access to archived data and why?
How fast do they need it?
• Do access requirements change as the archives age?
• How long do we need to keep the archived data? When
should it be disposed of or deleted?
58
Best Practices
59
Examples of Data Retention Policies
60
Examples of Data Retention Policies
(continued)
61
Module 6
Data Security Controls
62
Module Objectives
63
Baselines
64
Example Baselines and How They Can Be Used to Enforce
Security Controls
Classification Access Encryption Labeling Monitoring
High – Strong passwords – 128 bit symmetric – Electronic – Real time using
– Asset owner encryption for watermark SIEM
approves request, creation, – Physical
review, and data-in-motion, watermark
termination data-at-rest
– NDA
66
Considerations
Which parts of the
Should the same
enterprise or
baseline be applied
systems can be
throughout the
protected by the
whole enterprise?
same baseline?
67
Objective of Baseline Protection
• Establish a minimum set of safeguards to protect assets
that have value.
68
Baseline Catalogs
69
Generally Accepted Principles
70
Generally Accepted Principles (continued)
71
Scoping and Tailoring
72
Case: Standards Selection Review
INSTRUCTIONS
Working on your own, review your assigned standards and prepare
to introduce them to the rest of the class
73
CSIS 20 Critical Security Controls Initiative
The five “critical tenets”:
Offense Informs
Prioritization Metrics
Defense
Continuous
Automation
Monitoring
74
Current List of Critical Security Controls – Version 5.1
https://www.cisecurity.org/documents/CSC-MASTER-VER5.1-
10.7.2014.pdf
75
NIST Security Content Automation Protocol (SCAP)
Multi-purpose
Suite of specifications framework of
specifications
76
SCAP Version 1.2 Categories
Reporting
Languages Enumerations
Formats
Measurement
and Scoring Integrity
Systems
77
Framework for Improving Critical Infrastructure
Cybersecurity
Common taxonomy for organizations to
• Describe their current cybersecurity posture
• Describe their target state for cybersecurity
• Identify and prioritize opportunities for improvement within the
context of a continuous and repeatable process
• Assess progress toward the target state
• Communicate among internal and external stakeholders about
cybersecurity risk
78
Framework Components
Framework Core is a set of cybersecurity activities, desired
outcomes, and applicable references that are common across
critical infrastructure sectors.
79
Framework Components (continued)
Framework
Implementation Framework Profile
Tiers
80
Data States
81
Protection of Data
• Data protection involves both data at rest, in motion, or
in use
82
Data at Rest
Backup data, off-site storage, password files, and many other types
of sensitive information need to be protected
83
Data at Rest – Description of Risk
Malicious actors may
• Affect confidentiality, integrity, and availability
• Examples:
o Gain unauthorized physical or logical access to assets
o Transfer information from the device to an attacker’s system
o Perform other actions that jeopardize the confidentiality of the
information on a device
84
Data at Rest – Recommendations
85
Data at Rest – Recommendations (continued)
Do not write down the password and store it at the same location
as the storage media
86
Data at Rest – Recommendations (continued)
87
Data in Transit
Prevent the contents of the message from being revealed even
if the message itself was:
• intercepted
• in transit
88
Link Encryption
• Link encryption encrypts all of the data along a communications
path
• Performed by service providers
89
End-to-End Encryption
• Data is encrypted at the start of the transmission and remains
encrypted until decrypted at the remote end
• Although data remains encrypted throughout the network,
routing information needs to be visible
90
Comparison of End-to-End and Link Encryption
91
Data in Transit – Description of Risk
Malicious actors may intercept or monitor plaintext data
transmitting across network and gain unauthorized access
that jeopardizes confidentiality, integrity, or availability.
92
Data in Transit – Recommendations
• Valuable data must be encrypted when transmitted across
any network
• Email is not considered secure and must not be used to
transmit valuable data
93
Data in Transit – Recommendations (continued)
94
Data in Transit – Recommendations (continued)
95
Data in Transit – Recommendations (continued)
96
Data in Use
97
Data in Use – Recommendations
98
Activity: Data at Rest/Data in Transit
Comparison
INSTRUCTIONS
Working with a partner, complete the following table.
Definition
Risk Profile
Recommendations
(list at least two)
99
Examples of Insecure Network Protocols and Their
Secure Alternatives
100
Picking Encryption Algorithms
• Always choose the encryption algorithms that support longer
key lengths as they generally provide stronger protection
• Since passwords are often used to control the keys within the
cryptosystem, long complex passphrases are stronger than
shorter passphrase
101
Wireless Connections
When connecting to wireless networks to access a system
handling valuable data, only connect to wireless networks
employing cryptographically strong wireless encryption
standards such as WPA2.
102
Module 7
Information and Asset Handling Requirements
103
Module Objectives
104
Media
Media lacks the means for digital accountability when the data is
not encrypted
105
Marking
106
Handling
107
Storing
• Sensitive media should not be left lying about where
a passerby could access it.
• Whenever possible, backup media should be encrypted
and stored in a security container.
108
Destruction
Media that is no longer needed or is defective should be
defensibly destroyed rather than simply disposed of.
109
Record Retention
• Information and data should be kept only as long as it is
required
• Ensure that:
o The organization understands the retention requirements for
different types of data throughout the organization
o The organization documents in a record’s schedule the retention
requirements for each type of information
o The systems, processes, and individuals of the organization retain
information in accordance with the schedule but not longer
110
Module 8
Data Remanence
111
Module Objectives
112
Data Remanence
• The residual physical representation of data that has been in
some way erased
• After storage media is erased, there may be some physical
characteristics that allow data to be reconstructed
113
Data Remanence (continued)
• On a hard disk drive (HDD), the data is magnetically written onto
the drive by altering the magnetic field of the hard drive platter
• Solid-state drives (SSDs) use flash memory to store data
• Three commonly accepted countermeasures employed to
address data remanence in HDDs:
o Clearing
o Purging
o Destruction
114
Clearing
• The removal of sensitive data from storage devices so there is
assurance that the data may not be reconstructed using normal
system functions or software file/data recovery utilities
• The data may still be recoverable but not without special
laboratory techniques
115
Purging
The removal of sensitive data from a system or storage device with
the intent that the data cannot be reconstructed by any known
technique.
116
Destruction
117
Data Destruction Methods
118
Media Destruction – Defensible Destruction
• Physically breaking the media apart
• Chemically altering the media into a non-readable, non-reverse-
constructible state
• Phase transition
• For magnetic media, raising its temperature above the Curie
Temperature
119
Solid-State Drives (SSDs)
• SSDs use flash memory for data storage and retrieval
• Flash memory differs from magnetic memory in one key way:
flash memory cannot be overwritten
120
Solid-State Drive (SSD) Data Destruction
121
Cloud-Based Data Remanence
• Little to no visibility into the management and security of the
data in many cases
• PaaS-based architectures can actually provide a solution for the
issues raised by data remanence in the cloud
• Crypto-Erase / Crypto Shredding
122
Module 9
Domain Review
123
Domain Summary
124
Domain Summary (continued)
• To properly protect valuable assets, such as information, an
organization requires the careful and proper implementation
of ownership and classification processes that can ensure the
assets receive the level of protection based on their value to
the organization.
125
Domain Summary (continued)
126
Domain Summary (continued)
127
Domain Review Questions
128
Answer
129
Domain Review Questions
130
Answer
131
Domain Review Questions
132
Answer
133
Domain Review Questions
A. Data processor
B. Data subject
C. Data controller
D. Data steward
134
Answer
135
Domain Review Questions
136
Answer
137
Domain Review Questions
A. Policy
B. Awareness, education, training
C. Understanding of requirements related to compliance
D. Data steward
138
Answer
139
Domain Review Questions
140
Answer
141
Domain Review Questions
142
Answer
143
Domain Review Questions
144
Answer
145
Domain Review Questions
A. Data in motion
B. Data in use
C. Data in storage
D. Data at rest
146
Answer
147