D2. Asset Security Flashcards
(98 cards)
This is a critical first step toward ensuring the security of your systems and data.
Identifying and classifying information assets
These are the foundational steps in establishing an information security asset management program.
- Creating an inventory of what assets an organization has
- Where the assets are located?
- Who is responsible for the assets?
Is the process of organizing data into groups or categories that describe the data’s sensitivity, criticality, and value.
What is data classification?
A cornerstone of data security and risk management, this helps to determine the security controls necessary to manage and safeguard the confidentiality, integrity, and availability of data.
What is data classification?
What are the three (3) primary steps of data classification?
- Context-based
- Content-based
- User-based
Derived from metadata like ownership, location, or other values that can indirectly indicate sensitivity or criticality.
What is context-based?
Derived by inspecting the contents of files and directly identifying sensitive data, rather than inferring it from metadata.
What is content-based?
Involves manual assignment of data classification and is based on user’s understanding of the data and your organization’ classification scheme.
What is user-based?
Generally considered the highest level of classification outside of government or military organizations. The loss of this data can cause serious risk to the organization.
What is confidential classification scheme?
Losing this data will raise the risk to the organization, even if it is just repetitional damage (strategy documents or inter organizational correspondence can be considered sensitive).
What is sensitive classification scheme?
Usually compartmental data that might not do the company damage but must be kept private for other reasons (employee renting statistics and salary ranges).
What is private classification scheme?
Data that is disclosed outside the company on a limited basis or contains information that could reduce the company’s competitive advantage, such as technical specification of a new product.
What is proprietary classification scheme?
Data that if lost would have little or no impact to the company.
What is public classification scheme?
Other labels used to designate documents (but not considered classifications).
For Official Use Only (FOUO) and Limited Official Use
Is the process of grouping types of data with comparable sensitivity labels.
What is data categorization?
Identifying the sensitivity, criticality, and value of the information systems and assets that store, process, and transmit that data, as well as the data itself.
What is asset classification?
Involves grouping assets based on their relative level of sensitivity and the impact to the organization should the assets be compromised.
What is asset classification?
What are the major benefits of classification?
- Accurate asset inventory
- Insight into the environment
- Optimize change, vulnerability, and management programs
- Maintenance windows
- Security controls and segmentation
- Protection of sensitive data
- Identify rouge assets
- Understand potential risks posed by vulnerabilities
- Identify proprietary assets and intellectual property
- Forecast cost
- Compliance and Regulation controls
Assets should be identified and controlled based on their level of.
What is sensitivity?
While data classification is the most important element on a data label, asset labels may contain other information, such as.
- Title of the asset
- Data owner
- Data retention period (if applicable)
This helps keep asset handling efficient and cost-effective.
What is marketing and labeling of public data or unclassified information?
This aids by using digital marketing to identify and prevent sensitive information from leaking out of an organization.
What is Data Loss Prevention (DLP)?
These are critical to your organization’s overall asset security management.
What are handling and storage guidelines?
What are the consideration to data storage?
- Encryption
- Limiting the volume of data retained
- Backups