Domain 2 Data Security Flashcards

1
Q

Data Lifecycle

A
Create
Store
Use
Share
Archive
Delete
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Create Phase

A

New data created
Data added to system
Data modified

Classification should always be done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Store Phase

A

. Must be stored in a way that is usable

. First place where security controls are used for data at rest

. Ensure that all storage methods employ the tech necessary for the classification level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Use Phase

A

. Data is consumed and processed by an application or user

. Exposed in an unencrypted state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Share Phase

A

. Data is made available for use outside the system it was intended for

. Ensure proper protections are in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Archive Phase

A

. Moving data to long term storage.

. Must be able to retrieve and recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Destroy Phase

A

. Where data is either made inaccessible or permanently erased and protected.

. Method and approach being based on the classification and sensitivity

Overwriting
Cryptographic erasing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Storage Types - IaaS

A

.Volume - virtual hard drive, see live a traditional server model.

. Object - File storage that operates as an API or web service call.
. Files are stored as objects in an independent system and given a key value. for reference and retrieval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Storage Types - PaaS

A

Structured - data is organized and categorized in a way to be easily placed within a database or other storage system that is created with rule sets and a normalized design.
. Allows application developed to easily import from other data sources or non-productions

Unstructured - data that cannot be used or easily used in a rigid and formatted database structure.
. Multimedia, photos, MS office files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Storage Types - SaaS

A

Information and Storage Management - data within databases that the application uses and maintains
. generated by the application or imported via the application interfaces.

Content and file storage - allows for uploading of the data that is not part of the underlying database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DLP Components

A

Discovery and classification - focuses on finding of the data that is pertinent to the DLP strategy and insuring that is know to the DLP.
. Determining the security classification

Monitoring - watching the data as it move through various states of usage to ensure used in appropriate and controlled ways.

Implementation - enforcement of policies and any potential violations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Security Strategies

A
. Encryption
. Key Management
. Masking
. Obfuscation
. Anonymization
. Tokenization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encryption

A

. Key management central challenge
. Ensures confidentiality, not integrity
. Applied to data at wholesale or granular level.
. For object storage applied at the file level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Masking or Obfuscation

A

. Hide or remove data from sensitive data from data sets.
. Use random or substitute data
. Non-production and development environments

Static masking - a separate and distinct cope of data set is created with masking in place.

Dynamic masking - masking process is implemented between the application and data layers of the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data Anonymization

A

Data is manipulated in a way to prevent the identification of an individual through the various data objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tokenization

A

.Practice of utilizing a random and opaque token value in data to replace what otherwise would be sensitive or protected data objects.
. Token value usually created by the application with a means to map back to the actual real value.

17
Q

Data Privacy Roles

A

Physical environment - cloud provider

Infrastructure - PaaS Saas cloud provider. IaaS provider and customer

Platform - SaaS cloud provider. PaaS shared. IaaS customer

Application - SaaS shared. PaaS IaaS customer

Data - Cloud Customer

Governance - Cloud Customer

18
Q

Data Discovery

A

Prime method for and application or system owner to show and ensure compliance with data privacy and regulations

19
Q

CCM

A

Cloud Security Alliance Cloud Control Matrix- provides a framework and applicable security control domains within a cloud environment that encapsulates the various requirements set forth with privacy acts as well as various industry certification and regulatory bodies.

20
Q

Data Rights Management (DRM)

A

extension of normal data protection, where controls and ACLs are placed onto data sets that require additional permissions or conditions to access and use beyond just simple and traditional security controls.

21
Q

Information Rights Management (IRM)

A

.Organizational side of information and privacy protection.

.Additional layer of security and control over documents beyond what is achieved from normal file systems permissions.

Can be used as a means for data classification and control

22
Q

IRM Tools

A
.Auditing
.Expiration
.Policy control
.Protection
.Support for applications and formats
23
Q

Data Deletion

A

Overwriting- process of using random data or null pointers to write over data sectors that previously contained sensitive information
.Unlikely for a customer to be able to ensure they know all locations of the date to overwrite.

Cryptographic shredding- destroy data via encryption , with the resulting key being permanently destroyed to ensure the data can never the recovered.

24
Q

Data Archiving Considerations

A

Format

Technology - the technology or standard to maintain and store data

Regulatory Requirements - may specify minimum duration for data archiving as well as the procedures and reasons why retrieval is required or could be requested.

Testing - proper testing required to validate and audit he policies and procedures to ensure that their program is valid and usable

25
Q

Event Sources

A

System events that are available for capture vary by cloud model

IaaS - virtually all log and data events should be exposed and available for capture

PaaS - exposure of events from the application is a combination of standard logging and custom logs made available by application developers

SaaS - log data is minimal and highly restricted.

26
Q

SIEM

Security Information and Events Manager

A
Aggregation and correlation
Alerting
Reporting and Compliance
Dashboards Retention and Compliance
Continuous Optimization
27
Q

Raw Disk Storage

A

Permanently allocated storage space that exists independently of a server instance

28
Q

Ephemeral storage

A

Temporary storage associated with a specific instance that is destroyed with when the instance is stopped