Key Concepts 7.5 Applying resource protection Flashcards
Domain 7 (13 cards)
- Data loss or unauthorized access: Uncontrolled access to storage media like hard drives,
USB drives, or tapes can lead to data breaches or accidental deletion. - Media theft or physical damage: Physical loss or damage to media can result in data loss
and potential downtime. - Media failure: Failure of physical media when used beyond its documented useful
lifespan, generally expressed as mean-time-to-failure (MTTF). - Improper disposal: Improperly disposing of media containing sensitive data can lead to
data leaks if not securely erased or destroyed
Media Management security risk
- Environmental controls: Temperature and humidity should be maintained at levels
appropriate to the media being managed. - Media classification: Classify media based on sensitivity to identify resources requiring
stricter controls. - Inventory and tracking: Maintain an accurate inventory of all storage media and track
their location and usage. - Secure storage: Store sensitive data on encrypted media and in secure locations with
restricted access. Media check-in/check-out should be documented. - Disposal procedures: Implement secure disposal procedures for media reaching the end
of its lifecycle, including data wiping or physical destruction.
Media Management Controls
- Data breaches: Interception of data during transmission or while stored on media.
- Unauthorized access and disclosure: Gaining access to media without proper authorization,
disclosing sensitive information to an unauthorized individual. - Unauthorized/unintentional destruction: Media destroyed before its retention limit has
been reached results in a loss of availability. - Unnecessary retention: At the other end of the spectrum, media retained beyond its
retention limit increases risk.
Media Protection Concerns
- Data encryption: Encrypt data at rest (on storage media) and in transit (during transmission)
to render it unreadable without a decryption key. - Access controls: Implement access controls to restrict access to media based on the
principle of least privilege. A check-in/check-out process will ensure access is appropriately
tracked. - Labeling and handling: If backup media is clearly and appropriately marked and handling
procedures are documented and known to staff, it can ensure proper handling throughout
the media/data lifecycle, avoiding a breach of confidentiality. - Lifecycle management to ensure the data stored on media is destroyed when it reaches
the end of its retention period. - Media sanitization: using secure data destruction techniques, as described in “2.4.7 Data
Destruction”.
Media Protection Controls
Is data stored on devices or storage systems not actively being used or transmitted
Data at rest
- Physical theft: Stealing devices or storage media containing sensitive data.
- Malware: Malicious software designed to gain unauthorized access to stored data.
- Insider threats: Unauthorized access or misuse of data by individuals within the organization.
- Social engineering: Manipulating people into divulging confidential information or access
credentials. - Brute force attacks: Attempting to guess passwords or encryption keys through trial and
error.
Common Data at rest attacks
- Encryption (e.g., AES, RSA): Converting data into a coded form that can only be read with
a decryption key. - Access controls: Mechanisms to restrict and manage who can access specific data or
resources. - Physical security measures: Safeguards like locked server rooms, security cameras, and
restricted access areas.
Common Data at rest protections
Sometimes called “data in motion”, is data moving between systems or networks.
Data in transit
Man-in-the-Middle (MitM) attacks: Intercepting and potentially altering communications
between two parties.
* Packet sniffing: Capturing and analyzing data packets as they travel across a network.
* DNS hijacking: Redirecting traffic to malicious sites by manipulating Domain Name
System queries.
* SSL stripping: Downgrading an HTTPS connection to HTTP, removing encryption protection.
Common Data in Transit Attacks
- Encryption protocols, like TLS/SSL and HTTPS, which are standards for secure data
transmission over networks. Enforcing TLS version (currently TLS 1.3) is important to
prevent certain types of attacks. - Virtual Private Networks (VPNs): Secure, encrypted connections over public networks.
- Secure File Transfer: Using protocols such as SFTP or FTPS for securely transferring files
over a network.
Common Data in Transit Protections
Is data actively being processed, accessed, or modified by applications or users
Data in Use
- Buffer overflow: Exploiting programming errors to write data beyond the bounds of
allocated memory, potentially executing malicious code. - Code injection: Inserting and executing malicious code in a vulnerable application.
- Side-channel attacks: Exploiting unintended information leakage from a system’s
physical implementation or operation, such as power consumption, electromagnetic
emissions, or processing time, to infer sensitive data or cryptographic keys being used.
Common Data in Use Attacks
- Memory encryption: Encrypting data while it’s being processed in a computer’s memory.
- Secure enclaves: Isolated execution environments for processing sensitive data.
- Runtime application self-protection (RASP): Security technology that’s built into an
application to intercept calls, validate data requests, and detect and prevent real-time
attacks. - Input validation and sanitization: Techniques to ensure that input data is safe and in the
correct format before processing
Common Data in Use protections