Domain 2 – Asset Security

Slides:



Advertisements
Similar presentations
IT Security Policy Framework
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Evolution of Data Use and Stewardship Recent University-wide Data Stewardship Enhancements Integrated System Data Stewardship Shirley C. Payne, CISSP,
Gaucho Round-Up FAQ’s This presentation covers some of the FAQ’s about campus clean-up day. Presentation #4 2/3/
Data Protection.
Chapter 5: Asset Classification
SIU School of Medicine Identity Protection Act and Associated SIU Policy.
Critical Data Management Indiana University HR Summit April 24, 2014.
Access Control Methodologies
Data Ownership Responsibilities & Procedures
Auditing Computer Systems
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
CASH HANDLING Training Presentation
Security Management Practices Keith A. Watson, CISSP CERIAS.
Hippocratic Databases Paper by Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu CS 681 Presented by Xi Hua March 1st,Spring05.
Department of Commerce Records Management Training.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
1 25 October EPFL Conference Data Protection in Intergovernmental Organizations Workshop 7 February 2013 K. Ernst S. Lüders C. Viala.
Peer Information Security Policies: A Sampling Summer 2015.
Section Eight: Communication Security (COMSEC) Note: All classified markings contained within this presentation are for.
Information Asset Classification
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Lecture 30 Information Security (Cont’d). Overview Organizational Structures Roles and Responsibilities Information Classification Risk Management 2.
Security Operations. 2 Domain Objectives Protection and Control of Data Processing Resources Media Management Backups and Recovery Change Control Privileged.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Mark Brett IA Advisor May 2009 Introducing Protective Marking for Local Authority Use.
Security Policies University of Sunderland CSEM02 Harry R. Erwin, PhD.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Electronic Records Management: What Management Needs to Know May 2009.
Principle of Protection By C’Les Jensema About ARMA International and the Generally Accepted Recordkeeping Principles® ARMA International (
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Best Practices: Financial Resource Management February 2011.
HR Conference 2006 Tallahassee, Florida November 14 &15 Programs ~ Processes ~ Partnerships ~ Programs ~ Processes ~ Partnerships Updates and Tips for.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
Prepared by Dept. of Information Technology & Telecommunications, November 19, 2015 Application Security Business Risk and Data Protection Gregory Neuhaus.
ISO/IEC 27001:2013 Annex A.8 Asset management
Texas Law Enforcement Best Practices Mid Year Training Conference.
1 Banking and Reconciliation. 2 To Certify As A Cash Handler  Visit the training website  Review the Payment Card Industry (PCI)
INFORMATION GOVERNANCE AND CONFIDENTIALITY Information Governance Facilitator.
SANS Technology Institute GDWP Presentation 1 GIAC Enterprises eDiscovery Policies and Procedures Brad Ruppert and Russell Meyer.
Chapter 5: Protecting Security of Assets. Classifying and Labeling Assets Defining sensitive data Defining classifications Defining data security requirements.
Information Security. Your responsibilities as a Government of Canada employee.
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
Computer Security and the “H” word Glen Klinkhart, CEO Mike Messick, CTO.
Classification September 2003© Peltier and Associates, all rights reserved Creating an Asset Classification Methodology ISIG & ISSA September, 2003.
PRESENTED BY Raju. What is information security?  Information security is the process of protecting information. It protects its availability, privacy.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 7 Storing, Retrieving, and Transferring Records 1 © 2016 Cengage Learning ®. May not be scanned,
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
ISMS Information Security Management System
Mysale Information Classification 101
Records Retention NYS Magistrates’ Association
Database Security and Authorization
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Operations Security.
IS4550 Security Policies and Implementation Unit 7 Risk Management
Electronic Records Management Program
Accounts Direct Standard Procedures
Office of the President of the Philippines Memorandum Circular No. 78
Internal Controls.
Records Management Compliance Training
Data Protection principles
Mysale Information Classification 101
Welcome IITA Inbound Insider Webinar: An Introduction to GDPR
Internal Controls.
Internal Controls.
Presentation transcript:

Domain 2 – Asset Security Information and asset classification – know all layers of public and government data classification (confidential, private, etc.) Ownership (data owners, system owners) Protect privacy Appropriate retention – a few questions on data destruction Data security controls – You will see questions regarding shipping and Chain of Custody Handling requirements (markings, labels, storage)

Information Classification - Public Private – data that is defined as private (SSN, bank accounts, credit cards) Company restricted – Data that is restricted to a subset of employees. Company confidential – Data that can be viewed by all employees but is not for general use. Public – Data that can be viewed or used by employees or the general public.

Information Classification - Government Top Secret – Disclosure of top secret data would cause severe damage to national security Secret – Disclosure of secret data would cause serious damage to national security. This data is considered less sensitive than data classified as top secret. Confidential – Confidential data is usually data that is exempt from disclosure under laws such as the Freedom of information act but is not classified as national security data. Sensitive but unclassified – SBU data is data that is not considered vital to national security, but its disclosure would do some harm. Many agencies classify data they collect from citizens as SBU. Unclassified – Data that has no classification or is not sensitive.

Data Ownership Data Owner – Usually a member of Senior Management. After all, senior management is responsible for the asset and, if it is compromised, can be held responsible. The data owner can delegate some data-to-day duties but cannot delegate total responsibility; Senior Management is ultimately responsible. Data Custodian – This is usually someone in IT. The data custodian does not decide what controls are needed, but he or she does implement controls on behalf of the data owner. Other responsibilities include the day-to-day management of the asset. Controlling access, adding and removing privileges for individual users, and ensuring that the proper controls have been implemented are all part of the data custodian’s duties.

Data Security Controls - Marking Storage media should have a physical label identifying the sensitivity of the information contained. Labels should indicate whether the data is encrypted. Media found unlabeled should immediately be labeled with the highest level of sensitivity until appropriate analysis is done.

Data Security Controls - Handling Only designated personnel should have access to sensitive media. Individuals responsible for managing sensitive media should be promulgated. Important that logs and other records are used to track the activities of individuals handling backup data. Manual processes, such as access logs, are necessary to compensate for the lack of automated controls regarding access to sensitive media.

Data Security Controls - Storing Sensitive media should not be left lying about where a passerby could access it. Backup media should be encrypted whenever possible and stored in a security container, such as a safe or strong box. Storing encrypted backup media at an off-site location should be considered for disaster recovery purposes.

Data Security Controls - Destruction Media that is no longer needed or is defective should be destroyed rather than simply disposed of. A record of destruction should be used that corresponds to any logs used for handling media. Security practitioners should implement object reuse controls for any media in question is unknown rather than simply recycling it. Record Retention – Data and information should only be kept only as long as it is required. Data Remanence – residual physical representation of data Purge – ensure total removal – data cannot be recovered Clearing – Removes data but not 100%, lab techniques required for recovery