Best Practices: Provisioning, Encryption and Decommission of storage in the enterprise.

Slides:



Advertisements
Similar presentations
Imation Mobile Security Research Presentation August 2013 What is happening with our data?
Advertisements

Understanding Storage Discovering Computers 2012: Chapter
Media Sanitization How to get rid of unwanted data so no one else can get it.
Developing a Records & Information Retention & Disposition Program:
Ensuring Continuing Operations and Disaster Recovery By: Alyssa Gatrell Mike Harker Amy Shumway.
Agenda The Colligo Vision Unified Solutions for & Records Management Colligo Manager Colligo Contributor Pro Colligo Briefcase Colligo Administrator.
Storage Chapter 3.
Living in a Digital World Discovering Computers 2011.
Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. Storing & Retrieving Information File systems J.
Chapter 1.1. FDD ( Floppy Disk Drive) Needs a data cable for connection Has two 34-pin drive connectors and one 34-pin connector for the drive controller.
 What is electronic data?  Information stored electronically, e.g. pictures, music, documents, etc.  Where can you store your data?  Cell phones 
Chapter 3: Storage Devices & Media ALYSSA BAO 1. 2 Solid State controls movements of electrons within a microchip Optical uses precision lasers to access.
Edited By :Asma AlOsaimi
Integrated Technology
Storage INFO 1. Key areas File Compression Types of Storage –Internal/External, Magnetic Storage, Hard Disks, Floppy, Optical Storage, Flash Memory, Online.
National Property Management Association Disposing of Assets Containing Sensitive Information Kim Doner, CPPM SRA International.
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.Creative Commons Attribution-NonCommercial-ShareAlike.
INFORMATION TECHNOLOGY Personal Electronic Devices Information Technology College of Public and Community Service University of Massachusetts at Boston.
External Drives An external flash drive, also known as a thumb drive, is a removable storage device that connects to a USB port. A flash drive uses the.
RDX: REMOVABLE HARD DISK STORAGE SYSTEM December 2010.
BACKUP AND ARCHIVING DATA BACKUP AND RECOVERY OF DATA.
CMPTR Chapter 2 – Part 2 (Storage). Storage – Punch Cards Player Piano Roll Punch Cards were used before disk drives.
Task 18 Describe the need to create backup copies, and to file them in a separate and safe location also filing and storing hard copies for use in production.
Disaster Recovery Advice 6 th November Data What do you need to backup? System States All or Critical Data.
Objectives Overview Differentiate between storage and memory
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
TEMPLATE DESIGN © Android Data Confidentiality Alex Mayer University of Houston Abstract Employees are increasingly relying.
Your Interactive Guide to the Digital World Discovering Computers 2012.
OCR GCSE Computing Chapter 2: Secondary Storage. Chapter 2: Secondary storage Computers are able to process input data and output the results of that.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
BACKUPS What is your plan???. Plan in Writing “A goal without a plan is just a wish.” Antoine de Saint-Exupéry.
Multimedia Card The Multimedia Card (MMC) is a flash memory memory card standard. MMC cards are currently available in sizes up to and including.
Data Destruction Is it really gone? Donna Read Chris Parker Florida Gulf Coast ARMA Chapter April 2013.
Backups CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Working with HIT Systems
OCR GCSE Computing © Hodder Education 2013 Slide 1 OCR GCSE Computing Chapter 2: Secondary Storage.
Security fundamentals Topic 11 Maintaining operational security.
Understanding Backup and Recovery Methods Lesson 8.
The Problem YOU are responsible for confidential, mission- critical data... but.
Your Interactive Guide to the Digital World Discovering Computers 2012 Edited By :Asma AlOsaimi.
Storage devices 1. Storage Storage device : stores data and programs permanently its retained after the power is turned off. The most common type of storage.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Secondary Storage. WHAT IS SECONDARY STORAGE  SECONDARY STORAGE IS THE STORAGE THAT IS NON- VOLATILE. RAM IS VOLATILE AND SHORT TERM AND FORGETS EVERYTHING.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 7 Types of Storage.
Open Microsoft Excel Draw this image. Is it possible?
ICT Unit 3 Storage Devices and Media. What is backing up of data? Backing up refers to the copying of file to a different medium It’s useful if in case.
By Molly.  Definition: refers to the copying of files/data to a different medium.  Why back up data? - To safe against loss of data. - To safe against.
Environmental Symposium Data Security And Destruction Issues A.K.A. - Disk Sanitization Mike Caltabiano Environmental Protection Agency, Office of Environmental.
CHAPTER 6 Digital Storage Copyright © Cengage Learning. All rights reserved.
Photo recovery from water damaged XD memory card recovery-from-water-damaged-xd-memory-card.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
Your Interactive Guide to the Digital World Discovering Computers Chapter Seven Types of Storage.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Cloud Storage Service with Proven Military Grade Security
Discovering Computers 2012: Chapter 2-7
Slide Template for Module 4 Data Storage, Backup, and Security
Computer Note.
Items For Secure Media Recycling Bins
Storage devices and media
Data Storage Collaboration Project
Chapter Seven Types of Storage.
Chapter 3 – Storage Devices and Media
UNIT R001: Understanding Computer Systems
UNIT A451: Computing Hardware: Secondary Storage
STORAGE – 3 TIERS Key Revision Points.
Part C Computer Storage
Presentation transcript:

Best Practices: Provisioning, Encryption and Decommission of storage in the enterprise

» Types of storage we need to be concerned about  HDD, SSD Drives  USB Flash Drives  Removable Media (SD, CF, FDD, CD/DVD, Camera, Smart Phones, Tablets)  Copier/Printer HD  Optical & Tape Drives  Employee Owned Devices (GPS, MP3, etc)

» Provisioning Devices  Catalog as an asset (M/N, S/N, Asset Tag) and to whom it was assigned  Secure Format (DOD Wipe, Zero Wipe, etc)  Encrypt Device  Include potential risks/vulnerabilities in assessment documents  Maintain approved device list

» Workstation Backup and Restoration  Secure cloud backup  Point in time recovery of individual files  Device Location Services  Access from any device  Backup of the backup (and secure disposition of said backup eg: off-site vault, vendor, etc.)

» Secure Decommission  Secure Format (DOD Wipe, Zero Wipe, etc)  Decommission/Un-assign asset-user  Degauss (Magnetic Erase)  Physically Destroy Device  Maintain disposition documentation

» Conclusion  Know where your storage is  Keep data safe from exploitation  Define regulatory policies/procedures  Keep a well documented list of what happened to decommissioned media  When in doubt, encrypt it