Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
383 changes: 216 additions & 167 deletions CISSP-Domain-1-Objectives.md

Large diffs are not rendered by default.

80 changes: 48 additions & 32 deletions CISSP-Domain-2-Objectives.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,16 +14,19 @@ Data Classification
- **Personally Identifiable Information (PII)** ([NIST SP 800-122](https://csrc.nist.gov/publications/detail/sp/800-122/final) provides formal definitions), and **Protected Health Information (PHI)** are two important types to protect
- **Proprietary data**: any data that helps an organization maintain a competitive edge
- Organizations classify data using labels
- government classification labels include:
- Top Secret: if disclosed, could cause massive damage to national security, such as the disclosure of spy satellite information
- Secret: if disclosed, can adversely affect national security
- Unclassified: not sensitive
- non-government organizations use labels such as:
- US Government classification labels include:
- Top Secret: if disclosed, would cause "exceptionally grave damage" to national security, such as the disclosure of spy satellite information
- Secret: if disclosed, would cause "serious damage" to national security
- Confidential: if disclosed, would "damage" national security.
- Sensitve but unclassified: material that is "For Official Use Only", "Law Enforcement Sensitive", etc. (not technically a classification)
- Unclassified: not sensitive (not technically a classification)
- Non US Goverments may have different classification schemes
- Non-government organizations use labels such as:
- Confidential/Proprietary: only used within the organization and, in the case of unauthorized disclosure, it could suffer serious consequences
- Private: may include personal information, such as credit card data and bank accounts. Unauthorized disclosure can be disastrous
- Sensitive: needs extraordinary precautions to ensure confidentiality and integrity
- Public: can be viewed by the general public and, therefore, the disclosure of this data would not cause damage
- labels can be as granular and custom as required by the organization
- Labels can be as granular and custom as required by the organization
- It is important to protect data in all states: at rest, in transit, or in use
- The best way to protect data confidentiality is via use of strong encryption

Expand All @@ -46,7 +49,7 @@ In general, classification labels help users use data and assets properly, for i
- **Marking**: (AKA labeling) sensitive information/assets ensures proper handling (both physically and electronically)
- **Handling**: refers to secure transport of media through its lifetime
- **Data Collection Limitation**: prevent loss by not collecting unnecessary sensitive data
- **Data Location**: keep dup copies of backups, on- and off-site
- **Data Location**: keep duplicate copies of backups, on-site and off-site
- **Storage**: define storage locations and procedures by storage type; use physical locks for paper-based media, and encrypt electronic data
- **Destruction**: destroy data no longer needed by the organization; policy should define acceptable destruction methods by type and classification ([see NIST SP-800-88 for details](https://csrc.nist.gov/publications/detail/sp/800-88/rev-1/final))
- **Erasing**: usually refers to a delete operation on media, leaving data remanence
Expand All @@ -65,21 +68,21 @@ In general, classification labels help users use data and assets properly, for i
- **least privilege** principle states that subjects are granted only the privileges necessary to perform assigned work tasks and no more

Information and Asset Ownership
- **Data owner**: the person who has ultimate organizational responsibility for data; usually sr. manager (CEO,president, dept. head); data owners typically delegate data protection tasks to others in the org
- **Data owner**: the person who has ultimate organizational responsibility for data; usually sr. manager (CEO, president, dept. head); data owners typically delegate data protection tasks to others in the org

Asset Inventory
- Software assets are operating systems and applications; software licensing also refers to ensuring that systems do not have unauthorized software installed
- To protect intangible inventories (like intellectual property, patents, trademarks, and company’s reputation, and copyrights), they need to be tracked
- To protect intangible inventories (like intellectual property, patents, trademarks, company’s reputation, and copyrights), they need to be tracked


[2.4](#2.4) Manage data lifecycle

Data roles
- The **system owner** controls the computer storing the data. Usually includes software and hardware configurations and support services (e.g. cloud implementation). System owner is responsible for system operation and maintenance, and associated updating/patching as well as related procurement activities
- The **data custodian** is responsible for the protection of data through maintenance activities, backing up and archiving, and preventing the loss or corruption and recovering data
- The **security administrator** is responsible for ensuring the overall security of the entire infrastructure; they perform tasks that lead to the discovery of vulnerabilities, monitor network traffic and configure tools to protect the network (like firewalls and antivirus software). They also devise security policies, plans for business continuity and disaster recovery and train staff
- **Supervisors** are responsible for overseeing the activities of all the above entities and all support personnel. They ensure team activities are conducted smoothly and that personnel is properly skilled for the tasks assigned
- **Users** must comply with rules, mandatory policies, standards and procedures. Users have access to data according to their roles and their need to access information
- The **system owner** controls the computer storing the data. Usually includes software and hardware configurations and support services (e.g. cloud implementation). System owner is responsible for system operation and maintenance, and associated updating/patching as well as related procurement activities.
- The **data custodian** is responsible for the protection of data through maintenance activities, backing up and archiving, preventing the loss or corruption, and recovering data when necessary.
- The **security administrator** is responsible for ensuring the overall security of the entire infrastructure; they perform tasks that lead to the discovery of vulnerabilities, monitor network traffic and configure tools to protect the network (like firewalls and antivirus software). They also devise security policies, plans for business continuity and disaster recovery, and train staff.
- **Supervisors** are responsible for overseeing the activities of all the above entities and all support personnel. They ensure team activities are conducted smoothly and that personnel is properly skilled for the tasks assigned.
- **Users** must comply with rules, mandatory policies, standards, and procedures. Users have access to data according to their roles and their need to access information.

Data Collection
- One of the easiest ways of preventing the loss of data is to simply not collect it
Expand All @@ -91,12 +94,11 @@ Data Location
- Consider distance between data/storage locations to mitigate potential mutual (primary and backup) damage risk

Data Maintenance and Retention
- **Data maintenance** refers to managing data as through the data lifecycle (creation, usage, retirement). Data maintenance is the process (often automated) of making sure the
data is available (or not available) based on where it is in the lifecycle
- Ensuring appropriate asset protection requires that sensitive data be preserved for a period of not less than what is business-required, but for no longer than necessary
- **Data maintenance** refers to managing data through the entire data lifecycle (creation, usage, retirement). Data maintenance is the process (often automated) of making sure the data is available (or not available) based on where it is in the lifecycle.
- Ensuring appropriate asset protection requires that sensitive data be preserved for a period of not less than what is business-required, but for no longer than necessary.
- Encrypt sensitive data
- Safeguard assets via basic security controls to enforce appropriate levels of confidentiality, integrity and availability and act per security policies, standards, procedures and guidelines
- Retention requirements apply to data or records, media holding sensitive data, systems that process sensitive data, and personnel who have access to sensitive data
- Safeguard assets via basic security controls to enforce appropriate levels of confidentiality, integrity, and availability and act per security policies, standards, procedures and guidelines.
- Retention requirements apply to data or records, media holding sensitive data, systems that process sensitive data, and personnel who have access to sensitive data.
- Three fundamental retention policy questions:
- **How to retain**: data should be kept in a manner that makes it accessible whenever required; take taxonomy (or the scheme for data classification) into account
- **How long to retain data**: general guidelines for business data is 7 years (but can vary by country/region/regulation)
Expand All @@ -107,13 +109,13 @@ Data Destruction
- An organization's security or data policy should define the acceptable methods of destroying data based on the data's classification
- Note again: even when using manufacturers SSD wiping tools, data can remain, and therefore the best SSD wipe method is destruction

[2.5](#2.5) Ensure appropriate asset retention (e.g. EOL, EOS)
[2.5](#2.5) Ensure appropriate asset retention (e.g. End of Life (EOL), End of Support (EOS))
- Hardware: even if you maintain data for the appropriate retention period, it won’t do you any good if you don’t have hardware that can read the data
- Personnel: beyond retaining data for required time periods and maintaining hardware to read the data, you need personnel who know how to operate the hardware to execute restoraton processes

- End-Of-Life (EOL): often identified by vendors as the time when they stop offering a product for sale
- End-Of-Support (EOS)/End-Of-Service-Life (EOSL): often used to identify when support ends for a product
- EOL,EOS/EOSL can apply to either software or hardware
- EOL, EOS/EOSL can apply to either software or hardware


[2.6](#2.6) Determine data security controls and compliance requirements
Expand Down Expand Up @@ -145,8 +147,7 @@ Standards Selection

- Organizations need to identify the standards (e.g. PCI DSS, GDPR etc) that apply and ensure that the security controls they select fully comply with these standards
- Even if the organization doesn't have to comply with a specific standard, using a well-designed community standard can be helpful (e.g. NIST SP 800 documents)
- **Standards selection** is the process by which organizations plan, choose and document
technologies or architectures for implementation. (For example, you might evaluate three vendors for a security control; you could use a standards selection process to help determine which solution best fits the organization)
- **Standards selection** is the process by which organizations plan, choose, and document technologies or architectures for implementation. For example, you might evaluate three vendors for a security control; you could use a standards selection process to help determine which solution best fits the organization.
- Vendor selection is closely related to standards selection but focuses on the vendors, not the technologies or solutions

The overall goal is to have an objective and measurable selection process. If you repeat
Expand All @@ -156,21 +157,36 @@ the process with a totally different team, the alternate team should come up wit
Data Protection Methods

**Data protection methods** include:
- **digital rights management (DRM)**: methods used in attempt to protect copyrighted materials
- **Digital rights management (DRM)**: methods used in attempt to protect copyrighted materials
- **Cloud Access Security Brokers (CASBs)** - software placed logically between users and cloud based resources, that can ensure that cloud resources have the same protections as resources within a network.

Note that Entities must comply with the EU GDPR, use additional data protection methods such as pseudonymization, tokenization, and anonymization
Note that Entities that must comply with the EU GDPR, use additional data protection methods such as pseudonymization, tokenization, and anonymization

Options for protecting your data vary depending on its state:
- Data at rest:consider encryption for operating system volumes and data volumes, and backups as well. Be sure to consider all locations for data at rest, such as tapes, USB drives, external drives, RAID arrays, SAN, NAS, and optical media.
- Data at rest: consider encryption for operating system volumes and data volumes, and backups as well. Be sure to consider all locations for data at rest, such as tapes, USB drives, external drives, RAID arrays, SAN, NAS, and optical media.

- DRM is useful for data at rest because DRM "travels with the data" regardless of the data state. DRM is especially useful when you can’t encrypt data
volumes
- DRM is useful for data at rest because DRM "travels with the data" regardless of the data state. DRM is especially useful when you can’t encrypt data volumes
- A CASB solution often combines DLP, a web application firewall with some type of authentication and authorization, and a network firewall in a single solution. A CASB solution is helpful for protecting data in use (and data in transit)

- Data in transit: think of data in transit wholistically -- moving data from anywhere to anywhere. You can use encryption for data in transit.
- Example: a web server uses a certificate to encrypt data being viewed by a user, or IPsec encrypting a communication session. There are many options. The most important point is to use encryption whenever possible, including for internal-only web apps
- DLP solutions are useful for data in transit, scanning data on the wire, and stopping the transmission/transfer,based on the DLP rules set (e.g. outbound data that contains numbers matching a social security number pattern, a DLP rule can be used to block that traffic)



- DLP solutions are useful for data in transit, scanning data on the wire, and stopping the transmission/transfer, based on the DLP rules set (e.g. outbound data that contains numbers matching a social security number pattern, a DLP rule can be used to block that traffic)

## Key Terms
- **XXX:**
- **XXX:**
- **XXX:**
- **XXX:**
- **XXX:**
- **XXX:**
- **XXX:**
- **XXX:**
- **XXX:**
- **XXX:**
- **XXX:**
- **XXX:**
- **XXX:**
- **XXX:**
- **XXX:**
- **XXX:**
- **XXX:**
Loading