Please enable JavaScript.
Coggle requires JavaScript to display documents.
Asset Security, Data Remanence & Retention, Baselines & Best…
Asset Security
Information Lifecycle
-
-
-
-
Sec is all about managing risk to your critical info
It is critical that org carefully controls & manage access to its info
Classification
-
-
-
-
Understand what particular data means to the org, how imp is the info & why?
Labels
-
-
Top Secret: highest lvl of info classification
unauthorized disclosure can cause exceptionally grave damage to national sec
-
Unclassified : info designated as neither sensitive nor classified- pub release does not cause violate confidentiality
Approp protections can be applied based on sensitivity of info & potential impact of loss- org often classify data in diff lvls
HOW-TO
-
-
What is your most crit data: PII, Credit card, financial info, healthcare data
Identify "High" sys & data - compromise means "sever or catastrophic adverse effect on org ops, org assets or individual
Criteria
Age : how current is info, does or needs data that is 5yrs old? is real time info more imp to your org than info recd last week
Useful life : at what time data in your sys not worth protecting ? how often do we continue protecting outdated info?
-
personal association: media records, case files & personnel files
-
-
Data Privacy & Ownership
Data Ownership
System owner
Responsibilities
Dev sys sec plan in coordination with info owner,sys admin,info sys sec officer & functional end user
Maintains the sys sec plan & ensure that sys is deployed & operated according to agreed upon sec req
Updates the sys sec plan whenerv significant change occurs
Assists in identification, implementation & assessment of sec cntrl
According to NIST SP 800-18 system owner is
responsible for overall procurement, dev, integration , modif, or operation & maintenance of info system
Business/Mission owner
High ranking officials provide adequate funding manpower to implement, maintain & enforce the prof policy when needed
-
-
Custodians
person who provides hands-on mgmt of data as directed by data owner- simply implements the decision abt data that owner determines
Tasks: patching of OS,app, perf backup & restoration
sysadmin ,dbadmin may be assigned the role of custodian
Users
-
-
Responsibilities:
They must not share UID & pass with others
They must follow proper procedu to protect info under their care
Use company asset only for company related activities
Responsible to report sec incident that they are aware of
Data Info Owner:
Captain goes down with the ship - reflects ultimate reposn captain has for safety & operation of everyone & everything aboard the ship
Data owners hv same responsibility towards business/stakeholders they must take measures to adequate protect info & nw from all significant threats
-
Accountable for mishandling of data. Accountable if a compromise, loss abuse occurs
Responsibilities : assigning classification to info under their care,
ensuring proper sec controls are in place to protect info for which they are accountable
regularly reviewing who hv access under their care
serving as main point of contact to approve who hv access to data or info under their care
-
Data Retention Policies
Together, these policies determine what data should & should not be maintained by the organization
-
-
-
consistent policy- auto destrying email msg more than yr old- then eDiscovery that depends on emails from 5yr ago will not be an issue
Retention Issues: Email
-
Personal archives, such as PST files can pose retention challenge
-
-