SlideShare a Scribd company logo
Data, and Application Security
Web Application Security, Cloud
CCSD SECURITY
ESSENTIAL
Asset Management
• Assets include hardware, software, data, physical systems, and documentation.
• ITAM is managing the lifecycle of these assets.
• In secure ITAM:
• Strike balance between cost and need.
• Distinguish between data ownership/data custodianship.
• Implement controls to secure private data.
• Implement asset security to protect against liability.
• Apply classifications to sensitive data.
• Be very clear about regulatory policy requirements.
• In your policy, have a process in place to respond to legal requests for your data.
Hardware
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Asset Management Roles (Slide 1 of 2)
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Role Description
Data Owner • Involved in creation, acquisition, and usage of data.
• Must understand the cost to maintain data, as well as the quality.
• Determines sensitivity of data and associated risks.
• Determines who has access to data.
• Should have input in retention and destruction policies.
• Should be aware of legal or regulatory issues with data.
Data Custodian • Tasked with protecting data.
• Implements access requirements per data owner.
• Applies controls, maintains, monitors, and destroys data when necessary.
• Can be a database administrator, system administrator, or other IT role.
System Owner • Owns the computer that the data resides on.
• May be different than data owner.
• Ex: IT department owns servers; Sales owns data on servers.
Administrator • Manages IT systems.
• Usually works in the IT department.
• Can also be someone else trusted to perform administrative tasks.
Asset Management Roles (Slide 2 of 2)
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Role Description
Business Owner • Owns all or part of the business.
• Won’t usually be involved in the technical aspect of asset management.
• Is interested in the financial value of assets.
End User • Uses IT resources and other assets as part of their job.
• Typically has no administrative privilege.
Auditor • Periodically checks to see if assets are being utilized in accordance with internal
policy or regulatory requirements.
• Might be an employee, but more likely to be external.
• Use labeling to minimize risk of loss or modification.
• Labeling schemes are known as classifications.
• Management must determine:
Classification Principles
Hardware
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Classification Process
6. Implement classification schema
1. Identify asset
2. Determine who is accountable for its integrity
3. Establish ownership of asset
4. Place value on asset
5. Prepare schema for classifying asset
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Classification Policies
• Classification policy includes:
• Users may drive classification types based on how they handle assets.
• Regular reviews determine if appropriate classification is maintained.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Classification Schemes
• Military
• Employed by U.S. government.
• Strictly defined, rigid.
• Commercial
• Employed by non-governmental organizations.
• Developed to support business needs.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Military Classification Schemes
Military Classification Scheme
Level
Risk If Information Is Disclosed to Unauthorized Entities
Top Secret Grave damage to national security.
Secret Serious damage to national security.
Confidential Damage to national security.
Unclassified No damage to national security.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Commercial Classification Schemes
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Commercial Classification
Scheme Level
Description
Corporate Confidential Information that should not be provided to individuals outside of the
enterprise.
Personal and Confidential Information of a personal nature that should be protected.
Private Correspondence of a private nature between two or more people
that should be safeguarded.
Trade Secret Corporate intellectual property that, if released, will present serious
damage to the company's ability to protect patents and processes.
Client Confidential • Client personal information that, if released, may result in the
identity theft of the individual.
• Corporate information or intellectual property
Privacy
• Privacy requirements present legal challenges.
• Should define:
What will be collected
How collected data will
be protected
Copyright © 2019 Logical Operations, Inc. All rights reserved.
How long private
information will be kept
How collected data will be
shared
How private information
will be disposed of
• Private data is owned by person data is about.
• Makes compliance challenging—organizations handle data.
• Organizations must balance protection requirements against business value of using
data.
• Consider both ethics and legal restrictions when protecting private data.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Private Data Ownership
• A data collector is an entity that collects and determines what will be done with
someone’s private data.
• A data controller is an entity that determines the purposes and means of processing
personal data.
• A data processor is an entity that processes private data on behalf of the controller.
• HR department
• Marketing department
• Call center
• EU GDPR stipulates data must be:
• Fairly and lawfully processed.
• Processed for limited purposes.
• Adequate, relevant, not excessive.
• Accurate.
• Kept no longer than necessary.
• Processed in accordance with data subject's rights.
• Secure.
• Transferred only to countries with adequate protection.
Data Collectors, Controllers, and Processors
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Private data shouldn’t be retained indefinitely.
• Most PII legal requirements stipulate requirements for retention and destruction.
• PII ceases to be private when posted publically—often impossible to rectify, especially
on the Internet.
• Internet of Things adds complications—private data is collected from household items.
Data Longevity
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• The act of storing a business asset.
• Assets that you may retain:
• Data
• Media
• Hardware
• Software
• Personnel
• Consider compliance requirements when retaining assets.
Retention
Hardware
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Retention Policies
• Retention policies need to be
comprehensive, not just for
data.
• Write clear policies and train
users.
• Older systems need special
care for disposal.
Todevelop a retention policy:
Copyright © 2019 Logical Operations, Inc. All rights reserved.
1. Evaluate statutory requirements, litigation
obligations, and business needs.
2. Classify types of records.
3. Determine retention periods and destruction
practices.
4. Draft and justify record retention policies.
5. Train staff.
6. Audit retention and destruction practices.
7. Periodically review policy.
8. Document policy, implementation, training, and
audits.
Data Retention
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Data is the organization’s most critical non-human asset.
• Different data will require different retention times.
• Ex: Financial records often kept for seven years.
• Other types of data may need to be disposed of quickly, even if only after a few
months.
• Even if data isn’t privacy-related, still consider it in the context of retention.
• Ex: Accounts receivable database must be retained for a specified period.
Media Retention
• Media are where you store your data:
• Tape
• CD/DVD
• Hard disks
• Removable flash drives
• Cloud storage
• Paper printout
• Best practices for taking care of media:
• Protect from sunlight, heat, and other natural processes.
• When media locked in safes, include silica gel packs to prevent
moisture/mildew.
• Stand tapes/floppy disks on edge, not flat.
• Keep magnetic media away from magnetic fields.
• Know the lifecycle of the backup tape you are using.
• Create authorized user list: one team for regular backup/restore; another
for disaster recovery.
• Use an automated system with bar code scanning that tracks media
movement.
• Repeatedly test your backup and restore procedures.
• Have a backup of any cloud data; make sure provider securely destroys it
when requested.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Hardware Retention
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Use hardware as long as possible, as cost can add up.
• Consider hardware’s role in protecting data.
• Maintain hardware so you can retrieve old data.
• Include non-media hardware components in retention plans.
• Create a retention plan that focuses on entire lifecycle.
• Create disposal plans for hardware if deprecated/obsolete.
• Scrub hardware of all data before disposal.
• Consider proper disposal procedures for electronic waste.
• Purchased or in-house software has a lifecycle, and requires a retention plan.
• Might need to do more than uninstall.
• Consider other system dependencies; can they function without this software?
• Keep track of software dependencies in retention policies.
• Software may require special scrubbing of data.
• Failing to completely wipe software may leave sensitive data unsecured.
Software Retention
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Personnel Retention
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Knowledge often trapped in departmental “silos”
(intentionally or not).
• Knowledge may not be documented.
• Avoid depending on a single person for critical business
needs and processes.
• Include provisions for transferring operational knowledge
in personnel retention policy.
• Include rotation of duties and multidisciplinary teams to
help break up the “silo” of information.
Data Security Control Selection
When you are selecting controls, consider:
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Agreements between organizations on data formats.
• How data is represented, formatted, defined, structured, transmitted, manipulated, tagged,
used, and managed.
• Support integrity of data and minimize redundancy.
• Set by:
• Standards bodies.
• Specific vendors.
• Help vendors implement consistent security across their products.
• Help identify the potential scope of a security incident.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Data Standards
Data Storage
• Don’t allow hard copies to lie around where any passerby
could take them or read them.
• Don’t allow sensitive information to be stored in cleartext
on a hard drive.
• Make sure backup media is encrypted.
• Send backup copies of data to a secure offsite location.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Data Remanence
• Information left on a storage medium even
after erasure.
• Can be recovered by unauthorized
personnel.
• Users may discard unreadable backup tapes,
not realizing that others can recover them.
• Users assume normal deletion or formatting
completely removes data, when it doesn’t.
• Best practice is to physically destroy media
rather than risk data remanence.
• Cloud storage presents challenges for
remanence.
• Ex: You terminate service with a cloud
provider. How can you assure your data has
truly been scrubbed from their servers?
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Data Destruction (Slide 1 of 2)
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Method Description
Erasing • A simple mechanism for deleting data, using operating system or third-party
tools.
• Also known as formatting.
• Although erasing can be done at the bit level (full format), it is typically
performed at the file table level (quick format).
• It is trivially easy to recover data that has been erased.
• Even if a full format has been performed, magnetic imprints can still be found on
the media and retrieved by data recovery houses.
Overwriting • Sometimes called clearing or electronic shredding.
• Remnant bits on the disk have been replaced by different bits (usually all zeros).
• The tool might skip bad or corrupt sectors, making data recovery possible.
Purging • A more intense form of clearing.
• Meant to assure all data remnants removed and media is clean and ready for
reuse.
• Still not fully trusted to be completely fail safe.
Degaussing • A technique that removes data from magnetic media.
• Hard drives are usually rendered useless after the process.
• Non-magnetic storage like CDs and SSDs are not affected.
Data Destruction (Slide 2 of 2)
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Method Description
Destruction • Physical destruction may ensure that media can't be reassembled or data
retrieved.
• The physical drive is lost in the process.
Encryption • Hides the data from unauthorized users without the key.
• If you destroy the key, the data is effectively destroyed.
• Sometimes used before media is purged or destroyed.
Declassification • Not a data removal technique, but still part of data removal process.
• Media with classified files is retained until data is no longer deemed to be
sensitive.
• Once data is declassified, media can be erased, purged, etc., before reuse.
• Web app might be written without sufficient security.
• Insecure communications between web app and back-end database/file server.
• Insufficient security for web service hosting web app.
• Web system located on insufficiently protected OS or hardware.
• Inadequate authentication requirements for web app, server, or OS.
• Failed logon attempts not properly monitored or controlled.
• XML language vulnerabilities:
• XML parser can manipulate/misinterpret data.
• Risk of injection attacks.
• SAML language vulnerabilities:
• Improper implementation:
• Leaving out identifier of authorization request.
• Leaving out identity of recipient.
• SOAP
• Neutral mechanism for clients to request services via HTTP or other protocols.
• Vulnerable to malicious commands including SQL or XML injection.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Web-Based System Vulnerabilities
Malicious Code Examples
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Name Example Comment
SQL Injection blah' or 1=1-- • Based on an OR statement
• Todefeat, you must sanitize input or use
stored procedures with parameterized SQL
queries
Directory traversal https://www.victim.com/..%c0%af../w
innt/system32/cmd.exe?/c+tftp.exe+-
i+get+exploit.exe
• Uses special Unicode characters or other
mechanisms to bypass controls and allow
browsing of the file system
• Todefeat, use file system permissions
Metacharacters ' " [ ]  ; & ^ . | ? * + { } ( ) • Some special characters have programmatic
meaning
• Todefeat, sanitize client input and use
escape characters to neutralize
programmatic capabilities
Script <script>Some malicious command
here</script>
• Malicious code often takes the form of a
script
• Patch systems and sanitize input to disallow
unauthorized scripts
Vulnerability Assessments
Perform when:
• First deploy new/updated systems.
• New vulnerabilities have been identified.
• A security breach occurs.
• Need to document security state of systems.
Collect Store Organize Analyze Report
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Port scanner
• Protocol analyzer
• Packet analyzer
• Network enumerator
• Intelligence gathering
• Vulnerability scanner
Vulnerability Scanning
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Penetration Test Preparation
Who will commission the test?
Who will conduct the test?
How will the test be conducted?
What are the test’s limitations?
What tools will be used in the test?
Who on the client side will be available in case of accident?
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Penetration Test Approaches
BlackBox
Test
Grey
BoxTest
White
BoxTest
• Black Box
• Most effective at real-world evaluation.
• Most time and effort.
• Need to carefully consider who should know about the test.
• Grey Box
• Complex parameters needed to strike the perfect balance.
• White Box
• More comprehensive evaluation because of broad perspective of organizational systems.
• Might be too simulated – not able to account for attackers’ out of the box thinking.
Full Amount of Reconnaissance None
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Collection of virtual servers available for rent.
• Common services:
• Web, database, and email hosting.
• Storage.
• Online applications (such as Microsoft Office 365).
• Blank servers or unconfigured services that customers can use as they please.
• Telephone systems.
• Directory services.
• Remote monitoring and management.
• Mobile device management.
• Entire network infrastructures.
• Identify-as-a-Service (IDaaS).
• X-as-a-Service (XaaS).
• Malware-as-a-Service (MaaS).
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Cloud Services
Cloud Types (Slide 1 of 2)
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Cloud Type Description
Public • Customer VMs run side by side on the same hardware.
• Access control prevents customers from accessing (and even being aware
of) other customers' resources and VMs.
• Most straightforward and least expensive model.
Private • The organization creates its own "cloud" in its own data center for the
exclusive use of its own employees.
• Cloud experience with maximum security for the organization.
• The cloud runs on the company intranet.
• Departments act as customers.
• They use the company intranet portal to "purchase" services as needed.
Hybrid • A mix of on-premises private cloud services with public, third-party
services.
• The two platforms use orchestration to coordinate services and data
exchange.
• This type of arrangement provides flexibility for the organization, allowing
employees to access more secure or better performing local resources,
while remote users can access services from the Internet.
Cloud Types (Slide 2 of 2)
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Cloud Type Description
Community • A multitenant platform which is available to only a subset of customers.
• Multiple organizations that have the same needs, including security and
regulatory compliance, can share a community cloud.
• It is a good solution for organizations that don't fully trust the security of a
public cloud, but they would rather not go through the complexity of
setting up their own private cloud.
• U.S. federal government agencies often share a community cloud.
• Your security is dependent on security practices of cloud service provider.
• You don't have direct immediate control over systems.
• Your virtual machines are hosted on same computer as other customers'.
• If another customer’s VM escapes sandbox, might attack:
• Your VM.
• Host that both of you are on.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Cloud Services Vulnerabilities
• Do not use someone else's cloud service to host your most critical data.
• Make sure that cloud service provider has excellent SLA that describes:
• Incident response.
• Business continuity plan.
• Disaster recovery procedures.
• Protect connection to provider's cloud with strong encryption/authentication:
• Between systems.
• Between users and systems.
• Plan contingencies for compromised data following cloud provider breach.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Cloud Services Risk Mitigation
END
Copyright © 2019 Logical Operations, Inc. All rights reserved.

More Related Content

What's hot

Lesson 2
Lesson 2Lesson 2
CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1
Hamed Moghaddam
 
Lesson 4
Lesson 4Lesson 4
Lesson 1
Lesson 1Lesson 1
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
Dan Michaluk
 
Lesson 1 - Technical Controls
Lesson 1 - Technical ControlsLesson 1 - Technical Controls
Lesson 1 - Technical Controls
MLG College of Learning, Inc
 
Lesson 1
Lesson 1Lesson 1
Lesson 1 - Introduction
Lesson 1 - Introduction Lesson 1 - Introduction
Lesson 1 - Introduction
MLG College of Learning, Inc
 
Information Security
Information SecurityInformation Security
Information Security
chenpingling
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
Zefren Edior
 
Lesson 3
Lesson 3Lesson 3
Domain 2 - Asset Security
Domain 2 - Asset SecurityDomain 2 - Asset Security
Domain 2 - Asset Security
Maganathin Veeraragaloo
 
Information Security
Information SecurityInformation Security
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
Nada G.Youssef
 
CISSP Certification-Asset Security
CISSP Certification-Asset SecurityCISSP Certification-Asset Security
CISSP Certification-Asset Security
Hamed Moghaddam
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
festival ICT 2016
 
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgInformation Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Eric Vanderburg
 
Lesson 2
Lesson 2Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4
MLG College of Learning, Inc
 
Lesson 2- Information Asset Valuation
Lesson 2- Information Asset ValuationLesson 2- Information Asset Valuation
Lesson 2- Information Asset Valuation
MLG College of Learning, Inc
 

What's hot (20)

Lesson 2
Lesson 2Lesson 2
Lesson 2
 
CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1
 
Lesson 4
Lesson 4Lesson 4
Lesson 4
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
Lesson 1 - Technical Controls
Lesson 1 - Technical ControlsLesson 1 - Technical Controls
Lesson 1 - Technical Controls
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Lesson 1 - Introduction
Lesson 1 - Introduction Lesson 1 - Introduction
Lesson 1 - Introduction
 
Information Security
Information SecurityInformation Security
Information Security
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Domain 2 - Asset Security
Domain 2 - Asset SecurityDomain 2 - Asset Security
Domain 2 - Asset Security
 
Information Security
Information SecurityInformation Security
Information Security
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
 
CISSP Certification-Asset Security
CISSP Certification-Asset SecurityCISSP Certification-Asset Security
CISSP Certification-Asset Security
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
 
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgInformation Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4
 
Lesson 2- Information Asset Valuation
Lesson 2- Information Asset ValuationLesson 2- Information Asset Valuation
Lesson 2- Information Asset Valuation
 

Similar to Secuntialesse

gkknwqeq3232,sqSecurity essentials domain 3
gkknwqeq3232,sqSecurity essentials   domain 3gkknwqeq3232,sqSecurity essentials   domain 3
gkknwqeq3232,sqSecurity essentials domain 3
Anne Starr
 
chapter7-220725121544-6a1c05a5.pdf
chapter7-220725121544-6a1c05a5.pdfchapter7-220725121544-6a1c05a5.pdf
chapter7-220725121544-6a1c05a5.pdf
MahmoudSOLIMAN380726
 
Chapter 7: Data Security Management
Chapter 7: Data Security ManagementChapter 7: Data Security Management
Chapter 7: Data Security Management
Ahmed Alorage
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
Karthikeyan Dhayalan
 
gkkwqdqqndqw2121234Security essentials domain 4
gkkwqdqqndqw2121234Security essentials   domain 4gkkwqdqqndqw2121234Security essentials   domain 4
gkkwqdqqndqw2121234Security essentials domain 4
Anne Starr
 
7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations
HelpSystems
 
Cybertopic_2security
Cybertopic_2securityCybertopic_2security
Cybertopic_2security
Anne Starr
 
Implementing Asset Management System with ISO 55001
Implementing Asset Management System with ISO 55001Implementing Asset Management System with ISO 55001
Implementing Asset Management System with ISO 55001
PECB
 
What IT Needs to Consider for Legal Hold
What IT Needs to Consider for Legal HoldWhat IT Needs to Consider for Legal Hold
What IT Needs to Consider for Legal Hold
David D. Maxwell, MIT Security, CISM, CISA, CISSP
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptx
NguyenNM
 
Data governance guide
Data governance guideData governance guide
Data governance guide
CenapSerdarolu
 
Data governance guide
Data governance guideData governance guide
Data governance guide
AstalapulosListestos
 
CERN 5 Things you should know about Data Protection
CERN 5 Things you should know about Data ProtectionCERN 5 Things you should know about Data Protection
CERN 5 Things you should know about Data Protection
EUDAT
 
GDPR in practice
GDPR in practiceGDPR in practice
GDPR in practice
ZoneFox
 
ISStateGovtProposal
ISStateGovtProposalISStateGovtProposal
ISStateGovtProposal
Dale White
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
Everteam
 
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
IGN MANTRA
 
Lecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptLecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.ppt
DrBasemMohamedElomda
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
IT Governance Ltd
 
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Cillian Kieran
 

Similar to Secuntialesse (20)

gkknwqeq3232,sqSecurity essentials domain 3
gkknwqeq3232,sqSecurity essentials   domain 3gkknwqeq3232,sqSecurity essentials   domain 3
gkknwqeq3232,sqSecurity essentials domain 3
 
chapter7-220725121544-6a1c05a5.pdf
chapter7-220725121544-6a1c05a5.pdfchapter7-220725121544-6a1c05a5.pdf
chapter7-220725121544-6a1c05a5.pdf
 
Chapter 7: Data Security Management
Chapter 7: Data Security ManagementChapter 7: Data Security Management
Chapter 7: Data Security Management
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
 
gkkwqdqqndqw2121234Security essentials domain 4
gkkwqdqqndqw2121234Security essentials   domain 4gkkwqdqqndqw2121234Security essentials   domain 4
gkkwqdqqndqw2121234Security essentials domain 4
 
7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations
 
Cybertopic_2security
Cybertopic_2securityCybertopic_2security
Cybertopic_2security
 
Implementing Asset Management System with ISO 55001
Implementing Asset Management System with ISO 55001Implementing Asset Management System with ISO 55001
Implementing Asset Management System with ISO 55001
 
What IT Needs to Consider for Legal Hold
What IT Needs to Consider for Legal HoldWhat IT Needs to Consider for Legal Hold
What IT Needs to Consider for Legal Hold
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptx
 
Data governance guide
Data governance guideData governance guide
Data governance guide
 
Data governance guide
Data governance guideData governance guide
Data governance guide
 
CERN 5 Things you should know about Data Protection
CERN 5 Things you should know about Data ProtectionCERN 5 Things you should know about Data Protection
CERN 5 Things you should know about Data Protection
 
GDPR in practice
GDPR in practiceGDPR in practice
GDPR in practice
 
ISStateGovtProposal
ISStateGovtProposalISStateGovtProposal
ISStateGovtProposal
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
 
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
 
Lecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptLecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.ppt
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
 

More from Anne Starr

I01letor20so201leutor2020
I01letor20so201leutor2020I01letor20so201leutor2020
I01letor20so201leutor2020
Anne Starr
 
Iso27001leadauditor2020
Iso27001leadauditor2020Iso27001leadauditor2020
Iso27001leadauditor2020
Anne Starr
 
Ccsddm5days
Ccsddm5daysCcsddm5days
Ccsddm5days
Anne Starr
 
Dayblic
DayblicDayblic
Dayblic
Anne Starr
 
Day1cspbeblic
Day1cspbeblicDay1cspbeblic
Day1cspbeblic
Anne Starr
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
Anne Starr
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
Anne Starr
 
2 slides(2ndvariadaystion)
2 slides(2ndvariadaystion)2 slides(2ndvariadaystion)
2 slides(2ndvariadaystion)
Anne Starr
 
Securityic2
Securityic2Securityic2
Securityic2
Anne Starr
 
inte
inteinte
Awtitioneressentialsdeckscloudprac401-577
Awtitioneressentialsdeckscloudprac401-577Awtitioneressentialsdeckscloudprac401-577
Awtitioneressentialsdeckscloudprac401-577
Anne Starr
 
01wslouAsentialsdeck2dpractitioneres-400
01wslouAsentialsdeck2dpractitioneres-40001wslouAsentialsdeck2dpractitioneres-400
01wslouAsentialsdeck2dpractitioneres-400
Anne Starr
 
uderessAwscloentialsdeck1-2ion00
uderessAwscloentialsdeck1-2ion00uderessAwscloentialsdeck1-2ion00
uderessAwscloentialsdeck1-2ion00
Anne Starr
 
Cloudhnologysstecociat
CloudhnologysstecociatCloudhnologysstecociat
Cloudhnologysstecociat
Anne Starr
 
Cmbysantocsddsh
CmbysantocsddshCmbysantocsddsh
Cmbysantocsddsh
Anne Starr
 
Cddmbysantcsosh
CddmbysantcsoshCddmbysantcsosh
Cddmbysantcsosh
Anne Starr
 
Ccbysantsddosh
Ccbysantsddosh  Ccbysantsddosh
Ccbysantsddosh
Anne Starr
 
Ccsdbyhday1santodms
Ccsdbyhday1santodmsCcsdbyhday1santodms
Ccsdbyhday1santodms
Anne Starr
 
Serskmanagvicedeement
SerskmanagvicedeementSerskmanagvicedeement
Serskmanagvicedeement
Anne Starr
 
foundatamp;practitioner)princeion&2aombigile
foundatamp;practitioner)princeion&2aombigilefoundatamp;practitioner)princeion&2aombigile
foundatamp;practitioner)princeion&2aombigile
Anne Starr
 

More from Anne Starr (20)

I01letor20so201leutor2020
I01letor20so201leutor2020I01letor20so201leutor2020
I01letor20so201leutor2020
 
Iso27001leadauditor2020
Iso27001leadauditor2020Iso27001leadauditor2020
Iso27001leadauditor2020
 
Ccsddm5days
Ccsddm5daysCcsddm5days
Ccsddm5days
 
Dayblic
DayblicDayblic
Dayblic
 
Day1cspbeblic
Day1cspbeblicDay1cspbeblic
Day1cspbeblic
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
 
2 slides(2ndvariadaystion)
2 slides(2ndvariadaystion)2 slides(2ndvariadaystion)
2 slides(2ndvariadaystion)
 
Securityic2
Securityic2Securityic2
Securityic2
 
inte
inteinte
inte
 
Awtitioneressentialsdeckscloudprac401-577
Awtitioneressentialsdeckscloudprac401-577Awtitioneressentialsdeckscloudprac401-577
Awtitioneressentialsdeckscloudprac401-577
 
01wslouAsentialsdeck2dpractitioneres-400
01wslouAsentialsdeck2dpractitioneres-40001wslouAsentialsdeck2dpractitioneres-400
01wslouAsentialsdeck2dpractitioneres-400
 
uderessAwscloentialsdeck1-2ion00
uderessAwscloentialsdeck1-2ion00uderessAwscloentialsdeck1-2ion00
uderessAwscloentialsdeck1-2ion00
 
Cloudhnologysstecociat
CloudhnologysstecociatCloudhnologysstecociat
Cloudhnologysstecociat
 
Cmbysantocsddsh
CmbysantocsddshCmbysantocsddsh
Cmbysantocsddsh
 
Cddmbysantcsosh
CddmbysantcsoshCddmbysantcsosh
Cddmbysantcsosh
 
Ccbysantsddosh
Ccbysantsddosh  Ccbysantsddosh
Ccbysantsddosh
 
Ccsdbyhday1santodms
Ccsdbyhday1santodmsCcsdbyhday1santodms
Ccsdbyhday1santodms
 
Serskmanagvicedeement
SerskmanagvicedeementSerskmanagvicedeement
Serskmanagvicedeement
 
foundatamp;practitioner)princeion&2aombigile
foundatamp;practitioner)princeion&2aombigilefoundatamp;practitioner)princeion&2aombigile
foundatamp;practitioner)princeion&2aombigile
 

Recently uploaded

Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Kalna College
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
Celine George
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
shreyassri1208
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
IsmaelVazquez38
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
Payaamvohra1
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
David Douglas School District
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
Nguyen Thanh Tu Collection
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapitolTechU
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
RandolphRadicy
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 

Recently uploaded (20)

Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 

Secuntialesse

  • 1. Data, and Application Security Web Application Security, Cloud CCSD SECURITY ESSENTIAL
  • 2. Asset Management • Assets include hardware, software, data, physical systems, and documentation. • ITAM is managing the lifecycle of these assets. • In secure ITAM: • Strike balance between cost and need. • Distinguish between data ownership/data custodianship. • Implement controls to secure private data. • Implement asset security to protect against liability. • Apply classifications to sensitive data. • Be very clear about regulatory policy requirements. • In your policy, have a process in place to respond to legal requests for your data. Hardware Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 3. Asset Management Roles (Slide 1 of 2) Copyright © 2019 Logical Operations, Inc. All rights reserved. Role Description Data Owner • Involved in creation, acquisition, and usage of data. • Must understand the cost to maintain data, as well as the quality. • Determines sensitivity of data and associated risks. • Determines who has access to data. • Should have input in retention and destruction policies. • Should be aware of legal or regulatory issues with data. Data Custodian • Tasked with protecting data. • Implements access requirements per data owner. • Applies controls, maintains, monitors, and destroys data when necessary. • Can be a database administrator, system administrator, or other IT role. System Owner • Owns the computer that the data resides on. • May be different than data owner. • Ex: IT department owns servers; Sales owns data on servers. Administrator • Manages IT systems. • Usually works in the IT department. • Can also be someone else trusted to perform administrative tasks.
  • 4. Asset Management Roles (Slide 2 of 2) Copyright © 2019 Logical Operations, Inc. All rights reserved. Role Description Business Owner • Owns all or part of the business. • Won’t usually be involved in the technical aspect of asset management. • Is interested in the financial value of assets. End User • Uses IT resources and other assets as part of their job. • Typically has no administrative privilege. Auditor • Periodically checks to see if assets are being utilized in accordance with internal policy or regulatory requirements. • Might be an employee, but more likely to be external.
  • 5. • Use labeling to minimize risk of loss or modification. • Labeling schemes are known as classifications. • Management must determine: Classification Principles Hardware Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 6. Classification Process 6. Implement classification schema 1. Identify asset 2. Determine who is accountable for its integrity 3. Establish ownership of asset 4. Place value on asset 5. Prepare schema for classifying asset Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 7. Classification Policies • Classification policy includes: • Users may drive classification types based on how they handle assets. • Regular reviews determine if appropriate classification is maintained. Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 8. Classification Schemes • Military • Employed by U.S. government. • Strictly defined, rigid. • Commercial • Employed by non-governmental organizations. • Developed to support business needs. Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 9. Military Classification Schemes Military Classification Scheme Level Risk If Information Is Disclosed to Unauthorized Entities Top Secret Grave damage to national security. Secret Serious damage to national security. Confidential Damage to national security. Unclassified No damage to national security. Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 10. Commercial Classification Schemes Copyright © 2019 Logical Operations, Inc. All rights reserved. Commercial Classification Scheme Level Description Corporate Confidential Information that should not be provided to individuals outside of the enterprise. Personal and Confidential Information of a personal nature that should be protected. Private Correspondence of a private nature between two or more people that should be safeguarded. Trade Secret Corporate intellectual property that, if released, will present serious damage to the company's ability to protect patents and processes. Client Confidential • Client personal information that, if released, may result in the identity theft of the individual. • Corporate information or intellectual property
  • 11. Privacy • Privacy requirements present legal challenges. • Should define: What will be collected How collected data will be protected Copyright © 2019 Logical Operations, Inc. All rights reserved. How long private information will be kept How collected data will be shared How private information will be disposed of
  • 12. • Private data is owned by person data is about. • Makes compliance challenging—organizations handle data. • Organizations must balance protection requirements against business value of using data. • Consider both ethics and legal restrictions when protecting private data. Copyright © 2019 Logical Operations, Inc. All rights reserved. Private Data Ownership
  • 13. • A data collector is an entity that collects and determines what will be done with someone’s private data. • A data controller is an entity that determines the purposes and means of processing personal data. • A data processor is an entity that processes private data on behalf of the controller. • HR department • Marketing department • Call center • EU GDPR stipulates data must be: • Fairly and lawfully processed. • Processed for limited purposes. • Adequate, relevant, not excessive. • Accurate. • Kept no longer than necessary. • Processed in accordance with data subject's rights. • Secure. • Transferred only to countries with adequate protection. Data Collectors, Controllers, and Processors Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 14. • Private data shouldn’t be retained indefinitely. • Most PII legal requirements stipulate requirements for retention and destruction. • PII ceases to be private when posted publically—often impossible to rectify, especially on the Internet. • Internet of Things adds complications—private data is collected from household items. Data Longevity Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 15. • The act of storing a business asset. • Assets that you may retain: • Data • Media • Hardware • Software • Personnel • Consider compliance requirements when retaining assets. Retention Hardware Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 16. Retention Policies • Retention policies need to be comprehensive, not just for data. • Write clear policies and train users. • Older systems need special care for disposal. Todevelop a retention policy: Copyright © 2019 Logical Operations, Inc. All rights reserved. 1. Evaluate statutory requirements, litigation obligations, and business needs. 2. Classify types of records. 3. Determine retention periods and destruction practices. 4. Draft and justify record retention policies. 5. Train staff. 6. Audit retention and destruction practices. 7. Periodically review policy. 8. Document policy, implementation, training, and audits.
  • 17. Data Retention Copyright © 2019 Logical Operations, Inc. All rights reserved. • Data is the organization’s most critical non-human asset. • Different data will require different retention times. • Ex: Financial records often kept for seven years. • Other types of data may need to be disposed of quickly, even if only after a few months. • Even if data isn’t privacy-related, still consider it in the context of retention. • Ex: Accounts receivable database must be retained for a specified period.
  • 18. Media Retention • Media are where you store your data: • Tape • CD/DVD • Hard disks • Removable flash drives • Cloud storage • Paper printout • Best practices for taking care of media: • Protect from sunlight, heat, and other natural processes. • When media locked in safes, include silica gel packs to prevent moisture/mildew. • Stand tapes/floppy disks on edge, not flat. • Keep magnetic media away from magnetic fields. • Know the lifecycle of the backup tape you are using. • Create authorized user list: one team for regular backup/restore; another for disaster recovery. • Use an automated system with bar code scanning that tracks media movement. • Repeatedly test your backup and restore procedures. • Have a backup of any cloud data; make sure provider securely destroys it when requested. Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 19. Hardware Retention Copyright © 2019 Logical Operations, Inc. All rights reserved. • Use hardware as long as possible, as cost can add up. • Consider hardware’s role in protecting data. • Maintain hardware so you can retrieve old data. • Include non-media hardware components in retention plans. • Create a retention plan that focuses on entire lifecycle. • Create disposal plans for hardware if deprecated/obsolete. • Scrub hardware of all data before disposal. • Consider proper disposal procedures for electronic waste.
  • 20. • Purchased or in-house software has a lifecycle, and requires a retention plan. • Might need to do more than uninstall. • Consider other system dependencies; can they function without this software? • Keep track of software dependencies in retention policies. • Software may require special scrubbing of data. • Failing to completely wipe software may leave sensitive data unsecured. Software Retention Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 21. Personnel Retention Copyright © 2019 Logical Operations, Inc. All rights reserved. • Knowledge often trapped in departmental “silos” (intentionally or not). • Knowledge may not be documented. • Avoid depending on a single person for critical business needs and processes. • Include provisions for transferring operational knowledge in personnel retention policy. • Include rotation of duties and multidisciplinary teams to help break up the “silo” of information.
  • 22. Data Security Control Selection When you are selecting controls, consider: Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 23. • Agreements between organizations on data formats. • How data is represented, formatted, defined, structured, transmitted, manipulated, tagged, used, and managed. • Support integrity of data and minimize redundancy. • Set by: • Standards bodies. • Specific vendors. • Help vendors implement consistent security across their products. • Help identify the potential scope of a security incident. Copyright © 2019 Logical Operations, Inc. All rights reserved. Data Standards
  • 24. Data Storage • Don’t allow hard copies to lie around where any passerby could take them or read them. • Don’t allow sensitive information to be stored in cleartext on a hard drive. • Make sure backup media is encrypted. • Send backup copies of data to a secure offsite location. Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 25. Data Remanence • Information left on a storage medium even after erasure. • Can be recovered by unauthorized personnel. • Users may discard unreadable backup tapes, not realizing that others can recover them. • Users assume normal deletion or formatting completely removes data, when it doesn’t. • Best practice is to physically destroy media rather than risk data remanence. • Cloud storage presents challenges for remanence. • Ex: You terminate service with a cloud provider. How can you assure your data has truly been scrubbed from their servers? Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 26. Data Destruction (Slide 1 of 2) Copyright © 2019 Logical Operations, Inc. All rights reserved. Method Description Erasing • A simple mechanism for deleting data, using operating system or third-party tools. • Also known as formatting. • Although erasing can be done at the bit level (full format), it is typically performed at the file table level (quick format). • It is trivially easy to recover data that has been erased. • Even if a full format has been performed, magnetic imprints can still be found on the media and retrieved by data recovery houses. Overwriting • Sometimes called clearing or electronic shredding. • Remnant bits on the disk have been replaced by different bits (usually all zeros). • The tool might skip bad or corrupt sectors, making data recovery possible. Purging • A more intense form of clearing. • Meant to assure all data remnants removed and media is clean and ready for reuse. • Still not fully trusted to be completely fail safe. Degaussing • A technique that removes data from magnetic media. • Hard drives are usually rendered useless after the process. • Non-magnetic storage like CDs and SSDs are not affected.
  • 27. Data Destruction (Slide 2 of 2) Copyright © 2019 Logical Operations, Inc. All rights reserved. Method Description Destruction • Physical destruction may ensure that media can't be reassembled or data retrieved. • The physical drive is lost in the process. Encryption • Hides the data from unauthorized users without the key. • If you destroy the key, the data is effectively destroyed. • Sometimes used before media is purged or destroyed. Declassification • Not a data removal technique, but still part of data removal process. • Media with classified files is retained until data is no longer deemed to be sensitive. • Once data is declassified, media can be erased, purged, etc., before reuse.
  • 28. • Web app might be written without sufficient security. • Insecure communications between web app and back-end database/file server. • Insufficient security for web service hosting web app. • Web system located on insufficiently protected OS or hardware. • Inadequate authentication requirements for web app, server, or OS. • Failed logon attempts not properly monitored or controlled. • XML language vulnerabilities: • XML parser can manipulate/misinterpret data. • Risk of injection attacks. • SAML language vulnerabilities: • Improper implementation: • Leaving out identifier of authorization request. • Leaving out identity of recipient. • SOAP • Neutral mechanism for clients to request services via HTTP or other protocols. • Vulnerable to malicious commands including SQL or XML injection. Copyright © 2019 Logical Operations, Inc. All rights reserved. Web-Based System Vulnerabilities
  • 29. Malicious Code Examples Copyright © 2019 Logical Operations, Inc. All rights reserved. Name Example Comment SQL Injection blah' or 1=1-- • Based on an OR statement • Todefeat, you must sanitize input or use stored procedures with parameterized SQL queries Directory traversal https://www.victim.com/..%c0%af../w innt/system32/cmd.exe?/c+tftp.exe+- i+get+exploit.exe • Uses special Unicode characters or other mechanisms to bypass controls and allow browsing of the file system • Todefeat, use file system permissions Metacharacters ' " [ ] ; & ^ . | ? * + { } ( ) • Some special characters have programmatic meaning • Todefeat, sanitize client input and use escape characters to neutralize programmatic capabilities Script <script>Some malicious command here</script> • Malicious code often takes the form of a script • Patch systems and sanitize input to disallow unauthorized scripts
  • 30. Vulnerability Assessments Perform when: • First deploy new/updated systems. • New vulnerabilities have been identified. • A security breach occurs. • Need to document security state of systems. Collect Store Organize Analyze Report Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 31. • Port scanner • Protocol analyzer • Packet analyzer • Network enumerator • Intelligence gathering • Vulnerability scanner Vulnerability Scanning Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 32. Penetration Test Preparation Who will commission the test? Who will conduct the test? How will the test be conducted? What are the test’s limitations? What tools will be used in the test? Who on the client side will be available in case of accident? Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 33. Penetration Test Approaches BlackBox Test Grey BoxTest White BoxTest • Black Box • Most effective at real-world evaluation. • Most time and effort. • Need to carefully consider who should know about the test. • Grey Box • Complex parameters needed to strike the perfect balance. • White Box • More comprehensive evaluation because of broad perspective of organizational systems. • Might be too simulated – not able to account for attackers’ out of the box thinking. Full Amount of Reconnaissance None Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 34. • Collection of virtual servers available for rent. • Common services: • Web, database, and email hosting. • Storage. • Online applications (such as Microsoft Office 365). • Blank servers or unconfigured services that customers can use as they please. • Telephone systems. • Directory services. • Remote monitoring and management. • Mobile device management. • Entire network infrastructures. • Identify-as-a-Service (IDaaS). • X-as-a-Service (XaaS). • Malware-as-a-Service (MaaS). Copyright © 2019 Logical Operations, Inc. All rights reserved. Cloud Services
  • 35. Cloud Types (Slide 1 of 2) Copyright © 2019 Logical Operations, Inc. All rights reserved. Cloud Type Description Public • Customer VMs run side by side on the same hardware. • Access control prevents customers from accessing (and even being aware of) other customers' resources and VMs. • Most straightforward and least expensive model. Private • The organization creates its own "cloud" in its own data center for the exclusive use of its own employees. • Cloud experience with maximum security for the organization. • The cloud runs on the company intranet. • Departments act as customers. • They use the company intranet portal to "purchase" services as needed. Hybrid • A mix of on-premises private cloud services with public, third-party services. • The two platforms use orchestration to coordinate services and data exchange. • This type of arrangement provides flexibility for the organization, allowing employees to access more secure or better performing local resources, while remote users can access services from the Internet.
  • 36. Cloud Types (Slide 2 of 2) Copyright © 2019 Logical Operations, Inc. All rights reserved. Cloud Type Description Community • A multitenant platform which is available to only a subset of customers. • Multiple organizations that have the same needs, including security and regulatory compliance, can share a community cloud. • It is a good solution for organizations that don't fully trust the security of a public cloud, but they would rather not go through the complexity of setting up their own private cloud. • U.S. federal government agencies often share a community cloud.
  • 37. • Your security is dependent on security practices of cloud service provider. • You don't have direct immediate control over systems. • Your virtual machines are hosted on same computer as other customers'. • If another customer’s VM escapes sandbox, might attack: • Your VM. • Host that both of you are on. Copyright © 2019 Logical Operations, Inc. All rights reserved. Cloud Services Vulnerabilities
  • 38. • Do not use someone else's cloud service to host your most critical data. • Make sure that cloud service provider has excellent SLA that describes: • Incident response. • Business continuity plan. • Disaster recovery procedures. • Protect connection to provider's cloud with strong encryption/authentication: • Between systems. • Between users and systems. • Plan contingencies for compromised data following cloud provider breach. Copyright © 2019 Logical Operations, Inc. All rights reserved. Cloud Services Risk Mitigation
  • 39. END Copyright © 2019 Logical Operations, Inc. All rights reserved.