{elysiumsecurity}
PROTECTING YOUR DATA
Version: 1.2a
Date: 27/06/2018
Author: Sylvain Martinez
Reference: ESC7-MUSCL
Classification: Public
cyber protection & response
{elysiumsecurity}
cyber protection & response
2
BEST PRACTICEDATA SECURITYCONTEXT
• Data security scope;
• Data security concept;
• Data security
solutions;
CONTENTS
Public
• Data definition;
• Data form ;
• Data type;
• Data security goals,
threats and im pacts;
• Data security
awareness;
• Safe behaviours;
• Take away.
{elysiumsecurity}
cyber protection & response
3
BEST PRACTISEDATA SECURITYCONTEXT
DATA DEFINITION
Public
0 1 0 0 0 1 1 1 0 1 0 0 0 1 0 1 0 1
ANYTHING CREATED DIGITALLY
"transmittable and storable
computer information" - 1946
Picture from PIXABAY
{elysiumsecurity}
cyber protection & response
4
BEST PRACTISEDATA SECURITYCONTEXT
DATA FORM
Public Icons from the Noun Project unless stated otherwise
{elysiumsecurity}
cyber protection & response
5
BEST PRACTISEDATA SECURITYCONTEXT
DATA TYPE
Public
{elysiumsecurity}
cyber protection & response
6
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY GOALS, THREATS & IMPACTS
Public
CONFIDENTIALITY
C
INTEGRITY
A
AVAILIBILITY
I
SECURITY
GOALS
CIA vs. MPH
SECURITY
IMPACTS
DATA
LEAKAGE
UNAUTHORISED
MODIFICATION
DESTRUCTION
& LOCK
MALWARE
M
HACKING
H
PHISHING
P
SECURITY
THREATS
{elysiumsecurity}
cyber protection & response
7
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY SCOPE
Public
USAGE
Creation
Consumption
Destruction
Transit
Transmission
Remote Access
COMMUNICATION
Saved
Sleep State
Backup
AT REST
SYSTEM ENCRYPTION
FILE/DATA ENCRYPTION
COMMUNICATION ENCRYPTION
{elysiumsecurity}
cyber protection & response
8
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY CONCEPT
Public
1. PROTECT DATA
DATA POLICY
DATA CLASSIFICATION AND ROLES
ACCESS CONTROLS
2. RESTRICT DATA ACCESS
LABELLING
LOGS
FILE VISIBILITY
3. MONITOR DATA ACTIVITY
BITLOCKER, FIREVAULT, ENCFS, ZIP
DRM, PASSWORD SAFE
TLS/SSL
{elysiumsecurity}
cyber protection & response
9
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY SOLUTIONS
Public
1. PROTECT DATA
DRM
PASSWORDS
ACCESS RIGHTS
2. RESTRICT DATA ACCESS
DLP, DRM
IDS
DATA INVENTORY
3. MONITOR DATA ACTIVITY
{elysiumsecurity}
cyber protection & response
10
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY AWARENESS
Public
FROM TOENVIRONMENT
{elysiumsecurity}
cyber protection & response
11
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY AWARENESS
Public
NATURE
{elysiumsecurity}
cyber protection & response
12
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY AWARENESS
Public
PAY ATTENTION
{elysiumsecurity}
cyber protection & response
13
BEST PRACTISEDATA SECURITYCONTEXT
SAFE BEHAVIOURS
Public
HALF TRUTH
BACKUP DATA
YOU CAN SAY NO
DO NOT RE-USE CREDENTIALS
CHANGE DEFAULT PASSWORD
THINK BEFORE YOU CLICK!
{elysiumsecurity}
cyber protection & response
14
BEST PRACTISEDATA SECURITYCONTEXT
TAKE AWAY
Public
1. USE STRONG PASSWORDS AND A
PASSWORD SAFE
3. ENCRYPT YOUR DATA
5. ENABLE DUAL FACTOR
AUTHENTICATION
2. USE UNIQUE PASSWORDS
4. BACKUP YOUR DATA
6. SCREENLOCK AUTOMATIC AND WHEN
AWAY
7. BE AWARE OF YOUR ENVIRONMENT
9. NO DEFAULT PASSWORD/CONFIG
11. PAY ATTENTION TO WARNINGS
8. CUSTOM IS GOOD, STANDARD IS
BETTER
10. UP TO DATE ANTI VIRUS / ENDPOINT
PROTECTION
12. THINK BEFORE YOU CLICK!
{elysiumsecurity}
cyber protection & response
© 2018 Elysium Security Ltd.
All Rights Reserved
www.elysium security.com
ElysiumSecurity provides practical expertise to identify
vulnerabilities, assess their risks and impact, remediate
those risks, prepare and respond to incidents as well as raise
security awareness through an organization.
ElysiumSecurity provides high level expertise gathered
through years of best practices experience in large
international companies allowing us to provide advice best
suited to your business operational model and priorities.
ABOUT ELYSIUMSECURITY LTD.
ElysiumSecurity provides a portfolio of Strategic and Tactical
Services to help companies protect and respond against Cyber
Security Threats. We differentiate ourselves by offering discreet,
tailored and specialized engagements.
Operating in Mauritius and in the United Kingdom,
our boutique style approach means we can easily adapt to your
business operational model and requirements to provide a
personalized service that fits your working environment.

Talk1 esc7 muscl-dataprotection_v1_2

  • 1.
    {elysiumsecurity} PROTECTING YOUR DATA Version:1.2a Date: 27/06/2018 Author: Sylvain Martinez Reference: ESC7-MUSCL Classification: Public cyber protection & response
  • 2.
    {elysiumsecurity} cyber protection &response 2 BEST PRACTICEDATA SECURITYCONTEXT • Data security scope; • Data security concept; • Data security solutions; CONTENTS Public • Data definition; • Data form ; • Data type; • Data security goals, threats and im pacts; • Data security awareness; • Safe behaviours; • Take away.
  • 3.
    {elysiumsecurity} cyber protection &response 3 BEST PRACTISEDATA SECURITYCONTEXT DATA DEFINITION Public 0 1 0 0 0 1 1 1 0 1 0 0 0 1 0 1 0 1 ANYTHING CREATED DIGITALLY "transmittable and storable computer information" - 1946 Picture from PIXABAY
  • 4.
    {elysiumsecurity} cyber protection &response 4 BEST PRACTISEDATA SECURITYCONTEXT DATA FORM Public Icons from the Noun Project unless stated otherwise
  • 5.
    {elysiumsecurity} cyber protection &response 5 BEST PRACTISEDATA SECURITYCONTEXT DATA TYPE Public
  • 6.
    {elysiumsecurity} cyber protection &response 6 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY GOALS, THREATS & IMPACTS Public CONFIDENTIALITY C INTEGRITY A AVAILIBILITY I SECURITY GOALS CIA vs. MPH SECURITY IMPACTS DATA LEAKAGE UNAUTHORISED MODIFICATION DESTRUCTION & LOCK MALWARE M HACKING H PHISHING P SECURITY THREATS
  • 7.
    {elysiumsecurity} cyber protection &response 7 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY SCOPE Public USAGE Creation Consumption Destruction Transit Transmission Remote Access COMMUNICATION Saved Sleep State Backup AT REST
  • 8.
    SYSTEM ENCRYPTION FILE/DATA ENCRYPTION COMMUNICATIONENCRYPTION {elysiumsecurity} cyber protection & response 8 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY CONCEPT Public 1. PROTECT DATA DATA POLICY DATA CLASSIFICATION AND ROLES ACCESS CONTROLS 2. RESTRICT DATA ACCESS LABELLING LOGS FILE VISIBILITY 3. MONITOR DATA ACTIVITY
  • 9.
    BITLOCKER, FIREVAULT, ENCFS,ZIP DRM, PASSWORD SAFE TLS/SSL {elysiumsecurity} cyber protection & response 9 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY SOLUTIONS Public 1. PROTECT DATA DRM PASSWORDS ACCESS RIGHTS 2. RESTRICT DATA ACCESS DLP, DRM IDS DATA INVENTORY 3. MONITOR DATA ACTIVITY
  • 10.
    {elysiumsecurity} cyber protection &response 10 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY AWARENESS Public FROM TOENVIRONMENT
  • 11.
    {elysiumsecurity} cyber protection &response 11 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY AWARENESS Public NATURE
  • 12.
    {elysiumsecurity} cyber protection &response 12 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY AWARENESS Public PAY ATTENTION
  • 13.
    {elysiumsecurity} cyber protection &response 13 BEST PRACTISEDATA SECURITYCONTEXT SAFE BEHAVIOURS Public HALF TRUTH BACKUP DATA YOU CAN SAY NO DO NOT RE-USE CREDENTIALS CHANGE DEFAULT PASSWORD THINK BEFORE YOU CLICK!
  • 14.
    {elysiumsecurity} cyber protection &response 14 BEST PRACTISEDATA SECURITYCONTEXT TAKE AWAY Public 1. USE STRONG PASSWORDS AND A PASSWORD SAFE 3. ENCRYPT YOUR DATA 5. ENABLE DUAL FACTOR AUTHENTICATION 2. USE UNIQUE PASSWORDS 4. BACKUP YOUR DATA 6. SCREENLOCK AUTOMATIC AND WHEN AWAY 7. BE AWARE OF YOUR ENVIRONMENT 9. NO DEFAULT PASSWORD/CONFIG 11. PAY ATTENTION TO WARNINGS 8. CUSTOM IS GOOD, STANDARD IS BETTER 10. UP TO DATE ANTI VIRUS / ENDPOINT PROTECTION 12. THINK BEFORE YOU CLICK!
  • 15.
    {elysiumsecurity} cyber protection &response © 2018 Elysium Security Ltd. All Rights Reserved www.elysium security.com ElysiumSecurity provides practical expertise to identify vulnerabilities, assess their risks and impact, remediate those risks, prepare and respond to incidents as well as raise security awareness through an organization. ElysiumSecurity provides high level expertise gathered through years of best practices experience in large international companies allowing us to provide advice best suited to your business operational model and priorities. ABOUT ELYSIUMSECURITY LTD. ElysiumSecurity provides a portfolio of Strategic and Tactical Services to help companies protect and respond against Cyber Security Threats. We differentiate ourselves by offering discreet, tailored and specialized engagements. Operating in Mauritius and in the United Kingdom, our boutique style approach means we can easily adapt to your business operational model and requirements to provide a personalized service that fits your working environment.