2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet391/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   387   388   389   390   391   392   393   394   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Evidence Storage
Evidence storage is quickly becoming a necessity for all businesses, not just law enforcement–
related organizations. As cybercrime events continue to increase, it is important to retain 
logs, audit trails, and other records of digital events. It also may be necessary to retain 
image copies of drives or snapshots of virtual machines for future comparison. This may be 
related to internal corporate investigations or to law enforcement–based forensic analysis. 
In either case, preserving datasets that might be used as evidence is essential to the favor-
able conclusion to a corporate internal investigation or a law enforcement investigation of 
cybercrime.
Secure evidence storage is likely to involve the following:

A dedicated storage system distinct from the production network

Potentially keeping the storage system offline when not actively having new datasets 
transferred to it

Blocking Internet connectivity to and from the storage system

Tracking all activities on the evidence storage system

Calculating hashes for all datasets stored on the system

Limiting access to the security administrator and legal counsel

Encrypting all datasets stored on the system
There may be additional security requirements for an evidence storage solution based on 
your local regulations, industry, or contractual obligations.
Restricted and Work Area Security
The design and configuration of internal security, including work areas and visitor areas, 
should be considered carefully. There should not be equal access to all locations within a 
facility. Areas that contain assets of higher value or importance should have more restricted 
access. For example, anyone who enters the facility should be able to access the restrooms 
and the public telephone without going into sensitive areas, but only network administra-
tors and security staff should have access to the server room. Valuable and confidential 
assets should be located in the heart or center of protection provided by a facility. In effect, 
you should focus on deploying concentric circles of physical protection. This type of con-
figuration requires increased levels of authorization to gain access into more sensitive areas 
inside the facility.


414
Chapter 10 

Physical Security Requirements
Walls or partitions can be used to separate similar but distinct work areas. Such divisions 
deter casual shoulder surfing or eavesdropping (
shoulder surfing
is the act of gathering infor-
mation from a system by observing the monitor or the use of the keyboard by the operator). 
Floor-to-ceiling walls should be used to separate areas with differing levels of sensitivity and 
confidentiality (where false or suspended ceilings are present, walls should cut these off as 
well to provide an unbroken physical barrier between more and less secure areas).
Each work area should be evaluated and assigned a classification just as IT assets are 
classified. Only people with clearance or classifications corresponding to the classification 
of the work area should be allowed access. Areas with different purposes or uses should be 
assigned different levels of access or restrictions. The more access to assets the equipment 
within an area offers, the more important become the restrictions that are used to control 
who enters those areas and what activities they are allowed to perform.
Your facility security design process should support the implementation and operation 
of internal security. In addition to the management of workers in proper work spaces, you 
should address visitors and visitor control. Should there be an escort requirement for visi-
tors, and what other forms of visitor control should be implemented? In addition to basic 
physical security tools such as keys and locks, mechanisms such as mantraps, video cam-
eras, written logs, security guards, and RFID ID tags should be implemented.
An example of a secure or restricted work area is that of the Sensitive Compartmented 
Information Facility (SCIF). A SCIF is often used by government and military contractors 
to provide a secure environment for highly sensitive data storage and computation. The 
purpose of a SCIF is to store, view, and update sensitive compartmented information (SCI), 
which is a type of classified information. A SCIF has restricted access to limit entrance 
to those individuals with a specific business need and authorization to access the data 
contained within. This is usually determined by the individual’s clearance level and SCI 
approval level. In most cases, a SCIF has restrictions against using or possessing photogra-
phy, video, or other recording devices while in the secured area. A SCIF can be established 
in a ground-based facility, an aircraft, or floating platform. A SCIF can be a permanent 
installation or a temporary establishment. A SCIF is typically located within a structure, 
although an entire structure can be implemented as a SCIF.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   387   388   389   390   391   392   393   394   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish