188
Chapter 5
■
Protecting Security of Assets
Nongovernment organizations can use any labels they choose.
The key is that they define
the labels in a security policy or a data policy. Data owners (typically senior management
personnel) provide the data definitions.
Organizations take specific steps to mark, handle, store, and destroy sensitive informa-
tion and hardware assets, and these steps help prevent the loss of confidentiality due to
unauthorized disclosure. Additionally, organizations commonly
define specific rules for
record retention to ensure that data is available when it is needed. Data retention policies
also reduce liabilities resulting from keeping data for too long.
A key method of protecting the confidentiality of data is with encryption. Symmetric
encryption protocols (such as AES) can encrypt data at rest (stored on media). Transport
encryption protocols protect data in transit by encrypting it before transmitting it (data in
transit). Applications protect data in use by ensuring that it is only held in temporary stor-
age buffers, and these buffers are cleared when the application is no longer using the data.
Personnel can fulfill many different roles when handling data. Data owners are ulti-
mately responsible for classifying,
labeling, and protecting data. System owners are respon-
sible for the systems that process the data. Business and mission owners own the processes
and ensure that the systems provide value to the organization. Data processors are often
third-party entities that process data for an organization. Administrators grant access to
data based on guidelines provided by the data owners. A custodian is delegated day-to-day
responsibilities for properly storing and protecting data. A user (often called an end user)
accesses data on a system.
The EU General Data Protection Regulation (GDPR) mandates protection of privacy
data and restricts the transfer of data into or out of the EU. A
data controller can hire a
third party to process data, and in this context, the third party is the data processor. Data
processors have a responsibility to protect the privacy of the data and not use it for any
other purpose than directed by the data controller. Two key security controls mentioned
in the GDPR are encryption and pseudonymization. Pseudonymization refers to replacing
data with pseudonyms.
Security baselines provide a set of security controls that an organization can implement
as a secure starting point. Some publications (such as NIST SP 800-53)
identify secu-
rity control baselines. However, these baselines don’t apply equally to all organizations.
Instead, organizations use scoping and tailoring techniques to identify the security controls
to implement in their baselines. Additionally, organizations ensure that they implement
security controls mandated by external standards that apply to their organization.
Exam Essentials
Do'stlaringiz bilan baham: