Module2 - Asset Security
Module2 - Asset Security
States of Data
3
ROLES AND RESPONSIBILITIES
Senior/Executive Management
CEO: Chief Decision-Maker
CFO: Responsible for budgeting and finances
CIO: Ensures technology supports company's objectives
ISO: Risk Analysis and Mitigation
Steering Committee: Define risks, objectives and approaches
Auditors: Evaluates business processes
Data Owner: Classifies Data
Data Custodian: Day to day maintenance of data
Network Administrator: Ensures availability of network resources
Security Administrator: Responsible for all security-related tasks, focusing
on Confidentiality and Integrity
4
AUDITING ROLE
5
DATA CLASSIFICATION
6
CONSIDERATIONS FOR ASSET
VALUATION
What makes up the value of an asset?
Value to the organization
Loss if compromised
Legislative drivers
Liabilities
Value to competitors
Acquisition costs
7
SENSITIVITY VS. CRITICALITY
8
DATA OWNERSHIP
Three roles
Data owner
Data custodian
Data user
9
DATA OWNER
The Data Owner is normally the person responsible for, or dependent upon the business
process associated with an information asset. The Data Owner is knowledgeable about
how the information is acquired, transmitted, stored, deleted, and otherwise processed.
The Data Owner determines the appropriate value and classification of information
generated by the owner or department;
The Data Owner must communicate the information classification when the information
is released outside of the department and/or Sample;
The Data Owner controls access to his/her information and must be consulted when
access is extended or modified; and
The Data Owner must communicate the information classification to the Data Custodian
so that the Data Custodian may provide the appropriate levels of protection.
10
DATA CUSTODIAN
11
DATA USER
12
DATA CLASSIFICATION
Government and military
Top secret
Secret
Confidential
Unclassified
Sensitive
Public
13
GOVERNMENT AND MILITARY
Top Secret The highest level of classification. The unauthorized disclosure of top-secret
data will have drastic effects and cause grave damage to national security.
Secret Used for data of a restricted nature. The unauthorized disclosure of data
classified as secret will have significant effects and cause critical damage to national
security.
Confidential Used for data of a private, sensitive, proprietary, or highly valuable nature.
The unauthorized disclosure of data classified as confidential will have noticeable effects
and cause serious damage to national security. This classification is used for all data
between secret and sensitive but unclassified classifications.
Unclassified The lowest level of classification. This is used for data that is neither
sensitive nor classified. The disclosure of unclassified data does not compromise
confidentiality or cause any noticeable damage.
14
COMMERCIAL
Confidential The highest level of classification. This is used for data that is extremely
sensitive and for internal use only. A significant negative impact could occur for a
company if confidential data is disclosed. Sometimes the label proprietary is substituted
for confidential. Sometimes proprietary data is considered a specific form of confidential
information. If proprietary data is disclosed, it can have drastic effects on the competitive
edge of an organization.
Private Used for data that is of a private or personal nature and intended for internal use
only. A significant negative impact could occur for the company or individuals if private
data is disclosed.
Sensitive Used for data that is more classified than public data. A negative impact could
occur for the company if sensitive data is disclosed.
Public The lowest level of classification. This is used for all data that does not fit in one
of the higher classifications. Its disclosure does not have a serious negative impact on
the organization..
15
CONFIDENTIAL DATA
16
STATES OF DATA
At Rest:
File System Encryptions, EFS, TPM
In Process:
Process protection, memory protection
In Transit:
IPSec, SSL/TLS
17
MEMORY AND REMANENCE
Data Remanence
Memory
Cache Memory; fast and close to CPU
18
MEMORY AND REMANENCE
Memory
RAM (Random Access Memory)
Volatile
Modules installed in slots on motherboard
(traditionally)
DRAM (Dynamic Random Access Memory)
Slower and cheaper
Small capacitors to store bits (data)
Capacitors leak charge and must be continually
refreshed
SRAM (Static Random Access Memory)
Fast and expensive
Latches called “flip-flops” to store bits (data)
Does not require refreshing
19
MEMORY AND REMANENCE
MEMORY AND REMANENCE
Memory
ROM (Read Only Memory)
Can be used to store firmware; small programs that don’t change much and configurations
PROM (Programmable Read Only Memory) – written to once; usually by the manufacturer
EPROM (Erasable Programmable Read Only Memory) – can be “flashed”; usually with
ultraviolet light
EEPROM (Electrically Erasable Programmable Read Only Memory) – can be “flashed”;
electrically
PLD (Programmable Logic Device) – field-programmable device; EPROMs, EEPROMs, and
Flash Memory are all PLDs
Flash Memory
Can be a security nightmare
Specific type of EEPROM
Written in larger sectors (or chunks) than other EEPROMs
Faster than other EEPROMS, but slower that magnetic drives
21
MEMORY AND REMANENCE
Memory
Solid State Drives (SSDs)
Combination of EEPROM and DRAM
Sanitization can be a challenge
Garbage collection - working in the background, garbage collection systematically identifies which
memory cells contain unneeded data and clears the blocks of unneeded data during off-peak times
to maintain optimal write speeds during normal operations.
TRIM command - (known as TRIM in the ATA command set, and UNMAP in the SCSI command
set) allows the operating system to inform a solid-state drive (SSD) which blocks of data are no
longer considered in use and can be wiped internally.
ATA Secure Erase can be used to remove data securely
22
DATA DESTRUCTION
Deleting data and/or formatting a hard drive is not a
viable/secure method for destroying sensitive information.
Deleting a file only removes the entry from the File
Allocation Table (FAT) and marks the block as
“unallocated”. The data is still there and often times it’s
retrievable.
Reformatting only replaces the old FAT with a new FAT.
The data is still there and often times it’s retrievable.
Data that is left over is called remnant data, or “data
remanence”.
Hundreds of data recovery tools available, one good
resource to check out is ForsensicsWiki.org
(http://www.forensicswiki.org/wiki/Tools:Data_Recovery)
23
DATA DESTRUCTION
Overwriting
Also called shredding or wiping
Overwrites the data and removes the FAT entry
Secure overwriting/wiping overwrites each sector of a hard
drive (or media).
24
DATA DESTRUCTION
Overwriting
One pass is enough (as long as each sector is overwritten).
Tools include Darik's Boot And Nuke (DBAN), CBL Data
Shredder, HDDErase,KillDisk and others.
Windows built-in cipher command.
25
DATA DESTRUCTION
Degaussing
Destroys the integrity of magnetic media using a strong
magnetic field
Most often destroys the media itself, not just the data
26
DATA DESTRUCTION
Destruction (Physical)
The most secure method of destroying data.
Physical destruction of the media.
Incineration, pulverization, shredding, and acid.
A hammer to the spindle works, and so does a rifle. Pretty
cheap nowadays. Look for a National Association of
Information Destruction (NAID) certified vendor and get a
certificate of destruction.
Onsite vs. offsite
27
DATA DESTRUCTION
Shredding
Most people think of paper.
Strip-cut vs. Cross-cut
A determined attacker can defeat
(maybe)
Easy to audit
Many breaches attributed to poor
document disposal
Dumpster diving
28
SYSTEM HARDENING & BASELINING
29
CONFIGURATION MANAGEMENT
Defined by ISC2 as “a process of identifying and documenting hardware
components, software and the associated settings.”
The goal is to move beyond the original design to a hardened,
operationally sound configuration
Identifying, controlling, accounting for and auditing changes made to the
baseline TCB
These changes come about as we perform system hardening tasks to
secure a system.
Will control changes and test documentation through the operational life
cycle of a system
Implemented hand in hand with change control
ESSENTIAL to Disaster Recovery
30
CONFIGURATION MANAGEMENT
DOCUMENTATION
Make
Model
MAC address
Serial number
Location
Permanent IP if applicable
31
CHANGE MANAGEMENT
32
THE CHANGE MANAGEMENT
PROCESS
Request Submittal
Risk/Impact Assessment
Testing
Scheduling/User Notification/Training
Implementation
Validation
Documentation
33
PATCH MANAGEMENT
Some sources
cve.mitre.org (Common Vulnerability and Exposures) database provides
standard conventions for known vulnerabilities
nvd.nist.gov Enables automation of vulnerability management, security
measurement, and compliance. NVD includes databases of security
checklists, security related software flaws, incorrect configurations,
product names, and impact metrics.
www.cert.gov: Online resource concerning common vulnerabilities and
attacks
34
MODULE REVIEW
CHAPTER 2 ASSET SECURITY REVIEW
States of Data
36
MODULE SELF CHECK
MODULE SELFCHECK
38
MODULE SELFCHECK
39
40
41
42
43
http://vnomega01.ddns.net/download/cissp/2017books.7z
vnomeg@01
44