Isc2 Cissp 2 7 1 Asset Security Key Points
Isc2 Cissp 2 7 1 Asset Security Key Points
Objectives:
Understand and identify the key points and items from Domain 2 that need to be
mastered as part of your preparation to take and pass the CISSP exam.
External Resources:
4. Data Policy
9. PLAN FIRST !!
a. Data Creation
b. Storage
c. Usage/Share
d. Archival
e. Destruction
a. clearing
b. purging
c. destruction
e. simple delete = erase
f. destruction - types
Overwriting
Degaussing
Encryption
Crypto-Shredding
Physical Destruction
Chemical Alteration
Phase Shift / transition (Curie Temp)
SSD vs HDD
*** Cloud data - encrypt data while in storage and use ==> upon exit crypto-shred
remaining data
• GA / Sale Date
• End of Life / End of Sale
• End of Development
• End of Service Life / End of Support
• Maintaining inventories
• Approved end-of-life or sunset policy
• Tracking changes, availability of updates, and end of support
• Risk assessments to determine end-of-life
• Plan for the replacement of systems and comply with policy requirements
• Procedures for secure destruction or data wiping of hard drives
a. at rest (storage)
b. in motion (transit / on the wire)
c. in use (application in memory)
17. Standards...
18. Data protection methods (Digital Rights Management (DRM), Data Loss
Prevention (DLP), Cloud Access Security Broker (CASB))
a. at rest (storage) -
encryption
obfuscation / tokenization
archive / dispose / destruct
mobile device protection
physical media control
b. in motion (transit) -
encryption
perimeter security
web content filtering
network traffic monitoring
VPN's
c. in use (application) -
encryption
user monitoring
workstation restrictions
application controls (whitelist / blacklist)
data labeling