Guardians Domain 2 For Udemy
Guardians Domain 2 For Udemy
Data, the golden core of our businesses that we are protecting. I am thrilled that there is, finally, there is a domain
dedicated to Data. The place to start our conversation is with its lifecycle. As with everything else there is a
beginning and an end.
Information Classification
What we should do is classify the data as soon as its created. That would be optimal. Instead, we might just have
to classify it when we find it…
Classification is the identification and labeling of the sensitivity of our data. Classification schemas must have at
least 2 different level to be able to distinguish the sensitivity of data. These levels should be identified with words
that assist the users in handling the data appropriately. Familiar identifiers for sensitivity levels include words like
secret, sensitive, public, or top secret
Data structure
• Structured data is something like a database. Each record within a table can be connected (RDBMS) to
another record in another table. This data works best in block storage.
• Unstructured data is data that does not have any relationship to each other. This type of data would be
something like an email, an invoice, a word document, a picture, etc. This type of data is best stored in
object storage.
Data storage
Data terms
• Database – collection of data in an organized (structured/relational) format
• Metadata – data regarding data, describes additional information about data such as how and when data
was collected and how it has been processed
• Big Data – “consists of extensive datasets¾primarily in the characteristics of volume, variety, velocity,
and/or variability¾that require a scalable architecture for efficient storage, manipulation, and
analysis” (NIST SP 1500-1 A-1)
o The three Vs of Big Data:
§ Volume – size of the dataset
§ Variety – data from multiple sources
§ Velocity – rate of flow
§ Variability – change in other characteristics – (the other V)
Data Retention
A data retention policy should be created. Truly it should be a part of a larger policy regarding data and its
structure and storage.
• Data deletion – If data is not required, or must legally remove according to the law
• Data archiving – Holding data for long periods
• Legal hold – A requirement to store and protect data until a judge makes a decision regarding issuing a
warrant
Data Discovery
So now the question is how we find data. Location is only one question. We must also understand what kind of
data we have and its quality and sensitivity. We are now on the edge of what we should probably call ‘Data
Science’ that Dean Saxenian from UC Berkley has stated ‘should not just be about the tools. It’s also using the tools
in a way that allows you to solve problems and make sense of data in a systematic way. (Staff, 2019)
From the point of view of the CCSP truly comprehending the data and turning it into useful information is not our
job. Yet if we do not help those who do locate their data, we have not done our job.
Tools:
Content analysis
The CMM Institute describes CMMI v2.0 as a proven set of global best practices that enables organizations to build
and benchmark the key capabilities that address the most common business challenges (CMMI Institute, 2019)
ISO/IEC 21827 describes itself as ‘standard metric for security engineering practices covering … the entire life
cycle… the whole organization’. This standard is used, hopefully with, ‘The objective is to facilitate an increase of
maturity of the security engineering processes within the organization’. (ISO/IEC, 2008)
CMMI Levels: