Skip to the content.

Data Security

Data Security

Classification

Classification involves assessing potential impacts on confidentiality, integrity, and availability.

Labeling

Label information to enforce appropriate access controls.

Data Sensitivity Levels

  1. Highly Restricted
    • Potential risk to the organization’s future existence.
    • Could result in significant harm, loss of life, injury, or property damage.
  2. Moderately Restricted
    • Risk of loss of temporary competitive advantage.
    • May lead to revenue loss or disruption of planned investments.
  3. Low Sensitivity (Internal Use Only)
    • Possible minor disruptions, delays, or impacts.
  4. Unrestricted Public Data
    • Already published; no harm from further dissemination or disclosure.

Retention

It is the responsibility of the organization to establish and enforce a comprehensive data retention policy.

  1. Compliance
    • Adhere to industry standards, laws, and regulations.
    • Establish an organization-specific data retention policy.
  2. Destruction
    • Implement systematic data destruction when assets reach their retention limits.
    • Maintain a precise inventory detailing asset location and retention requirements.
  3. Review
    • Conduct periodic reviews of retained records.
    • Reduce information volume, retaining only necessary data.
  4. Implementation
    • Ensure personnel understand and follow retention requirements.
    • Document specific retention guidelines for each type of information.
  5. Avoid Uniform Retention
    • Steer clear of applying the longest retention period universally.
    • Prevent unnecessary data storage, minimizing the risk of exposure.
  6. Legal Compliance
    • Dispose of records not mandated for retention.
    • Adhere to enterprise policies and legal requirements in the destruction process.

Common mistake in record retention

A common mistake in record retention is applying the longest retention period without taking into account the sensitivity or importance of the corresponding information.

Retaining unnecessary data has considerable costs in terms of storage and management. Less important or sensitive information can have shorter retention periods, thereby allowing longer retention periods for more important or sensitive information (see ISC2 Study Guide, chapter 5, module 1).

Destruction

Data remanence, or residual data left on media after deletion, poses a security risk. Mitigation strategies include:

  1. Clearing
    • Involves overwriting with random patterns.
    • Known as “zeroizing,” but zeroing has risks.
  2. Purging
    • Eliminates residual effects from original data.
    • Some technologies may retain recoverable data “ghosts.”
    • Degaussing may be needed for certain media.
  3. Destruction
    • Ultimate remedy for data remanence.
    • Involves shredding, chopping, burning, or etching.
    • Remains disposed of in protected landfills.

Destroying Data

Data Media Sanitization

Ensures that data is completely destroyed.

Overwriting

Overwriting involves writing multiple patterns across all storage media (see ISC2 Study Guide, Chapter 5, Module 1).

The number of passes refers to how many times the data is overwritten, and this process is designed to increase the difficulty of recovering the original data.

Degaussing

Degaussing is a process used to erase data from magnetic storage media by reducing or eliminating the magnetic field that stores the data. This method is effective for securely erasing data from hard drives, tapes, and other magnetic storage devices.

Limitations:

Secure Erase

Secure Erase

Secure erase is a command and process designed to completely erase all data from a storage device, typically used with solid-state drives (SSDs) and other modern storage technologies. It ensures that the data is permanently removed, providing a high level of security for sensitive information.

Some flaws were found overtime on secure erase overtime, and this prompted the use of a newer and more secure technique called cryptographic erase.

Cryptographic Erase

Introduced as a replacement for Secure Erase in most modern storage devices, Cryptographic Erase involves destorying the decryption key to ensure that the encrypted data cannot be decrypted.

The Right to be Forgotten

The right to be forgotten is a principle under the General Data Protection Regulation (GDPR).

Protecting Data

Anonymization

Anonymization of data is the process of removing or altering personally identifiable information (PII) to ensure that the data cannot be traced back to specific individuals.

Pseudo-Anonymization

Replacing unique identifiers (such as PII) with fake identifiers.

Data Minimization

Refers to limiting the amount of data that is stored or retained.

Tokenization

Using a service or app that creates a unique token that authorizes the access instead of using the original credentials.

Data Masking

Refers to hiding sensitive data from unauthorized users.

Encryption

Encryption is essential for data security as it ensures that sensitive information remains secure and unreadable to unauthorized individuals, both while stored and during transmission over networks.

Cryptography

Cryptography is a versatile tool, providing crucial services like confidentiality and integrity for enhanced system security.


<p align=center> </p>

Cryptographic Hash Function

A hash function is a mathematical function that takes an input or ‘message’ and generates an output or ‘hash value’, usually much smaller than the original message, typically of a fixed-size (see ISC2 Study Guide, Module 1, under Encryption Overview).

Hash functions are used to generate unique representations of data or verify data integrity and are a crucial element of cryptographic systems.

A cryptographic hash function should have the following characteristic:

Digital Signatures

A digital signature is the result of a cryptographic transformation of data which is useful for providing:

See NIST SP 800-12 Rev. 1 under Digital Signature.

However, digital signatures cannot guarantee confidentiality (i.e. the property of data or information not being made available or disclosed).

Message Digests

Message digesting ensures data integrity by maintaining accuracy and consistency.

Message Authentication Code

A Message Authentication Code (MAC) does not guarantee anonymity. MAC is a cryptographic function that guarantees a message’s:

On the other hand, anonymity is not a guaranteed by a MAC.

Data Encryption

Data-at-Rest Encryption

Each type of data encryption serves a specific purpose and can be used individually or in combination to protect sensitive information from unauthorized access or disclosure.

Data-in-Transit Encryption

Secures data while it’s being transmitted over networks to prevent interception or eavesdropping.

Data-in-Use Encryption

Protects data while it’s being accessed or used by applications or users.

Mishandling Data

Cybersquatting

Cybersquatting involves speculatively registering and selling domain names for profit.

Data Loss Prevention

DLP is a technology used to identify, monitor, and protect sensitive data to prevent unauthorized access, use, or transmission.

Endpoint DLP System

An Endpoint Data Loss Prevention (DLP) system is a security solution designed to monitor and control data transfers on endpoint devices such as laptops, desktops, smartphones, and tablets.

Network DLP System

A Network Data Loss Prevention (DLP) system is a piece of software or hardware that monitors and control data transfers within a network infrastructure.

Storage DLP

A Storage Data Loss Prevention (DLP) system is a software installed on a server in a datacenter that inspects the data-at-rest.

Cloud-based DLP

A DLP usually offered as a SaaS and is part of the cloud service and storage needs.