CompTIA Security+ (SY0-601): Policies & Procedures
This section outlines how organizations classify and manage data, including government data classifications from Unclassified to Top Secret. It also defines the roles and responsibilities of Data Owners, Stewards, and Custodians, and emphasizes compliance requirements like PCI DSS for protecting payment card information.
Baseline
Created as reference points which are documented for use as a method of comparison during an analysis conducted in the future
Key Terms
Baseline
Created as reference points which are documented for use as a method of comparison during an analysis conducted in the future
Government Data Classifications
Unclassified Data
Can be released to the public
Sensitive but Unclassified
Items that wouldn’t hurt national s...
Data Owner
A senior (executive) role with ultimate responsibility for maintaining the confidentiality, integrity and availability of the information asset
...Data Steward
Responsible for maintaining quality of data
Responsible for data accuracy, privacy, & s...
Data Custodian
A role responsible for handling the management of the system on which the data assets are stored
PCI DSS
Payment Card Industry Data Security Standard:
Contractual obligation to protect card inform...
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
Term | Definition |
---|---|
Baseline | Created as reference points which are documented for use as a method of comparison during an analysis conducted in the future |
Government Data Classifications | Unclassified Data Sensitive but Unclassified Confidential Data Secret Data Top Secret Data |
Data Owner | A senior (executive) role with ultimate responsibility for maintaining the confidentiality, integrity and availability of the information asset The data owner is responsible for labeling the asset and ensuring that it is protected with appropriate controls |
Data Steward | Responsible for maintaining quality of data Responsible for data accuracy, privacy, & security |
Data Custodian | A role responsible for handling the management of the system on which the data assets are stored |
PCI DSS | Payment Card Industry Data Security Standard: Contractual obligation to protect card information |
GDPR | General Data Protection Regulation: GDPR also provides the right for a user to withdraw consent, to inspect, amend, or erase data held about them |
Deidentification | Methods and technologies that remove identifying information from data before it is distributed Deidentification is often implemented as part of database design |
Data Masking | Deidentification Method where generic or placeholder labels are substituted for real data while preserving the structure or format of the original data |
Tokenization | A deidentification method where a unique token is substituted for real data |
Aggregation/Banding | A deidentification technique where data is generalized to protect the individuals involved |
Reidentification | An attack that combines a deidentification dataset with other data source to discover how secure the deidentification method used is |
Due Diligence | Ensuring that IT infrastructure risks are known and managed properly |
Due Care | Mitigation actions that an organization takes to defend against the risks that have been uncovered during due diligence |
ISA | Interconnection Security Agreement: |
BPA (Business Partnership Agreement) | Business Partnership Agreement: A BPA can also include security requirements |
Degaussing | Exposes the hard drive to a powerful magnetic field which in turn causes previously-written data to be wiped from the drive |
Purging (Sanitizing) | Act of removing data in such a way that it cannot be reconstructed using any known forensic techniques |
Clearing | Removal of data with a certain amount of assurance that it cannot be reconstructed |
CIS | Center for Internet Security: Created by NIST Consensus-developed secure configuration guidelines for hardening (benchmarks) and prescriptive, prioritized, and simplified sets of cybersecurity best practices (configuration guides) Improve cyber defenses (20 key actions) |
RMF | Risk Management Framework: Developed by NIST for the Federal Government 6 Steps |
CSF | Cybersecurity Framework: Developed by NIST 5 Category Functions: Identify, Protect, Detect, Respond, Recover |
ISO 27000 (4 Provisions) | International standard 27001: Basic procedure for cybersecurity (international standard) - focused on establishing/maintaining info systems |
SOC | System & Organization Controls: Audit & Compliance SOC 2 = Trusted Services Criteria Type I audit: Type II audit: |
Cloud Security Alliance's Cloud Control Matrix | Designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in assessing the overall security risk of a cloud provider Cloud-specific security controls |
Cloud Security Alliance's Reference Architecture | Methodology & tools |
User Training: Gamification & Capture the Flag | Gamification
|
MSA | Measured Systems Analysis: |
EOL vs. EOSL | EOL (End of Life) EOSL (End of Service Life) |
Data Retention | Keep files that change frequently for version control | Recover from virus infection |
Data Controller | Manages the purposes & means by which personal data is processed |
Data Processor | Work on behalf of the data controller Examples: Payroll company = data processor |
Data Protection Officer | Responsible for the organization’s data privacy policies | Sets policies, implements processes & procedures |