CompTIA Security+ (SY0-601): Policies & Procedures
This section outlines how organizations classify and manage data, including government data classifications from Unclassified to Top Secret. It also defines the roles and responsibilities of Data Owners, Stewards, and Custodians, and emphasizes compliance requirements like PCI DSS for protecting payment card information.
Baseline
Created as reference points which are documented for use as a method of comparison during an analysis conducted in the future
Rate to track your progress ✦
Key Terms
Baseline
Created as reference points which are documented for use as a method of comparison during an analysis conducted in the future
Government Data Classifications
Unclassified Data
Can be released to the public
Sensitive but Unclassified
Items ...
Data Owner
A senior (executive) role with ultimate responsibility for maintaining the confidentiality, integrity and availability o...
Data Steward
Responsible for maintaining quality of data
Responsible for data accuracy, privacy, &am...
Data Custodian
A role responsible for handling the management of the system on which the data assets are stored
PCI DSS
Payment Card Industry Data Security Standard:
Contractual obligation to protect card in...
GDPR
General Data Protection Regulation:
Personal data cannot be collected processed or retained without the individual’s ...
Deidentification
Methods and technologies that remove identifying information from data before it is distributed
Data Masking
Deidentification Method where generic or placeholder labels are substituted for real data while preserving the structure...
Tokenization
A deidentification method where a unique token is substituted for real data
Aggregation/Banding
A deidentification technique where data is generalized to protect the individuals involved
Reidentification
An attack that combines a deidentification dataset with other data source to discover how secure the deidentification method used is
Due Diligence
Ensuring that IT infrastructure risks are known and managed properly
Due Care
Mitigation actions that an organization takes to defend against the risks that have been uncovered during due diligence
ISA
Interconnection Security Agreement:
An agreement for the owners and operators of the IT systems to document what tech...
BPA (Business Partnership Agreement)
Business Partnership Agreement:
Conducted between two business partners that establishes the conditions of their rela...
Degaussing
Exposes the hard drive to a powerful magnetic field which in turn causes previously-written data to be wiped from the drive
Purging (Sanitizing)
Act of removing data in such a way that it cannot be reconstructed using any known forensic techniques
Clearing
Removal of data with a certain amount of assurance that it cannot be reconstructed
CIS
Center for Internet Security: Created by NIST
Consensus-developed secure configuration ...
RMF
Risk Management Framework: Developed by NIST for the Federal Government
A process that integrates security and risk m...
CSF
Cybersecurity Framework: Developed by NIST
A set of industry standards and best practices created by NIST to help org...
ISO 27000 (4 Provisions)
International standard
27001: Basic procedure for cybersecurity (international standard...
SOC
System & Organization Controls:
A suite of reports produced during an audit which is used by service organization...
Cloud Security Alliance's Cloud Control Matrix
Designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in ...
Cloud Security Alliance's Reference Architecture
Methodology & tools
Assess internal IT groups & cloud providers
Determine security capabilities
Build a...
User Training: Gamification & Capture the Flag
Gamification
Score points, compete with others, collect badges
MSA
Measured Systems Analysis:
Used with quality management systems
Assess the measurement process
Don’t make decis...
EOL vs. EOSL
EOL (End of Life)
Manufacturer stops selling product
May continue supporting it
Important for security patches/...
Data Retention
Keep files that change frequently for version control
| Recover from virus infection
Data Controller
Manages the purposes & means by which personal data is processed
Data Processor
Work on behalf of the data controller
Often a third-party or different group
Example...
Data Protection Officer
Responsible for the organization’s data privacy policies
| Sets policies, implements pr...
Related Flashcard Decks
| Term | Definition |
|---|---|
Baseline | Created as reference points which are documented for use as a method of comparison during an analysis conducted in the future |
Government Data Classifications | Unclassified Data Sensitive but Unclassified Confidential Data Secret Data Top Secret Data |
Data Owner | A senior (executive) role with ultimate responsibility for maintaining the confidentiality, integrity and availability of the information asset The data owner is responsible for labeling the asset and ensuring that it is protected with appropriate controls |
Data Steward | Responsible for maintaining quality of data Responsible for data accuracy, privacy, & security |
Data Custodian | A role responsible for handling the management of the system on which the data assets are stored |
PCI DSS | Payment Card Industry Data Security Standard: Contractual obligation to protect card information |
GDPR | General Data Protection Regulation: GDPR also provides the right for a user to withdraw consent, to inspect, amend, or erase data held about them |
Deidentification | Methods and technologies that remove identifying information from data before it is distributed Deidentification is often implemented as part of database design |
Data Masking | Deidentification Method where generic or placeholder labels are substituted for real data while preserving the structure or format of the original data |
Tokenization | A deidentification method where a unique token is substituted for real data |
Aggregation/Banding | A deidentification technique where data is generalized to protect the individuals involved |
Reidentification | An attack that combines a deidentification dataset with other data source to discover how secure the deidentification method used is |
Due Diligence | Ensuring that IT infrastructure risks are known and managed properly |
Due Care | Mitigation actions that an organization takes to defend against the risks that have been uncovered during due diligence |
ISA | Interconnection Security Agreement: |
BPA (Business Partnership Agreement) | Business Partnership Agreement: A BPA can also include security requirements |
Degaussing | Exposes the hard drive to a powerful magnetic field which in turn causes previously-written data to be wiped from the drive |
Purging (Sanitizing) | Act of removing data in such a way that it cannot be reconstructed using any known forensic techniques |
Clearing | Removal of data with a certain amount of assurance that it cannot be reconstructed |
CIS | Center for Internet Security: Created by NIST Consensus-developed secure configuration guidelines for hardening (benchmarks) and prescriptive, prioritized, and simplified sets of cybersecurity best practices (configuration guides) Improve cyber defenses (20 key actions) |
RMF | Risk Management Framework: Developed by NIST for the Federal Government 6 Steps |
CSF | Cybersecurity Framework: Developed by NIST 5 Category Functions: Identify, Protect, Detect, Respond, Recover |
ISO 27000 (4 Provisions) | International standard 27001: Basic procedure for cybersecurity (international standard) - focused on establishing/maintaining info systems |
SOC | System & Organization Controls: Audit & Compliance SOC 2 = Trusted Services Criteria Type I audit: Type II audit: |
Cloud Security Alliance's Cloud Control Matrix | Designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in assessing the overall security risk of a cloud provider Cloud-specific security controls |
Cloud Security Alliance's Reference Architecture | Methodology & tools |
User Training: Gamification & Capture the Flag | Gamification Score points, compete with others, collect badges Capture the flag Security competition Hack into a server to steal data (the flag) Can involve highly technical simulations Practical learning environment |
MSA | Measured Systems Analysis: |
EOL vs. EOSL | EOL (End of Life) EOSL (End of Service Life) |
Data Retention | Keep files that change frequently for version control | Recover from virus infection |
Data Controller | Manages the purposes & means by which personal data is processed |
Data Processor | Work on behalf of the data controller Examples: Payroll company = data processor |
Data Protection Officer | Responsible for the organization’s data privacy policies | Sets policies, implements processes & procedures |