4 hours 7 minutes
Welcome to Lesson 6.3 Protect Data Security.
So in this video will cover the protect function category # three data security as well as data security principles.
So in this category of the protect function, this is where we focus on how data is managed consistent with the organization's risk strategy to protect individuals privacy and maintain data confidentiality integrity and availability.
And really the key focus of this category is the CIA triad, which is confidentiality integrity and availability.
So some of those areas that are are mentioned and broken down into the subcategories. So it's really protecting data at rest and data in transit, meaning when it's stored as well as when it's being distributed, whether that's moving from system to system or you're emailing it, but it's protected in both states
as well as systems products and services that are associated with data are formally managed throughout removal, transfer and disposition. So this gets into how you're managing data destruction, that you're sanitizing um uh
hardware um to make sure that all personal day has been removed, especially if you're repurposing it um as well as if you're transferring systems somewhere else. So you want to make sure that that's being managed and then you have policies, processes and procedures to handle that
as well as that. You're maintaining adequate capacity to ensure availability is maintained. So if you're using servers on prim um you know sometimes there are some companies that can run into data issues if they have not moved into the cloud.
So you want to make ensure that you're maintaining adequate capacity for all of the data um that you may be capturing because if not you could run into a problem where something becomes unavailable. Um And that can be an issue as well as ensuring their protections against data leaks and that those are implemented. So whether you're monitoring um your whether staff can use USB drives on the computer so they're not downloading data on that and removing it from the company. Um or even making sure that external weeks can't happen where someone from outside of the enterprise gaining access to a network or to data
as well as integrity checking mechanisms are used to verify software, firmware um and information integrity. Um So you want to make sure that you have tools in place that are checking that to make sure that there are not any issues with your firmware software
and also that your data can still remain intact as well. Um from the same way that it was captured.
Um You want to ensure that your development environment um and testing environment are separate from production. Um You don't want to be implementing whether that's a patch or making an update to an application in your production environment. You want to be sure that you can test it that things are working properly. You are able to see if there are any problems before it's actually intimated
um implemented in the production environment because if not um that can then mess with the integrity of the data or even the availability. So you want to ensure that that is um those issues are worked out before it actually gets moved into the production environment. And following the last subcategory
that integrity checking mechanisms are used to verify hardware integrity as well
um because it can be easy to find a vulnerability and hardware and then access networks or other areas. So I said these subcategories are really breaking down um the elements of confidentiality integrity and availability. And we're going to get into uh those three
principles on the next page to really understand what they are.
So the C. I. A. Triad breaks down as I said and the confidentiality integrity and availability.
So what we mean when we're talking about confidentiality is that unauthorized access is prevented. So you want to make sure that people's personal data remains confidential and that only those that need to have access to that data have access um and no one else and really ways to do this or to use encryption um password protect systems and applications um used two factor authentication um as well as sometimes even employing a biometric uh whether that's a fingerprint scan, um anything of that nature to ensure that only those that need to have access to data have access to it.
Um When we get into integrity, what we mean is that data cannot be modified. So the way that it's captured um or the way that you have it set up in your system is the way it will always be, someone can't come in and alter basically that data. Um Once again this is something that can be done through encryption. Um You can have user access controls in place once again making sure only those that need to have access to the data have access and that even if they do have access
that they can't somehow alter the data, especially if they shouldn't be altering it. Um As well as having version control, you want to be able to see when data is modified as well as who may have modified it. Um And a lot of times sometimes this can affect the metadata as well. So you want to be sure that
you have version control set up in your applications and systems to monitor that
um as well as that you have backups so that in the event of a disaster um or business continuity issue that you can recover um your systems in your data and that the data hasn't been modified due to um an event that happened so that its recoverable in the state um that it was in before the event.
And then finally availability has to do with the data cannot be unavailable. Um The data needs to be available at all times. So this means having offsite backups in the event that there is a disaster and you have to fail over to another site that you can automatically recover from. Maybe another server um uh center that you have set up. Um Like a disaster recovery becomes a big issue when we talk about availability,
you still need a way for your workforce to keep moving. Um So they need to be able to recover their email or finance needs to be able to recover those financial systems to keep processing credit card information to make payroll happen. Um So you want to also have redundancy and fail over. Um It becomes violent. Important that you're able to have those things. Um And when covid happened it was something that people needed to make sure, especially as workforces removing remotely that data was available. Um
And that you're doing proper monitoring um that you're testing those backups a lot of the time to make sure um that it's not unavailable that um that your backups are available in the event you have a disaster. Because the last thing you want to happen is that that hasn't been tested and you go to try to use the backups and it doesn't work.
Um You also want to make sure that environmental controls are in place to ensure that um you know if your server room catches on fire, your your data can still be available um as well as virtualization. So as I mentioned before, uh
this particular category data security CIA becomes very important. So it's focusing on confidentiality, integrity and availability.
And I know those that have a security background or have those types of roles and responsibilities are very familiar with this.
So in this video we cover the subcategories of the protect function category number three. As well as the C. I. A. Try it, confidential confidentiality integrity and availability. So I hope you'll join me as we move into the next video.
NIST 800-53: Introduction to Security and Privacy Controls
This course will provide Executives, Assessors, Analysts, System Administrators and students with the foundational knowledge ...
2 CEU/CPE Hours Available
Certificate of Completion Offered
CIS Top 20 Critical Security Controls
CIS Controls are a prioritized set of actions that protect your organization and data from ...
4 CEU/CPE Hours Available
Certificate of Completion Offered