SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
#
l
e
a
r
n
t
o
r
i
s
e
Data
Classi๏ฌcation
Asset
Classi๏ฌcation
2.1 IDENTIFYING AND CLASSIFYING INFORMATION AND ASSETS
CISSP
DOMAIN
2
For Official Use Only (FOUO):
Limited distribution, official use
Sensitive But Unclassi๏ฌed
(SBU): Sensitive, not national
security classi๏ฌed
Top Secret: Highest security level, severe damage
Secret: Highly sensitive information,
signi๏ฌcant harm
Con๏ฌdential: Restricted access information,
moderate harm
Unclassi๏ฌed:
Tangible Assets: Physical items, visible and
measurable
Intangible Assets: Non-physical, intellectual
property, reputation
Critical Assets: Essential for operations,
high importance
Non-critical Assets: Low importance, not vital
www.infosectrain.com
www.infosectrain.com
2.2 ESTABLISHING INFORMATION AND ASSET HANDLING REQUIREMENTS
CISSP
DOMAIN
2
Data
Maintenance
Data Loss
Prevention
(DLP)
Marking
Sensitive
Data and Assets
Handling
Sensitive
Information and
Assets
Data Collection
Limitation
Data
Location
Storing
Sensitive
Data
Data
Destruction
Importance: Ensures data security throughout its lifecycle
Best Practices: Regular updates, backups, and audits
Importance: Prevents unauthorized data leaks
Techniques: Monitoring, encryption, access control
Importance: Identi๏ฌes and protects critical data
Classi๏ฌcation: Con๏ฌdential, Public, etc.
Procedures: Guidelines for secure management
Access Control: Role-based restrictions
Purpose: Collect necessary data only
Minimization Principles: Reduces risk exposure
Residency: Compliance with data storage regulations
Cloud vs. On-premises: Balances ๏ฌ‚exibility and security
Secure Storage: Physical and digital protection
Encryption: Ensures con๏ฌdentiality
Methods: Shredding, wiping
Compliance: Meets legal standards
www.infosectrain.com
Information
and Asset
Ownership
Asset
Management
Asset
Inventory
Hardware Assets: Servers, Workstations, Networking
Equipment
Software Assets: Operating Systems, Applications
Intangible Assets: Intellectual Property, Digital Assets
Physical Controls: Locks, Security
Cameras, Access Control Systems
Technical Controls: Encryption,
Access Controls, Firewalls
Administrative Controls: Policies,
Procedures, Training
Procurement: Secure acquisition
of assets
Maintenance: Regular updates,
patches, and repairs
Disposal: Secure destruction or
recycling of assets
Identi๏ฌcation
and Classi๏ฌcation
Protection
and Controls
Lifecycle
Management
CISSP
DOMAIN
2
2.3 PROVISION RESOURCES SECURELY
Understanding who owns data
and assets
De๏ฌnition
and Importance
Ensuring accountability and
responsibility for data protection
Asset Classi๏ฌcation: Public,
Private, Con๏ฌdential, Sensitive
Tagging and Labeling: Physical
and digital marking of assets
www.infosectrain.com
2.4 MANAGE DATA LIFECYCLE
CISSP
DOMAIN
2
Data Location: Physical/logical storage locations
Data Collection: Gather information systematically
Data Roles
Data
Destruction
Data Remanence: Residual data after deletion
Data Maintenance: Keep data accurate and up-to-date
Data Retention: Determine how long to keep data
Owners: Responsible for data governance and policies
Controllers: Decide how and why data is processed
Custodians: Ensure safe custody and storage of data
Processors: Process data as instructed by controllers
Users and Data Subjects: Access and use data;
individuals whose data is processed
Clearing: Overwriting data
Purging: Making data unrecoverable
Degaussing: Erasing magnetic ๏ฌelds
Destruction: Physically destroying
media
Overview: Final data disposal
Methods of
Sanitization
www.infosectrain.com
2.5 ENSURING APPROPRIATE DATA AND ASSET RETENTION
CISSP
DOMAIN
2
Retention
Requirements
Other
Signi๏ฌcant
Terms
Record
Retention
Legal and
Regulatory Compliance
GDPR, HIPAA, SOX
Business
Policies
Data
Classi๏ฌcation
Retention
Periods
Data Storage
Solutions
Disposal and
Destruction
End-of-Life (EOL): No longer manufactured or sold
End-of-Support (EOS): No more updates or technical
support
End-of-Service-Life (EOSL): Complete end of any
support and updates
Company-speci๏ฌc data retention
policies
Alignment with business objectives
Sensitive Data
Non-Sensitive Data
Determining timeframes for retaining
records
Legal and operational factors
Physical and digital storage
Security measures for data protection
Secure disposal methods
Compliance with regulations
www.infosectrain.com
Scoping
Tailoring
Data actively being processed
Security
Measures
Data
States
Standards
Selection
Scoping and
Tailoring
2.6 DETERMINE DATA SECURITY CONTROLS AND COMPLIANCE REQUIREMENTS
CISSP
DOMAIN
2
In Use
In
Transit
At Rest
Access controls, data masking,
endpoint security, application
security
Data moving across networks
Security
Measures
Encryption protocols, secure
tunneling, network security,
secure email/๏ฌle transfer
Data stored on devices
Security
Measures
Encryption, physical security,
access control lists, regular
backups
Identify relevant systems
Understand compliance requirements
Assess impact and criticality
Modify baseline controls
Consider organizational context
Ensure practicality and effectiveness
Relevance: Select appropriate standards
(ISO/IEC 27001, NIST SP 800-53, PCI DSS)
Coverage: Comprehensive security aspects
Compliance: Legal and regulatory requirements
Integration: Align with existing policies
To Get More Insights Through Our FREE
FOUND THIS USEFUL?
Courses | Workshops | eBooks | Checklists | Mock Tests
LIKE FOLLOW
SHARE

More Related Content

PDF
CNIT 125 Ch 3. Asset Security
PDF
2. Asset Security
PDF
CISSP Prep: Ch 3. Asset Security
PDF
Slide Deck CISSP Class Session 3
PPTX
L2 - Protecting Security of Assets_.pptx
PPTX
Slide Deck โ€“ Session 3 โ€“ FRSecure CISSP Mentor Program 2017
PDF
Asset Security
PPTX
CISSP-Asset Security -Domain 2 Overview-Edited.pptx
CNIT 125 Ch 3. Asset Security
2. Asset Security
CISSP Prep: Ch 3. Asset Security
Slide Deck CISSP Class Session 3
L2 - Protecting Security of Assets_.pptx
Slide Deck โ€“ Session 3 โ€“ FRSecure CISSP Mentor Program 2017
Asset Security
CISSP-Asset Security -Domain 2 Overview-Edited.pptx

Similar to CISSP Domain 2 - Asset Security InfosecTrain .pdf (20)

PPTX
CISSP Certification-Asset Security
PPTX
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
PPTX
Data Management - NA CACS 2009
PPTX
Secuntialesse
PDF
Time to re think our security process
PDF
How the latest trends in data security can help your data protection strategy...
PPTX
gkknwqeq3232,sqSecurity essentials domain 3
PPT
Tizor_Data-Best-Practices.ppt
PPT
Tizor_Data-Best-Practices.ppt
PPTX
Introduction to Security (Hardware, Software, Data & Policies)
PPTX
Cybertopicsecurity_3
PDF
Data Sanitization: What, Why, When and How?
PDF
CISSP Cheatsheet.pdf
PDF
Presentation topic for Philippines SAP user group forum
PDF
Mapping Japanese FISC guideline to PCI DSS v3.2.1 ใ€Continuous Studyใ€‘
PDF
CISSP -Access Control Domain knowlege.pdf
PDF
Standards for protection of data on storage device are emerging from both the...
PDF
Achieving PCI Compliance Long And Short Term Strategies 2009
PDF
CNIT 125: Ch 2. Security and Risk Management (Part 1)
PDF
01-introductiontosecurity-111122004432-phpapp02.pdf
CISSP Certification-Asset Security
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
Data Management - NA CACS 2009
Secuntialesse
Time to re think our security process
How the latest trends in data security can help your data protection strategy...
gkknwqeq3232,sqSecurity essentials domain 3
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.ppt
Introduction to Security (Hardware, Software, Data & Policies)
Cybertopicsecurity_3
Data Sanitization: What, Why, When and How?
CISSP Cheatsheet.pdf
Presentation topic for Philippines SAP user group forum
Mapping Japanese FISC guideline to PCI DSS v3.2.1 ใ€Continuous Studyใ€‘
CISSP -Access Control Domain knowlege.pdf
Standards for protection of data on storage device are emerging from both the...
Achieving PCI Compliance Long And Short Term Strategies 2009
CNIT 125: Ch 2. Security and Risk Management (Part 1)
01-introductiontosecurity-111122004432-phpapp02.pdf
Ad

More from infosec train (20)

PDF
CRISC 100 Days Study Plan InfosecTrain0.pdf
PDF
Red Team Expert_Interview Questions and Answers.pdf
PDF
Vulnerability Scanning with Nessus-A Practical Guide.pdf
PDF
CISA Revision material InfosecTrain .pdf
PDF
Black Widow s Stealth Mastering Ethical Hacking Techniques.pdf
PDF
GRC Analyst Interview Questions Infosec.pdf
PDF
OSI Model vs. TCPIP by InfosecTrain .pdf
PDF
Top 10 Network Security Solutions.pdf
PDF
Upcoming Free Webinar InfosecTrain.pdf
PDF
Advanced Cloud Security Governance.pdf
PDF
Top 25 ISO 27001 Lead Auditor Interview Questions.pdf
PDF
Internal Audit Interview Questions.pdf
PDF
ISO 22301 2019 Checklist InfosecTrain.pdf
PDF
Skill Switch Then vs Now InfosecTrain.pdf
PDF
Understanding CEH Module 3 Scanning Networks.pdf
PDF
CISA 100 Days Study Plan InfosecTrain.pdf
PDF
CISSP Exam Practice Questions & Answers.pdf
PDF
Achievers of the Month InfosecTrain .pdf
PDF
Jurassic World Rebirth Cybersecurity.pdf
PDF
CCSP Exam Practice Questions and Answers.pdf
CRISC 100 Days Study Plan InfosecTrain0.pdf
Red Team Expert_Interview Questions and Answers.pdf
Vulnerability Scanning with Nessus-A Practical Guide.pdf
CISA Revision material InfosecTrain .pdf
Black Widow s Stealth Mastering Ethical Hacking Techniques.pdf
GRC Analyst Interview Questions Infosec.pdf
OSI Model vs. TCPIP by InfosecTrain .pdf
Top 10 Network Security Solutions.pdf
Upcoming Free Webinar InfosecTrain.pdf
Advanced Cloud Security Governance.pdf
Top 25 ISO 27001 Lead Auditor Interview Questions.pdf
Internal Audit Interview Questions.pdf
ISO 22301 2019 Checklist InfosecTrain.pdf
Skill Switch Then vs Now InfosecTrain.pdf
Understanding CEH Module 3 Scanning Networks.pdf
CISA 100 Days Study Plan InfosecTrain.pdf
CISSP Exam Practice Questions & Answers.pdf
Achievers of the Month InfosecTrain .pdf
Jurassic World Rebirth Cybersecurity.pdf
CCSP Exam Practice Questions and Answers.pdf
Ad

Recently uploaded (20)

PDF
01-Introduction-to-Information-Management.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Classroom Observation Tools for Teachers
PPTX
The Healthy Child โ€“ Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
master seminar digital applications in india
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
102 student loan defaulters named and shamed โ€“ Is someone you know on the list?
PDF
Basic Mud Logging Guide for educational purpose
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Cell Types and Its function , kingdom of life
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Business Ethics Teaching Materials for college
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Institutional Correction lecture only . . .
PDF
Pre independence Education in Inndia.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
01-Introduction-to-Information-Management.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Final Presentation General Medicine 03-08-2024.pptx
Classroom Observation Tools for Teachers
The Healthy Child โ€“ Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
master seminar digital applications in india
Module 4: Burden of Disease Tutorial Slides S2 2025
Renaissance Architecture: A Journey from Faith to Humanism
102 student loan defaulters named and shamed โ€“ Is someone you know on the list?
Basic Mud Logging Guide for educational purpose
Insiders guide to clinical Medicine.pdf
Cell Types and Its function , kingdom of life
PPH.pptx obstetrics and gynecology in nursing
Abdominal Access Techniques with Prof. Dr. R K Mishra
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Business Ethics Teaching Materials for college
TR - Agricultural Crops Production NC III.pdf
Institutional Correction lecture only . . .
Pre independence Education in Inndia.pdf
O7-L3 Supply Chain Operations - ICLT Program

CISSP Domain 2 - Asset Security InfosecTrain .pdf

  • 2. Data Classi๏ฌcation Asset Classi๏ฌcation 2.1 IDENTIFYING AND CLASSIFYING INFORMATION AND ASSETS CISSP DOMAIN 2 For Official Use Only (FOUO): Limited distribution, official use Sensitive But Unclassi๏ฌed (SBU): Sensitive, not national security classi๏ฌed Top Secret: Highest security level, severe damage Secret: Highly sensitive information, signi๏ฌcant harm Con๏ฌdential: Restricted access information, moderate harm Unclassi๏ฌed: Tangible Assets: Physical items, visible and measurable Intangible Assets: Non-physical, intellectual property, reputation Critical Assets: Essential for operations, high importance Non-critical Assets: Low importance, not vital www.infosectrain.com
  • 3. www.infosectrain.com 2.2 ESTABLISHING INFORMATION AND ASSET HANDLING REQUIREMENTS CISSP DOMAIN 2 Data Maintenance Data Loss Prevention (DLP) Marking Sensitive Data and Assets Handling Sensitive Information and Assets Data Collection Limitation Data Location Storing Sensitive Data Data Destruction Importance: Ensures data security throughout its lifecycle Best Practices: Regular updates, backups, and audits Importance: Prevents unauthorized data leaks Techniques: Monitoring, encryption, access control Importance: Identi๏ฌes and protects critical data Classi๏ฌcation: Con๏ฌdential, Public, etc. Procedures: Guidelines for secure management Access Control: Role-based restrictions Purpose: Collect necessary data only Minimization Principles: Reduces risk exposure Residency: Compliance with data storage regulations Cloud vs. On-premises: Balances ๏ฌ‚exibility and security Secure Storage: Physical and digital protection Encryption: Ensures con๏ฌdentiality Methods: Shredding, wiping Compliance: Meets legal standards
  • 4. www.infosectrain.com Information and Asset Ownership Asset Management Asset Inventory Hardware Assets: Servers, Workstations, Networking Equipment Software Assets: Operating Systems, Applications Intangible Assets: Intellectual Property, Digital Assets Physical Controls: Locks, Security Cameras, Access Control Systems Technical Controls: Encryption, Access Controls, Firewalls Administrative Controls: Policies, Procedures, Training Procurement: Secure acquisition of assets Maintenance: Regular updates, patches, and repairs Disposal: Secure destruction or recycling of assets Identi๏ฌcation and Classi๏ฌcation Protection and Controls Lifecycle Management CISSP DOMAIN 2 2.3 PROVISION RESOURCES SECURELY Understanding who owns data and assets De๏ฌnition and Importance Ensuring accountability and responsibility for data protection Asset Classi๏ฌcation: Public, Private, Con๏ฌdential, Sensitive Tagging and Labeling: Physical and digital marking of assets
  • 5. www.infosectrain.com 2.4 MANAGE DATA LIFECYCLE CISSP DOMAIN 2 Data Location: Physical/logical storage locations Data Collection: Gather information systematically Data Roles Data Destruction Data Remanence: Residual data after deletion Data Maintenance: Keep data accurate and up-to-date Data Retention: Determine how long to keep data Owners: Responsible for data governance and policies Controllers: Decide how and why data is processed Custodians: Ensure safe custody and storage of data Processors: Process data as instructed by controllers Users and Data Subjects: Access and use data; individuals whose data is processed Clearing: Overwriting data Purging: Making data unrecoverable Degaussing: Erasing magnetic ๏ฌelds Destruction: Physically destroying media Overview: Final data disposal Methods of Sanitization
  • 6. www.infosectrain.com 2.5 ENSURING APPROPRIATE DATA AND ASSET RETENTION CISSP DOMAIN 2 Retention Requirements Other Signi๏ฌcant Terms Record Retention Legal and Regulatory Compliance GDPR, HIPAA, SOX Business Policies Data Classi๏ฌcation Retention Periods Data Storage Solutions Disposal and Destruction End-of-Life (EOL): No longer manufactured or sold End-of-Support (EOS): No more updates or technical support End-of-Service-Life (EOSL): Complete end of any support and updates Company-speci๏ฌc data retention policies Alignment with business objectives Sensitive Data Non-Sensitive Data Determining timeframes for retaining records Legal and operational factors Physical and digital storage Security measures for data protection Secure disposal methods Compliance with regulations
  • 7. www.infosectrain.com Scoping Tailoring Data actively being processed Security Measures Data States Standards Selection Scoping and Tailoring 2.6 DETERMINE DATA SECURITY CONTROLS AND COMPLIANCE REQUIREMENTS CISSP DOMAIN 2 In Use In Transit At Rest Access controls, data masking, endpoint security, application security Data moving across networks Security Measures Encryption protocols, secure tunneling, network security, secure email/๏ฌle transfer Data stored on devices Security Measures Encryption, physical security, access control lists, regular backups Identify relevant systems Understand compliance requirements Assess impact and criticality Modify baseline controls Consider organizational context Ensure practicality and effectiveness Relevance: Select appropriate standards (ISO/IEC 27001, NIST SP 800-53, PCI DSS) Coverage: Comprehensive security aspects Compliance: Legal and regulatory requirements Integration: Align with existing policies
  • 8. To Get More Insights Through Our FREE FOUND THIS USEFUL? Courses | Workshops | eBooks | Checklists | Mock Tests LIKE FOLLOW SHARE