Data Lifecycle, Controls, & Compliance Flashcards

(39 cards)

1
Q

What does RBAC stand for in data roles?

A

Role-Based Access Control

RBAC is a method of regulating access to computer or network resources based on the roles of individual users within an enterprise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who typically oversees data in a specific zone or admin domain?

A

Data Owner

A Data Owner is responsible for ensuring that information is properly maintained across platforms and business processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the primary activities of a Data Owner?

A
  • Compiling and approving data glossaries, schema, and definition sets
  • Managing functions relevant to data quality and accuracy
  • Certifying information used inside and outside of the organization
  • Appraising and approving a master data management (MDM) strategy
  • Resolving issues with other data owners

These activities ensure the proper management and governance of data assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the role of Data Custodians?

A

Controller of the data

Data Custodians develop and maintain technical and security controls for data collections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do Data Stewards focus on?

A

Managing quality of the data sets

Data Stewards are customer-focused and serve as Subject Matter Experts (SMEs) regarding the importance of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fill in the blank: Data users and processors perform ______ as part of their job roles.

A

raw data input and batch jobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is involved in the Collection Phase of data management?

A
  • Collecting data from various sources
  • Data creation, acquisition, or entry
  • Handling structured, semi-structured, and unstructured data

This phase includes legal and accurate data collection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What defines the Location Phase in data management?

A

Storage of data in object/volume, file, and/or object storage

This phase is optional but critical for visibility into data locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the GDPR concept related to data maintenance?

A

Data minimization

Data minimization ensures only necessary data is maintained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the methods included in data maintenance?

A
  • Encryption
  • Wrangling
  • Compression
  • Processing and analysis

These methods help in managing the utility and quality of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does data retention refer to?

A

Long-term archiving of data

Data retention is guided by best practices, policies, and regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is data remanence?

A

Remnants or artifacts of data that could be recovered after deletion

Data remanence poses risks of unauthorized access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the End of Life (EOL) in the context of data?

A

When the utility of data expires and it is discarded or destroyed

EOL signifies that the data is no longer useful to the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does physical security in data destruction involve?

A

Disposition or destruction of physical media

This is crucial for ensuring confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three options for destroying data?

A
  • Overwriting or crypto-shredding
  • Physical destruction
  • Degaussing or wiping

These methods ensure that data cannot be recovered after deletion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is data scoping?

A

Deciding the boundaries within which certain data or controls apply

This process helps in defining the limits of data governance.

17
Q

What does data tailoring involve?

A

Customizing security controls to match organizational requirements

Data tailoring ensures that security measures fit the specific needs of the organization.

18
Q

What are the 6 Phases of the Data Life Cycle?

A
  1. Creation / Collection - Data is generated or collected from internal or external sources. Ensure accuracy, validate inputs, apply classification, obtain consent if personal data.
  2. Storage / Retention - Data is stored in databases, file systems, or cloud environments. Encrypt at rest, access control, backup, secure physical and logical storage.
  3. Usage / Processing - Data is actively accessed, modified, or processed. Access control, logging, secure applications, prevent unauthorized modifications.
  4. Sharing / Transmission - Data is transmitted internally or externally. Encrypt in transit (TLS/SSL, VPN), ensure integrity, authenticate recipients.
  5. Archival - Data is moved to long-term storage for retention or compliance purposes. Ensure secure storage, restrict access, maintain integrity over time, comply with retention policies.
  6. Disposal / Destruction - Data is securely destroyed when no longer needed. Wipe digital media, shred physical media, sanitize devices, document disposal for compliance.
19
Q

What is Data at Rest?

A

Data stored on any medium (disk, database, file, cloud storage) that is not actively moving.

Security considerations include encryption at rest (AES, disk encryption), access control (RBAC, DAC, MAC), physical security, and backup and redundancy.

20
Q

What is Data in Transit (Data in Motion)?

A

Data being transmitted across networks or between systems.

Security considerations include encryption in transit (TLS/SSL, VPN), integrity checks (hashes, digital signatures), secure communication protocols, and network monitoring / IDS.

21
Q

What is Data in Use?

A

Data currently being processed in memory (RAM, CPU cache) or actively accessed by applications.

Security considerations include memory protection / encryption, secure application controls, endpoint security, and minimizing exposure to unauthorized access.

22
Q

What is Digital Rights Management (DRM)?

A

DRM is access-control technology that protects licensed and copyrighted digital intellectual property or IP.

23
Q

Who uses DRM?

A

DRM is used by publishers, manufacturers, content producers, and owners of intellectual property for digital content and device monitoring.

24
Q

What types of media does DRM protect?

A

DRM protects copyrighted digital music files, apps, software programs, films, documentaries, TV shows, games, and other media such as sporting events.

25
What is Data Loss Prevention (DLP)?
DLP is a collection of hardware and software tools and programs that help safeguard sensitive data, intellectual property, personal health, and identifiable information from being leaked, lost, tainted, stolen, or read by unauthorized users.
26
What is Data Loss Prevention (DLP)?
A collection of hardware and software tools that help safeguard sensitive data, intellectual property, personal health, and identifiable information from being leaked, lost, tainted, stolen, or accessed by unauthorized users.
27
What are the three forms of DLP protection?
1. Network DLP 2. Endpoint DLP 3. Cloud-based DLP
28
What is Network DLP?
Monitors and controls data moving across the network. ## Footnote Example: Blocking unencrypted credit card numbers in outgoing emails.
29
What is Endpoint DLP?
Monitors and controls data on end-user devices. ## Footnote Example: Prevent copying sensitive files to USB drives.
30
What is Storage / Discovery DLP?
Scans databases, file shares, and cloud storage for sensitive data. ## Footnote Example: Identify unencrypted files containing PII, PHI, or intellectual property.
31
What is Cloud / SaaS DLP?
Protects data stored and shared in cloud applications. ## Footnote Example: Monitor and control sensitive files in Office 365, Google Workspace, or Dropbox.
32
What is CASB?
A security policy enforcement point that sits between cloud service users and cloud applications.
33
What is the purpose of CASB?
Provide visibility, control, and protection for data and activity in cloud services.
34
What is a use case for CASB?
Helps organizations secure SaaS, PaaS, and IaaS environments, ensuring compliance and preventing data breaches.
35
What are the four pillars of CASB?
CASB capabilities are often categorized into four main pillars: Visibility, Compliance, Data Security, and Threat Protection.
36
What does the Visibility pillar of CASB provide?
Provides insight into cloud application usage and user activity. ## Footnote Example controls include discovering unsanctioned apps, monitoring login patterns, and tracking data sharing.
37
What does the Compliance pillar of CASB ensure?
Ensures cloud services comply with regulations and internal policies. ## Footnote Example controls include enforcing GDPR, HIPAA, PCI-DSS, ISO 27001 requirements, and audit reports.
38
What is the function of the Data Security pillar of CASB?
Protects sensitive data in the cloud. ## Footnote Example controls include encryption, tokenization, data loss prevention (DLP), and access control.
39
What does the Threat Protection pillar of CASB do?
Detects and mitigates security threats in cloud environments. ## Footnote Example controls include malware detection, account takeover detection, anomaly detection, and behavioral analytics.