What are the phases in a secure data lifecycle?
In the Create phase of a secure data lifecycle what are the controls?
In the Store phase of a secure data lifecycle what are the controls?
In the Use phase of a secure data lifecycle what are the controls?
In the Share phase of a secure data lifecycle what are the controls?
In the Archive phase of a secure data lifecycle what are the controls?
What is Data Dispersion?
Data Dispersion used in cloud computing, refers to breaking data into smaller chunks and storing them across different physical storage devices.
What is Erasure Coding?
What are the benefits/tradeoffs of Data Dispersion and Erasure Coding?
Downsides:
a) ensuring that data location does not violate data residency requirements.
b) Additional latency needed to reconstruct data.
What are the storage type in an IaaS?
What are the storage types in a PaaS?
What are the storage type in SaaS?
What are threats to the cloud storage types?
What is the Kerckhoff’s principle?
A cryptosystem should be secure even if everything about the system, except the key, is public knowledge.
What are the stages in the lifecycle of a cryptographic key?
Create - use strong random number generators
Store - encrypted and stored in key vault
Use - access control and accountability
Share - not common, but using PKI to share symmetric keys
Archive - keys no longer needed for routine use, but needed for older encrypted data
Destroy - destruction of keys no longer needed.
What are the various levels of encryption options?
3a. File level encryption - e.g. MS Word/Adobe PDF using passwords or an IRM system; client encrypts
3b. Application level encryption - application encrypts data before writing to object store
What is hashing?
One-way encryption used to verify integrity of data.
Used as part of digital signatures
Digital signatures verify both authenticity and integrity of a message.
Secure Hashing Algorithm (SHA3) is an example of a hashing algorithm approved by FIPS in its Secure Hash Standard (SHS).
What is masking?
Obfuscation of part of the data to keep it secure.
For e.g. displaying just the last 4 digits of the SSN.
What is tokenization?
Non-sensitive representation of sensitive data.
Token is a substitute.
Normally managed via a tokenization service (which implements access controls).
What controls comprise Data Loss Prevention?
What are the major components of a DLP?
What happens in the Discovery phase of the DLP?
What happens in the Monitoring phase of the DLP?
What happens in the Enforcement phase of the DLP?