5 - Asset Management Section PDF
5 - Asset Management Section PDF
InstructorAlton.com
Assets
Anything deemed valuable to a company is considered an asset:
• People
• Information
• Data
• Hardware
• Software
• Processes
• Ideas
• Etc.
You can’t effectively protect your organization if you don’t know what you have.
Therefore, assets should be identified and classified so they can be effectively
protected.
Asset Identification & Classification Process
1. Inventory Your
Assets
5. Periodically
2. Assign
Assess &
Ownership
Review
4. Protect Based
3. Classify
on Value
Based on Value
Classification
Asset Management Section
InstructorAlton.com
The Asset Lifecycle
3. Monitor •Regularly monitor for changes in value and the effectiveness of our security controls.
•Once the usefulness of an asset been reached and it is to be disposed, there are two primary
5. Disposition methods: archiving the asset for long-term storage or defensible destruction, ensuring there
is no data remanence.
Asset Management Section
Data Retention
InstructorAlton.com
Data Retention
• Data retention is the long-term storage of valuable assets, typically driven by:
o Legal and Regulatory Compliance Requirements
o Organizational Requirements
InstructorAlton.com
Data States
Data State Details
Data that’s stored on media of any form (hard drive, USB stick, tape, CD). It’s considered at rest
Data at Rest because it’s not being transmitted over the network or in use. Data at rest is commonly protected
by disk and file encryption.
Data that’s currently moving across a network from one device to another. Data in motion is
Data in Motion commonly protected by network encryption, such as SSL, TLS, and VPN connections with IPSec
encryption.
Data that’s being used by a system process, application or user. It’s data that’s being created,
updated, appended, or erased. Data in use is the hardest to protect because it’s not encrypted
Data in Use
while in use. Proper access control, integrity checks, and auditing measures can help protect data
in use.