Domain+2+CCSP
Domain+2+CCSP
Backups
IAM
PROTECT Encryption
DATA DLP
THROUGH DRM
Legal hold
Internet accessible?
What type of
A network security
configuration? group?
Data exploration
Data preparation
DATA
DISCOVERY Big-data analysis
Business Intelligence
Data visualization
Hadoop
• Structured
• Volume
• Database
• Unstructured
• Object (File)
• Big data
• Database
Structured
• Block
PAAS
TERMINOLOGY
Unstructured
• Blob
DATA
DISPERSION
DATA IS CHUNCKED AND STORED ON DIFFERENT
DRIVES THROUGH THE CLOUD
APPLICATION
DESCRIPTION AND
PROGRAMMING REQUIREMENTS
INETERFACE
• Theoretical
• Work is being done to figure out how to keep
data encrypted while it is being used.
• This would be most useful when processing
something like credit cards through a transactional
database.
• The encryption methodology that applies to this is
known as homomorphic cryptography
ENCRYPTION OF DATA AT REST
• OSI Layer 5
• Computer to computer
• IP Security.
• OSI Layer 3
• Can be used for anything.
• Great for site to site (Router to
Router) connections
• Can be used for VPN.
exchange
USE OF PRIVATE KEY
• A one-way function
• Externally managed
• Keys are stored separate
from encryption engine
• Key is on-premises with the customer
Remote-key • Data encryption/decryption
management processing done with cloud provider
• Key is sent to the cloud for processing
KEY
MANAGEMENT
• Key is on-premises with the customer
Client-side • Data encryption/decryption
key processing done at customer site
management • Data is sent to the customer for
processing
PUBLIC KEY
INFRASTRUCTURE
Email address
RA
In person
FIPS 140-2/3 Level 3 – level 2 plus attempts to prevent the intruder from gaining
access such as tamper detection/response circuitry that zeroizes the
data/key when the cover is removed
• Masking
• Tokenization
• Obfuscation
• Anonymization
To hide data from visibility of the user
(e.g., stars instead of password on the
screen)
To cover the credit card number on a
MASKING screen, either the users, or customer
service
People use a lot of different masking
interpretations, but nothing defined by
CSA or NIST or ISO
To replace data with another value.
BIT SPLITTING
Secret sharing made short
(SSMS)
All-or-Nothing with Reed-
Solomon (AONT-RS)
NEURAL NETWORK
• There are many reasons data must be retained, or can no longer be retained
LEGAL HOLD
DATA ARCHIVAL
DATA DELETION
MATURITY
MODELS
•
CMM – THE •
Maturity is related to processes.
How mature is your process?
BEGINNING • First time and chaotic
1 – Initial
2 – Repeatable
3 – Defined
4 – Capable
5 – Efficient
CMM was insufficient so it evolved to CMMI so that it would integrate into the business
better. This is the current MM for software development
MODEL Level 3 – Defined. Process characterized for the organization and proactive.
1 – Ad hock
2 – Opportunistic
CLOUD CMM
3 – Systematic
4 – Managed
5 – Optimized
SECURITY AWARENESS
MATURITY MODEL
• Level 1: Non-Existant Program
• Level 2: Compliance Focused
• Level 3: Promoting Awareness & Change
• Level 4: Long Term Sustainment
• Level 5: Metrics
PMM
1 – Initial