๐Ÿ“˜ Study Focus | Domain 2: Asset Security

๐Ÿ“˜ Domain 2: Asset Security

๐Ÿ”‘ Flashcard Topics (High-Yield, Harder-to-Retain Items Only)


๐Ÿท️ Data Classification & Handling

  • Classification Levels (Government)
    Top Secret > Secret > Confidential > Unclassified.

  • Classification Levels (Commercial)
    Confidential > Private > Sensitive > Public.

  • Who Classifies Data?
    The data owner defines classification based on sensitivity and impact.

  • Data Lifecycle Phases
    Create → Store → Use → Share → Archive → Destroy.


๐Ÿ” Data Roles and Responsibilities

  • Data Owner vs Data Steward
    Owner = sets classification; Steward = ensures data quality and accuracy.

  • Custodian vs User
    Custodian = implements controls; User = follows policy and uses data properly.


๐Ÿงจ Media and Data Sanitization

  • Clearing vs Purging vs Destroying
    Clear = overwrite; Purge = degauss or crypto erase; Destroy = physically shred/incinerate.

  • Declassification Process
    Confirm no residual data remains; must follow policy and validation steps.


๐ŸŒ Data Remanence

  • What is Data Remanence?
    Residual data remaining after attempts to erase — must be handled properly.


๐Ÿ“ฅ Data Retention and Privacy

  • Data Retention Policies
    Defined by legal, regulatory, and business requirements.

  • PII Handling Requirements
    Only collect necessary PII; apply need-to-know and protect in transit/storage.

  • Data Residency vs Data Sovereignty
    Residency = where data is stored; Sovereignty = laws governing that data.


๐Ÿ’พ Cloud and Virtualization Risks

  • Multitenancy Risk
    Shared resources increase risk of unauthorized access between tenants.

  • Data Aggregation & Inference
    Aggregation = many low-level pieces → sensitive insight; Inference = deducing hidden info.


Comments

Popular posts from this blog

๐Ÿงญ CISSP Study Note: Guidelines

๐Ÿ’ธ CISSP Study Note: Risk Transference

๐Ÿ“ CISSP Study Note: Standards