Page 1523 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1523

pseudonymization.

               17.  D. Scoping and tailoring processes allow an organization to tailor
                    security baselines to its needs. There is no need to implement

                    security controls that do not apply, and it is not necessary to
                    identify or re-create a different baseline.

              18.  D. Backup media should be protected with the same level of
                    protection afforded the data it contains, and using a secure offsite
                    storage facility would ensure this. The media should be marked,
                    but that won’t protect it if it is stored in an unstaffed warehouse. A
                    copy of backups should be stored offsite to ensure availability if a

                    catastrophe affects the primary location. If copies of data are not
                    stored offsite, or offsite backups are destroyed, security is
                    sacrificed by risking availability.

               19.  A. If the tapes were marked before they left the datacenter,
                    employees would recognize their value and it is more likely
                    someone would challenge their storage in an unstaffed warehouse.

                    Purging or degaussing the tapes before using them will erase
                    previously held data but won’t help if sensitive information is
                    backed up to the tapes after they are purged or degaussed. Adding
                    the tapes to an asset management database will help track them
                    but wouldn’t prevent this incident.

              20.  B. Personnel did not follow the record retention policy. The
                    scenario states that administrators purge onsite email older than

                    six months to comply with the organization’s security policy, but
                    offsite backups included backups for the last 20 years. Personnel
                    should follow media destruction policies when the organization no
                    longer needs the media, but the issue here is the data on the tapes.
                    Configuration management ensures that systems are configured
                    correctly using a baseline, but this does not apply to backup media.

                    Versioning is applied to applications, not backup tapes.
   1518   1519   1520   1521   1522   1523   1524   1525   1526   1527   1528