Page 326 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 326

against any type of loss. The obvious protection is encryption. AES 256
               provides strong encryption and there are many applications available

               to encrypt data with AES 256. Additionally, many operating systems
               include built-in capabilities to encrypt data at both the file level and
               the disk level.

               If sensitive data is stored on physical media such as portable disk
               drives or backup tapes, personnel should follow basic physical security
               practices to prevent losses due to theft. This includes storing these

               devices in locked safes or vaults and/or within a secure room that
               includes several additional physical security controls. For example, a
               server room includes physical security measures to prevent
               unauthorized access, so storing portable media within a locked cabinet
               in a server room would provide strong protection.

               Additionally, environmental controls should be used to protect the
               media. This includes temperature and humidity controls such as

               heating, ventilation, and air conditioning (HVAC) systems.

               Here’s a point that end users often forget: the value of any sensitive
               data is much greater than the value of the media holding the sensitive
               data. In other words, it’s cost effective to purchase high-quality media,
               especially if the data will be stored for a long time, such as on backup
               tapes. Similarly, the purchase of high-quality USB flash drives with
               built-in encryption is worth the cost. Some of these USB flash drives

               include biometric authentication mechanisms using fingerprints,
               which provide added protection.



                             Encryption of sensitive data provides an additional layer


                  of protection and should be considered for any data at rest. If data
                  is encrypted, it becomes much more difficult for an attacker to
                  access it, even if it is stolen.




               Destroying Sensitive Data

               When an organization no longer needs sensitive data, personnel
               should destroy it. Proper destruction ensures that it cannot fall into
   321   322   323   324   325   326   327   328   329   330   331