33
Chapter 5: Asset Classification

Chapter 5: Asset Classification. 2 Objectives Assign information ownership responsibilities Develop and use information classification guidelines

Embed Size (px)

Citation preview

Page 1: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

Chapter 5: Asset Classification

Page 2: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

2

Objectives

Assign information ownership responsibilities Develop and use information classification

guidelines Understand information handling and labeling

procedures Manage an information classification program Identify and inventory information systems Recognize the goal and methodology of criticality

assessments Create and implement asset classification policies

Page 3: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

3

Introduction

What is an information asset? A definable piece of valuable information to an

organization stored in any form The information is used by the company

(regardless of size) to fulfill its mission or goal

Page 4: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

4

What Are We Trying to Protect?

Information Systems Provide a way and a place to process, store,

transmit and communicate the information Usually a combination of both hardware and

software assets ASPs: Application Service Providers. A way to

outsource applications to avoid internal hosting and management When using an ASP, proper due diligence should be

conducted to insure the protection of the data

Page 5: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

5

What Are We Trying to Protect? Cont. Information Ownership

ISO stands for Information Security Officer The ISO is accountable for the protection of the

organization. Compare this with: The information owner is responsible for his/her

information The information custodian is responsible for

implementing the actual controls that protect the information assets

The ISO is the central repository of security information

Page 6: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

6

Information Classification

Definitions: Information Classification

Information classification is the organization of information assets according to their sensitivity to disclosure

Classification Systems Classification systems are labels that we assign to

identify the sensitivity levels

Page 7: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

7

Information Classification Cont.

Government & Military Classification Systems Top Secret Secret Confidential Unclassified

Page 8: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

8

Information Classification Cont.

Top Secret applied to “any information or material the unauthorized

disclosure of which reasonably could be expected to cause an exceptionally grave damage to the national security”

Secret applied to “any information or material the unauthorized

disclosure of which reasonably could be expected to cause serious damage to the national security”

Page 9: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

9

Information Classification Cont.

Confidential applied to “any information or material the unauthorized

disclosure of which reasonably could be expected to cause damage to the national security”

Unclassified applied to “any information that can generally be

distributed to the public without any threat to national interest”

Page 10: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

10

Information Classification Cont.

Commercial classification systems: No standard: each company can choose its own

system that matches its culture and needs Usually less complex than the government system The more regulated a company, the more

complex the classification system they adopt

Page 11: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

11

Information Classification Cont.

Commercial classification systems Most systems revolve around these four

classification levels: Confidential Sensitive Restricted Public

Page 12: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

12

Information Classification Cont.

Commercial classification systems Confidential:

Meant to be kept secret Only available to a small circle of authorized individuals Equivalent of Top Secret Disclosure would cause significant financial loss,

reputation loss and/or legal liability

Page 13: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

13

Information Classification Cont.

Commercial classification systems Sensitive:

Does not necessarily imply legal liability and financial loss in case of disclosure

Does imply loss of reputation & personal credibility May also imply loss of privacy-related information Access should be granted on a strict need-to-know basis

Page 14: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

14

Information Classification Cont.

Commercial classification systems Restricted:

Business-related information that should only be used and accessed internally

Unauthorized disclosure would result in impairment of the business and/or result in business, financial or legal loss

Also includes most information subjected to non-disclosure agreements

Page 15: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

15

Information Classification Cont.

Commercial classification systems Public:

Information that does not require protection Information that is specifically intended for the public

Page 16: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

16

Information Classification Cont.

Commercial classification systems Criteria used to classify information:

The info is not public knowledge or public domain The info has demonstrated value to the organization The info needs to be protected from the outside of the

organization The info is subject to government regulation

Question a company should ask: What’s the worst impact that would result from the

unauthorized disclosure of this bit of information?

Page 17: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

17

Information Classification Labeling and Handling Information labeling:

Labeling is the vehicle for communicating the sensitivity level

Familiar labels: Labels must be clear & self-explanatory In electronic form, the label should be made part

of the file name In printed form, the label should be clearly visible

on the outside and in the header and/or footer

Page 18: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

18

Information Classification Labeling and Handling Cont. Information handling:

Information must be handled in accordance with its classification

The information user is responsible for using the information in accordance with its classification level

Page 19: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

19

Information Classification Program Lifecycle The lifecycle starts with assigning a

classification level, and ends with declassification

Information classification Procedure: A nine-step process:

Define the information asset and the supporting information system

Characterize the criticality of the information system Identify the information owner and information custodian Assign a classification level to the information

Page 20: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

20

Information Classification Program Lifecycle Cont. Information classification Procedure

A nine-step process (cont.): Determine & implement the corresponding level of

security controls Label the information & information system Document handling procedures, including disposal Integrate the handling procedures into an information

user security awareness program Declassify information when (and if) appropriate

Page 21: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

21

Reclassification / Declassification

The need to protect information may change With that change, the label assigned to that

information may change as well The process of downgrading sensitivity levels is

called declassification The process of upgrading sensitivity levels is

called reclassification

Page 22: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

22

Value and Criticality of Information Systems

Information is assigned a classification level for protection purposes

Classification is only one of the elements in determining the overall value & criticality of the information to the organization

The asset’s value must be determined before a cost can be associated with protecting this asset

Page 23: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

23

Value and Criticality of Information Systems Cont. Calculating the value of an asset:

Cost to acquire or develop asset Cost to maintain & protect asset Cost to replace asset Importance of asset to owner Competitive advantage of the information Marketability of information Impact on deliver of services Reputation Liability issues Regulatory compliance requirements

Page 24: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

24

Value and Criticality of Information Systems Cont. An organization should always keep an

updated information asset inventory You can’t protect what you don’t know you have!

Asset Inventory Methodology: Hardware assets include (but are not limited to):

Computer equipment Communication equipment Storage media Infrastructure equipment

Page 25: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

25

Value and Criticality of Information Systems Cont. Asset Inventory Methodology

Software assets include (but are not limited to): Operating System software Productivity software Application software

Page 26: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

26

Value and Criticality of Information Systems Cont. Asset Inventory characteristics & attributes:

Each asset should have a unique identifier Create a naming convention so that all assets are

consistently named throughout the company Each asset should have a description

What is this asset used for? Manufacturer imprint:

Hardware: Manufacturer name, model & serial numbers Software: publisher name, version number, revision

number, patch level

Page 27: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

27

Value and Criticality of Information Systems Cont. Asset Inventory characteristics & attributes:

Physical address: geographical location of the asset

Logical address: where the asset can be found in the organization’s network

Controlling entity: the department that funded the purchase/development of this asset

Page 28: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

28

System Characterization

Articulates the understanding of the system, including the boundaries of the system being assessed, the system’s hardware and software, and the information that is stored, processed and transmitted.

Assets should be ranked based on their protection level and importance to the organization

Page 29: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

29

System Characterization Cont.

Two criteria used to rank information: System impact

How vital is this information to the organization? Protection level

The level of protection/safeguards required

Page 30: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

30

System Characterization Cont.

Three levels used to characterize information assets (system impact): High: breach or disruption of information would have

major business processing or customer impact Medium: breach or disruption of information would have

minor business processing or customer impact Low: breach or disruption of information would have no

business processing or customer impact

Page 31: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

31

System Characterization Cont.

Three levels used to characterize information assets (Information protection): High: Compromise / disclosure / loss would have a

significant negative impact Medium: Compromise / disclosure / loss would have

some negative impact Low: Compromise / disclosure / loss would have a

minimal negative impact

Page 32: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

32

System Characterization Cont.

Criticality ratings: provide the basis on which to prioritize and allocate

resources to protect information assets Also used during risk analysis and management,

disaster recovery planning and business continuity planning

Should be revised at least once a year and anytime a change driver is introduced

Page 33: Chapter 5: Asset Classification. 2 Objectives  Assign information ownership responsibilities  Develop and use information classification guidelines

33

Summary

A company cannot defend its information assets unless it knows what they are and where they are. Furthermore, the company must also identify how critical these assets are to the business process.

Companies need an inventory of their assets and a classification system for those assets.

Companies should run critical analyses at least once a year.