Masking/ encryption will
render the data unreadable without the keys
13 guiding priciples of data security
Classifications of data
PII, business critical financially critical
Password best practise
3/4 random words
Goldilocks Principle
balance must be met based on the damage/harm that could be caused
Four sources of data security requirements
Security control legislation EU
Security control legislation EU
Security control legislation US
Four As
Authentication
Authorisation
Access
Audit
Sarbanes-Oxley Act
prevents unauthorised modification of financial transactions
Solvency II
Protecting lineage of data feeding risk models
Active Audit
Parsing instructions and data before its returned to the user
Passive Audit
Looking what has happened
CCPA
statute to enhance privacy right and consumer protection (california)
ISO standards
set out critical requirements for information secuirty standard in an organisation
ISO/IEC 29100
about the technology e.g. firewalls
ISO/IEC 27001
how to manage information security
ISO/IEC 27701
extension of 27001 relating to GDPR
Standards should influence
CIA
confidentiality, integrity, availability
CIA Integrity
preventing undetectable modification of information
3 categories of controls
Administrative controls
precedural security e.g., training, policies