CISSP Domain 2 Summary: Asset Security

Summary

CISSP Domain 2 covers Asset Security and carries 10% of the CISSP exam weight. Its central principle is that you cannot protect what you have not classified — making asset identification and classification the prerequisite for all security controls. Key topics include: information and asset classification (Government: Top Secret → Secret → Confidential → Unclassified; Commercial: Confidential → Private → Sensitive → Public); data ownership roles — the Data Owner (business manager, accountable, sets classification), Data Custodian (IT, implements controls), Data Steward (governs data quality), and Data User (accesses per authorized level); privacy protection covering PII, PHI, and SPI under frameworks like GDPR, HIPAA, and CCPA; the six-phase data lifecycle: Create → Store → Use → Share → Archive → Destroy; the three data states: at rest (encryption + access controls), in transit (TLS/VPN/IPsec), and in use (hardest to protect); data retention policy balancing legal minimums with data minimization; data sanitization methods: clearing (overwriting, reuse within same domain), purging (degaussing, cryptographic erase), and physical destruction (shredding, incineration); data remanence (residual data after deletion requiring verified sanitization); and data security controls including DLP, DRM, encryption, masking, tokenization, and anonymization. This guide is authored by Manoj Sharma, CISSP — India's #1 CISSP instructor with 550+ certified professionals.

What does CISSP Domain 2 cover and how does Asset Security protect data throughout its full lifecycle?

CISSP Domain 2 covers Asset Security and carries 10% of the CISSP exam weight. Its central principle is that you cannot protect what you have not classified — making asset identification and classification the prerequisite for all security controls. Key topics include: information and asset classification (Government: Top Secret → Secret → Confidential → Unclassified; Commercial: Confidential → Private → Sensitive → Public); data ownership roles — the Data Owner (business manager, accountable, sets classification), Data Custodian (IT, implements controls), Data Steward (governs data quality), and Data User (accesses per authorized level); privacy protection covering PII, PHI, and SPI under frameworks like GDPR, HIPAA, and CCPA; the six-phase data lifecycle: Create → Store → Use → Share → Archive → Destroy; the three data states: at rest (encryption + access controls), in transit (TLS/VPN/IPsec), and in use (hardest to protect); data retention policy balancing legal minimums with data minimization; data sanitization methods: clearing (overwriting, reuse within same domain), purging (degaussing, cryptographic erase), and physical destruction (shredding, incineration); data remanence (residual data after deletion requiring verified sanitization); and data security controls including DLP, DRM, encryption, masking, tokenization, and anonymization. This guide is authored by Manoj Sharma, CISSP — India's #1 CISSP instructor with 550+ certified professionals.

Overview

The definitive CISSP Domain 2 study guide covering Asset Security — including information and asset classification, data ownership roles (Owner, Custodian, Steward, User), privacy protection, data lifecycle management, asset retention, data states (at rest, in transit, in use), data security controls, sanitization and disposal methods, DLP, DRM, and handling requirements. Updated for the 2024 ISC2 exam refresh (10% exam weight). Written by Manoj Sharma, CISSP — India's leading CISSP instructor with 550+ certified professionals.

CISSP Domain 2 Summary: Asset Security

CISSP Domain 2: Asset Security

Introduction:

Welcome to your focused review of CISSP Domain 2: Asset Security. This domain accounts to 10% of the questions on your CISSP exam.  Asset Security covers the essential concepts, structures, and controls required to protect an organization's most valuable resources. A deep understanding of how to identify, classify, and secure information and systems throughout their entire lifecycle is non-negotiable, not just for passing the CISSP exam but for building and maintaining an effective real-world security program.

--------------------------------------------------------------------------------

1.0 Identify and Classify Information and Assets

The entire practice of asset security begins with a single, critical question: "What are we protecting, and why is it valuable?" Before you can apply a single control, you must first identify what holds worth for the organization. For the CISSP exam, understanding the definition and valuation of assets—and recognizing the supreme importance of data—is the non-negotiable first step.

Defining an Asset

An asset is anything of worth to an organization. While this is a broad definition, for the scope of Domain 2, we primarily focus on information (data) and the information systems that process, store, and transmit it. These can be broken down into four main types:

  • Hardware: Physical components like servers, laptops, and network devices.

  • Software: Applications, operating systems, and databases.

  • Virtual & Cloud Resources: Virtual machines, cloud storage, and SaaS applications.

  • Data/Information: The digital and physical information an organization creates and manages.

The Primacy of Data

A core concept for any security professional is that data is the most important asset for a company. Hardware can be replaced, and software can be reinstalled, but the loss of critical data can be catastrophic.

Categorizing Organizational Data

An organization holds many types of data, each with different value and protection requirements. Key categories include:

  • Critical Information: Information essential for the business to function, such as business plans, product information, and go-to-market strategies.

  • Proprietary Information: Data that gives an organization a competitive advantage, like source code, trade secrets, intellectual property, and internal technical plans.

  • Client Information: Data owned by a client that your organization processes. This information must be handled with proper due care.

  • Sensitive Information: Any information that could cause harm if disclosed, including password hashes, personal information, and health records.

Deep Dive into Personal Data

Personal data is a highly regulated and sensitive category. It's crucial to understand its sub-types:

  • Personally Identifiable Information (PII): As defined by NIST SP 800-122, PII is any information that can be used to distinguish or trace an individual’s identity, as well as any other information that is linked or linkable to an individual (e.g., medical, financial, or employment records). It's important to remember that aggregating individual PII elements can create a more sensitive data set.

  • Sensitive Personal Information (SPI): This is information that can be used to directly identify a living person. Examples include a Social Security Number (SSN), driver's license number, or Voter ID.

  • Protected Health Information (PHI): PHI is any health-related information that can be linked to a specific person, such as patient history, prescriptions, or insurance details. In the United States, this is regulated by laws like HIPAA and HITECH.

  • Personal Financial Information (PFI): This includes data such as credit card numbers, bank account details, and investment-related information.

 

1.2 The Process: Asset Classification and Categorization

Once you've identified your assets, you must systematically classify them to ensure they receive an appropriate level of protection. This formal process is crucial for preventing the misallocation of resources (either over- or under-protection), achieving regulatory compliance, and prioritizing security operations where they are needed most.

The "Why" of Asset Classification

Asset classification is a cornerstone of an effective security program for several key reasons:

  • It prevents over-protection of low-value assets (wasting money) and under-protection of high-value assets (creating unacceptable risk).

  • It helps to systematically sort and organize data, making it easier to apply consistent controls.

  • It is essential for achieving compliance with regulations like the EU's General Data Protection Regulation (GDPR), which mandates specific protections for personal data based on its sensitivity.

  • It enables the prioritization of security operations, such as risk assessments, access control reviews, and incident response efforts.

The Classification Process Steps

A successful classification program follows a clear, methodical process:

  • Establish a robust inventory of assets. You can't protect what you don't know you have.

  • Categorize assets based on their properties. This involves grouping assets, such as by physical vs. virtual or by regulatory scope (e.g., PCI-DSS).

  • Assign value to the assets. Value can be based on financial cost, operational criticality, data sensitivity, or regulatory requirements.

  • Set up a clear Data Classification Policy. This policy must be unambiguous and provide specific instructions for handling data at each classification level.

Differentiating Key Terms

Term

Purpose

Asset Classification

A comprehensive process of assigning a value or level of importance to an asset based on its characteristics. It determines the level of protection required.

Asset Categorization

The act of grouping assets based on a specific attribute or purpose, often for a particular management or security objective (e.g., all systems subject to PCI-DSS).

Classification Schemes

Military Tiers:

  • Top Secret: Unauthorized disclosure could cause grave damage to national security.

  • Secret: Unauthorized disclosure could cause serious damage to national security.

  • Confidential: Unauthorized disclosure could cause damage to national security.

  • Unclassified: All other information.

Corporate Tiers:

  • Confidential: Unauthorized disclosure could cause serious risk to the firm.

  • Sensitive: Disclosure could cause reputational and business risk (e.g., a strategy document).

  • Private: Internal information private to a specific group (e.g., employee compensation plans).

  • Proprietary: Disclosure could impact the firm's competitive advantage (e.g., technical specifications, intellectual property).

Labeling vs. Marking

Once an asset is classified, that classification must be communicated.

Term

Description

Labeling

Associates security attributes with an asset in a system-readable format. This allows for automated policy enforcement. Examples include metadata tags, RFID tags, and barcodes.

Marking

Associates security attributes with an asset in a human-readable form to provide handling instructions. Examples include a "Confidential" stamp on a document or a physical label.

Methods of Data Classification

Classification can be performed using several methods, often in combination:

  • Context-based: Classification is derived automatically from metadata, such as the asset's owner, location, or creator, which indirectly indicates its sensitivity. This is typically done by the system without direct user intervention.

  • Content-based: Classification is determined by inspecting the actual content of the asset. This can be done manually by a user or automatically by a tool like a Data Loss Prevention (DLP) system that scans for sensitive keywords or patterns.

  • User-based: Classification is assigned manually by a user (e.g., the data creator or owner) based on their discretion and knowledge of the data.

Classification and labeling are foundational, but they are meaningless without clear requirements for how to handle the assets based on those labels.

--------------------------------------------------------------------------------

2.0 Establish Handling Requirements and Security Baselines

The value assigned to an asset during classification directly dictates the stringency of the security controls needed to access, transmit, and transport it. This is where policy becomes practice.

Defining Asset Handling

Asset handling refers to the security practices applied when accessing, transmitting, and transporting data. The core concept is simple: the more valuable the asset, the more robust the controls needed to secure it. These handling requirements should be clearly defined and referenced in the organization's data classification policy.

The Importance of Data De-classification

Just as important as classifying data is the process of de-classifying it. Over time, data may lose its relevance and value. A formal, documented de-classification process allows an organization to reduce the level of protection on aged data. This prevents excessive security overhead and costs for information that no longer warrants high levels of control. Any de-classification must be formally approved by leadership.

Media Handling Requirements

Whether physical (tapes, hard drives) or digital, all media storing data must be handled according to its classification. Key considerations include:

  • Media Storage: Media must be stored securely, and media containing sensitive data should be encrypted to protect its confidentiality.

  • Media Retention: Media must be retained for periods that align with data retention policies. If a storage medium degrades, the data must be ported to new media to ensure its availability.

  • Media Destruction: When media is no longer needed, it must be destroyed using proper methods to prevent data recovery and ensure confidentiality.

  • Media Containing Evidence: If media contains evidence for a legal case (a "legal hold"), its retention period must be extended with proper approval to preserve the chain of custody.

Establishing a Security Baseline

A Security Baseline is the minimum set of required security controls that must be applied to an asset or system. It serves as a benchmark for establishing consistent security standards across the organization.

Influencing Factors: The selection of a baseline is influenced by several factors, including:

  • Asset value and sensitivity

  • Business requirements

  • Regulatory and compliance mandates

  • The current threat environment

· Implementation Steps: Implementing a security baseline involves a structured process:

  • o Conduct a thorough asset inventory and classification.

  • o Perform a risk assessment to evaluate threats and vulnerabilities.

  • o Select relevant security controls from established frameworks (e.g., NIST, ISO 27001).

  • o Document the selected controls, implementation procedures, and enforcement policies.

  • o Provide training to ensure employees understand their responsibilities.

  • o Continuously monitor the baseline's effectiveness and update it as risks evolve.

To enforce these handling requirements and baselines effectively, an organization must clearly define who is responsible for what.

--------------------------------------------------------------------------------

3.0 Define Roles and Responsibilities for Secure Provisioning

Assigning clear roles and responsibilities for data governance and asset security is critically important. Without defined accountability, security policies fail. For the CISSP exam, you are expected to precisely differentiate between the key roles involved in protecting organizational assets.

Asset-Specific Roles

These roles are primarily focused on the systems, infrastructure, and business functions that use data.

  • Asset Owner: This individual is accountable for an asset or system. Key responsibilities include developing the system security plan, ensuring appropriate controls are implemented, and approving changes.

  • Data/Asset Custodian: This role holds the technical, day-to-day responsibility for protecting assets on behalf of the owner. This is often the IT team, responsible for tasks like managing storage solutions (backups, archiving), implementing security protocols, and ensuring availability.

  • Business/Mission Owner: This senior leader is accountable for a specific line of business that leverages information systems to achieve its objectives.

Data-Specific and Privacy Roles

These roles are focused on the governance of the data itself, often from a compliance and privacy perspective.

  • Data Owner: This is arguably the most important role, as this person holds the ultimate accountability for a specific set of data. As per NIST SP 800-18 Rev. 1, their responsibilities include establishing data classification, defining access policies and usage procedures, ensuring compliance, and defining retention and disposal requirements.

  • Data Steward: This role is responsible for managing the quality, usability, and compliance of data within their specific domain. Their key duties include maintaining data definitions, monitoring data usage, and facilitating data governance.

Data Owner (Strategic Accountability)

Data Steward (Operational Responsibility)

Makes high-level decisions about data, sets access policies, and is ultimately accountable for its protection.

Manages data quality, ensures compliance with policies, and facilitates effective data use on a day-to-day basis.

  • * Data Controller: A term from privacy regulations (like GDPR), this is the entity (e.g., the company) that determines the "purposes and means" of processing personal data. The controller is legally accountable for deciding on data processing, upholding data subject rights, and implementing protection measures.

  • * Data Processor: The entity that processes personal data on behalf of the data controller (e.g., a third-party payroll provider). Their responsibilities include processing data as instructed, implementing security measures, and reporting breaches.

  • * Data Subject: The individual to whom the personal data pertains. They have rights such as being informed about data use, providing consent, and exercising their data protection rights.

Exam Tip: Remember this simple rule: any role with "Owner" in the title (Asset Owner, Data Owner, Business Owner) is ultimately accountable. Other roles like Custodian and Steward are responsible for carrying out tasks. The Data Controller is also accountable, but from a legal and privacy compliance perspective.

--------------------------------------------------------------------------------

4.0 Manage the Data Life Cycle

The data life cycle is the sequence of stages a piece of information goes through from its creation to its eventual destruction. Effective data governance requires applying specific and appropriate security controls at each phase to ensure protection is continuous and adapts to how the data is being used.

The Six Phases of the Data Life Cycle

  1. Create: The generation of new digital or physical data.

  2. Store: Storing the data on media like hard drives, databases, or in the cloud.

  3. Use: Data is being viewed, processed, or otherwise used in an application.

  4. Share: Data is transmitted or made available to others.

  5. Archive: Data is moved to long-term storage for retention.

  6. Destroy: Data is permanently and securely removed.

Security Controls Across the Life Cycle

1. Data Creation/Collection:

  • Data Minimization: Collect only the data that is absolutely necessary for the intended purpose.

  • Transparency: Clearly communicate what data is being collected and why.

  • Consent: Obtain explicit and informed consent before collecting personal data.

2. Data Storage:

  • Encryption at Rest: Use strong symmetric encryption (e.g., AES-256) to protect data stored on media.

  • Access Controls: Implement strict, role-based access controls to limit who can access stored data.

  • Data Localization/Sovereignty: Ensure data is stored in geographic locations that comply with legal requirements.

3. Data Usage:

  • Strict Access Controls (RBAC): Enforce the principle of least privilege so users can only access data they need for their job.

  • Data Masking/Redaction: Obscure sensitive data fields when displayed to unauthorized users.

4. Data Sharing:

  • Data Loss Prevention (DLP): Use DLP tools to monitor and prevent unauthorized exfiltration of sensitive data.

  • Secure Transfer Protocols: Use encrypted protocols like SFTP and TLS to protect data in transit.

  • Data Use Agreements: Establish legal agreements with third parties that define data protection responsibilities.

Data Disposal and Sanitization

This is a very testable area on the CISSP exam. You must know how to properly destroy data to prevent its recovery.

  • Data Remanence: The residual data that remains on media even after common deletion attempts.

  • Defensible Destruction: A legally defensible, systematic process for destroying data that can be proven to be effective.

Sanitization Techniques (for media reuse):

Technique

Description

Effectiveness/Limitations

Clearing

Overwriting data with new patterns (e.g., all zeros). For network devices or office equipment like copiers, clearing is accomplished by performing a full factory reset. A remote wipe of a mobile device is also considered a clearing operation.

Prevents recovery using standard software tools but may not stop advanced laboratory techniques.

Purging

A more advanced sanitization method that makes data recovery infeasible even with sophisticated tools. It may involve overwriting, block erasure, or cryptographic erasure.

More thorough than clearing. Intended for media that may leave organizational control.

Crypto-Shredding

Sanitizing the encryption key(s) used to encrypt the data. Without the key, the ciphertext is rendered unreadable.

Fast and effective, but relies on the secure destruction of all copies of the key.

  • * Degaussing: This technique uses a strong magnetic field to destroy data on magnetic media like traditional hard drives and tapes. It is NOT effective on Solid State Drives (SSDs) or flash drives.

  • * Physical Destruction Methods: These methods render the media unusable and provide the ultimate level of assurance.

    • * Disintegration

    • * Pulverizing

    • * Melting

    • * Incineration

    • * Shredding

    For *Solid State Drives (SSDs)**, the most effective destruction method is using an approved disintegrator that shreds the media to a size of 2 millimeters or smaller, as per NSA guidelines. For maximum assurance, data should be encrypted before disintegration.

Exam Tip:

  • For the exam, know that physical destruction is always the most secure method, but you must be able to choose the correct sanitization method (Clearing, Purging) when the question specifies that the media must be reused.

  • Pay close attention to media types—degaussing is for magnetic media only and is useless on SSDs.

  • One of the most legally critical phases of the data lifecycle, retention, requires its own detailed examination.

--------------------------------------------------------------------------------

5.0 Ensure Appropriate Asset Retention

Data retention is a critical business and legal function, but it must be carefully managed. This is a balancing act. Retaining data for too short a time can violate regulations and contractual obligations. However, over-retention significantly increases storage costs, complicates e-discovery, and expands the organization's legal liability in the event of a breach.

The Risks of Over-Retention

Keeping data for too long introduces several negative consequences:

  • Increased Legal Liability: The more data you hold, the more you can lose in a breach and the more you have to produce during legal discovery.

  • E-Discovery Difficulties: Sifting through massive amounts of old, irrelevant data ("data clutter") makes it difficult and expensive to find specific information when required.

  • Increased Storage Costs: Storing unnecessary data consumes valuable resources.

Elements of a Data Retention Policy

A robust data retention policy should be clear, well-documented, and address the following considerations:

  • Scope: Identify the data types, formats, and business units the policy applies to.

  • Legal & Regulatory Requirements: Identify relevant legal, industry, and regulatory mandates (e.g., GDPR, HIPAA, PCI DSS) and specify mandatory retention periods.

  • Retention Periods: Define how long different categories of data should be retained based on business needs and compliance obligations.

  • Storage Locations: Specify approved and secure storage locations, whether on-premises, in the cloud, or as offsite backups.

  • Access Controls: Establish who can access archived data and under what conditions, enforcing the principle of least privilege.

  • Destruction Methods: Detail the approved methods for secure data destruction once the retention period expires.

  • Exceptions: Account for special circumstances, such as legal holds, investigations, and audits, that may require extending retention periods.

Data Archiving vs. Data Backup

It's crucial to understand the difference between these two related but distinct concepts.

Data Archiving

Data Backup

Purpose: Long-term storage for compliance, historical reference, or legal holds.

Purpose: Short-term storage for disaster recovery and system restoration.

Access: Infrequent.

Access: Frequent, for recovery purposes.

Cost: Lower-cost storage media is typically used.

Cost: Higher-cost, high-performance media for fast restoration.

End-of-Life (EoL) vs. End-of-Service-Support (EoSS)

Managing the lifecycle of hardware and software assets is also part of retention and disposal.

End-of-Life (EoL)

End-of-Service-Support (EoSS)

The product is no longer manufactured or sold by the vendor.

The vendor no longer provides technical support, updates, or security patches.

Represents a business risk, as replacements may be hard to find.

Represents a higher security risk, as vulnerabilities will no longer be fixed.

Whether data is being actively used or retained in an archive, specific security controls must be applied to protect it.

--------------------------------------------------------------------------------

6.0 Determine Data Security Controls

Scoping and Tailoring Controls

Before implementing controls from a framework like NIST or ISO 27001, an organization must perform two critical activities: scoping and tailoring.

  • Scoping: This is the process of identifying which security controls from a baseline are relevant to your specific organization, environment, and data sensitivity. It involves filtering out controls that are unnecessary or not applicable. For example, a company using only cloud services would scope out controls related to physical data center security.

  • Tailoring: This is the process of customizing the selected (scoped) security controls to better fit the organization's unique operational needs, risk tolerance, and compliance requirements. For example, a baseline might require encryption; tailoring would specify the use of AES-256 for enhanced data protection.

Applying Controls to Protect Data

This final section covers the specific technical controls and strategies used to protect data in its various states. As a CISSP candidate, you must be able to analyze a scenario and select the most appropriate control to ensure confidentiality, integrity, and availability.

The Three States of Data

Data exists in one of three states, each requiring different protection methods:

  • Data at Rest: Data that is stored on a physical or logical medium (e.g., hard drive, database, cloud storage).

  • Data in Transit (or Motion): Data that is actively moving across a network.

  • Data in Use: Data that is being processed by a system's CPU or is temporarily in memory (RAM).

Protecting Data at Rest

The primary controls for protecting stored data are:

  • Strong Access Controls: Using principles like Role-Based Access Control (RBAC) and Multi-Factor Authentication (MFA) to restrict access.

  • Symmetric Encryption: Using strong algorithms like AES-256 to encrypt data at the full disk, database, file, or field level.

  • Trusted Platform Module (TPM): A hardware chip on a device's motherboard that provides secure storage for encryption keys.

Protecting Data in Transit

Link Encryption

End-to-End Encryption

Encrypts the entire packet (header and data).

Encrypts only the payload (data), leaving the header visible for routing.

The packet is decrypted and re-encrypted at each network node (hop).

The data remains encrypted from the source all the way to the final destination.

Data is in plaintext at each intermediate node, posing a security risk.

Data is protected from snooping at intermediate nodes. Generally considered more secure for data confidentiality.

An *Onion Network* is a specialized method that provides both confidentiality and anonymity by routing traffic through multiple layers of encryption.

Information Obfuscation Methods

Obfuscation techniques are used to hide sensitive data while retaining its utility for purposes like testing or analytics.

· Anonymization vs. Pseudonymization

Anonymization

Pseudonymization

The process of removing PII in a way that is irreversible. The data cannot be linked back to an individual.

The process of replacing identifiers with a pseudonym or code. It is reversible with a secure mapping key.

* Other Key Methods:

  • * Data Masking: Hiding data by replacing characters with masks (e.g., XXXX-XXXX-XXXX-1234).

  • * Tokenization: Replacing sensitive data with a non-sensitive placeholder, or "token." This is commonly used in credit card processing to protect the actual card number.

  • * Truncation: Shortening a data element to reduce its sensitivity.

  • * Information Pruning: Removing sensitive data attributes from non-production environments.

  • * Fabricating Data: Creating realistic but fake data to replace real, sensitive data for testing purposes.

Protecting Intellectual Property

Digital Rights Management (DRM):

A suite of technologies used to control access to and use of copyrighted content. Key features include:

  • Persistent online authentication to verify licenses.

  • Continuous audit trails to detect abuse.

  • Automatic expiration of access after a subscription ends.

  • Preventing the copying, printing, and forwarding of protected content.

  • Use of digital watermarks for tracing purposes.

Securing Cloud Access

  • Cloud Access Security Broker (CASB): A CASB is a security policy enforcement point that sits between an organization's users and its cloud resources. It acts as a gatekeeper to monitor activity and enforce security policies.

The Four Pillars of CASB:

  • Visibility: Provides insight into cloud application usage, including "shadow IT."

  • Compliance: Helps enforce policies to meet regulatory requirements like GDPR and HIPAA.

  • Data Security: Applies controls like encryption and DLP to protect data in the cloud.

  • Threat Protection: Uses analytics to detect anomalous behavior and defend against cloud-based threats.

Conclusion: Your Path Forward in Asset Security

You've made it through the core concepts of Domain 2. As you continue your studies, I encourage you to review these concepts and focus on the "why" behind each control and process. Ask yourself: Why is this role accountable? Why is this sanitization method appropriate for this data type? This deeper understanding is what separates a good security professional from a great one—and it's what will lead you to success on your CISSP exam. Keep up the great work!

Key Facts

  • Domain Name: CISSP Domain 2 — Asset Security
  • Exam Weight: 10% (unchanged in April 2024 ISC2 refresh)
  • Domain 2 Core Principle: You cannot protect what you have not classified
  • Government Classification Levels: Top Secret → Secret → Confidential → Unclassified
  • Commercial Classification Levels: Confidential → Private → Sensitive → Public
  • Data Ownership Hierarchy: Owner (accountable) → Custodian (implements) → Steward (governs quality) → User (accesses)
  • Data Lifecycle Phases: Create → Store → Use → Share → Archive → Destroy
  • Data States: At Rest | In Transit | In Use (transitions = highest breach risk)
  • Sanitization Methods: Clearing (overwrite) | Purging (degauss/crypto erase) | Physical Destruction
  • Key Privacy Regulations: GDPR, HIPAA, CCPA, PIPEDA
  • Key Data Controls: DLP, DRM, Encryption, Masking, Tokenization, Anonymization
  • Key Standards: NIST SP 800-88 (sanitization), FIPS 199 (categorization), NIST SP 800-60
  • Author: Manoj Sharma, CISSP — India's #1 CISSP instructor
  • Content Source: Cybernous — cybernous.com | 550+ CISSP-certified professionals

Related Questions

  • What is the difference between a Data Owner and a Data Custodian in CISSP?
  • What are the six phases of the data lifecycle in CISSP Domain 2?
  • What is the difference between clearing, purging, and destroying data in CISSP?
  • What is data remanence and why does it matter for CISSP asset security?
  • What is the difference between anonymization and pseudonymization in CISSP?