Week 4 Chapter 6 Assignment
Week 4 Chapter 6 Assignment
Contents
I. Introduction.............................................................................................................................3
II. Administrative Controls.........................................................................................................3
A. Data Access Policies..........................................................................................................3
B. Access Rights Review........................................................................................................4
III. Logical/Technical Controls..................................................................................................4
A. Username and Password Requirement..............................................................................4
B. Two-Factor Authentication (2FA)......................................................................................5
IV. Hardware Controls................................................................................................................6
A. Smart Card and Security Tokens.......................................................................................6
B. Hardware Care...................................................................................................................6
V. Software Controls..................................................................................................................7
A. Permission Configuration..................................................................................................7
B. Software Updates...............................................................................................................8
VI. Physical Controls:................................................................................................................8
A. Secure Server Rooms:.......................................................................................................8
B. Guest Access Policies........................................................................................................9
VII. Conclusion..........................................................................................................................9
VIII. References.......................................................................................................................11
I. Introduction
Organizations across sectors prioritize data security. Protecting sensitive data from
unwanted access, manipulation, and breaches is critical. This article examines Data
Management access controls and the many ways to protect sensitive data. Data management
includes storing, retrieving, and manipulating vital business data. As data becomes more
important, so does its misuse danger. Effective risk management requires strong access
restrictions (Bertino, Ghinita, & Kamra, 2011).
V. Software Controls
Staying current on software vulnerabilities via security advisories and industry news
is vital. When significant vulnerabilities demand quick attention, organisations should
implement an emergency patching mechanism. Organizations may protect their data
management systems from software vulnerabilities by meticulously monitoring software
upgrades and proactively resolving security issues (Jansen, 2011).
A. Permission Configuration
Careful permission setting in data management software allows granular data access
control. Defining who can view, write, change, or delete data helps businesses control data
access. Careful permission setting in data management software allows granular data access
control. This defines who may access, write, change, or delete system data. Such precise
access restrictions allow firms to fine-tune data asset access.
Permission configuration starts with data categorization by organisation sensitivity
and significance. Data should have access privileges at multiple levels. Less important
financial data may be available to more people than highly sensitive data, which may only be
accessible to finance department staff.
Data classification creates permission settings for each category. These settings define
which users or groups may access and do certain activities. Access privileges should match
job duties and responsibilities to ensure workers can access just the data they need.
To meet organisational structure, job duties, and data sensitivity, permission settings
must be reviewed and updated constantly. Auditing permission settings regularly reveals
anomalies and access concerns. Employees who change positions or depart should have their
access credentials removed immediately to avoid unwanted access.
Maintaining clear authorization setups and access histories is also important. This
record streamlines compliance reporting and data breach and unauthorized access
investigations.
B. Software Updates
Software that drives data management systems is vulnerable. Maintaining data
security requires a rigorous software update and security patch strategy. Applying security
updates immediately is crucial for fixing vulnerabilities. Data management system software
has weaknesses that hostile actors may exploit. Organizations must build a strong software
update and security patch strategy to protect data. Software updates include bug repairs,
security patches, and feature additions. Security patches fix cybercriminals' known
vulnerabilities. Addressing vulnerabilities before they may be exploited requires
implementing these updates immediately (Bertino, Ghinita, & Kamra, 2011).
Software updates should be well-structured and incorporate data management
procedures. It usually requires multiple steps:
1. Testing: Before delivering changes to production settings, comprehensive testing is
needed to guarantee no new problems or system incompatibilities arise.
2. Backup: Before updating, backup vital data and setups. This guarantees data may be
recovered after an update problem.
3. Schedule updates during low system activity to avoid disruptions to everyday
operations.
4. Documentation: Keep detailed records of each modification, including what was
modified, when, and who did it. This documentation helps audit and troubleshoot.
5. Notification: Inform IT employees and end-users about planned changes to manage
expectations and give transparency.
6. Monitoring: After upgrades, continual monitoring is needed to find any unforeseen
problems or vulnerabilities.
VI. Physical Controls:
A. Secure Server Rooms:
Critical regions like data server rooms need physical security. Security locks, access
control, and surveillance cameras are examples. Access should be limited to authorized
individuals to physically control data.
Data-storing server rooms need strict physical protection to secure sensitive assets.
These precautions protect against illegal access and bodily harm in several ways. Secure
locks and access control are essential to server room security. These procedures employ
electronic keycards, biometric scanners, or PIN numbers to limit access to authorized
personnel. To ensure accountability, server room access logs should capture who enters and
leaves.
Server room access monitoring requires surveillance cameras. Strategically placed
cameras may capture all room activity, deterring security breaches and providing proof of
unlawful entry. Limiting access privileges to server rooms should further restrict physical
access. Only IT maintenance staff should be allowed in. This reduces insider dangers.
Environmental monitoring systems may notify staff to odd situations including
temperature swings, humidity changes, smoke, and fire to improve security. Systems can
protect servers and data from physical harm. Finally, to respond to evolving threats and
weaknesses, physical security must be reviewed and updated constantly. Periodic security
evaluations may reveal flaws and encourage fixes to secure server room data (Zhu & Lü,
2007).
B. Guest Access Policies
Safeguarding data in storage locations requires strict visitor access regulations.
Visitors should check in and be guided by authorized employees while accessing these places.
These rules are essential for preventing unwanted access.
Server rooms must have strict visitor access controls to protect data. These restrictions
strongly discourage purposeful and accidental illegal access. Installing visitor access
regulations requires defined processes for anybody visiting these places. Signing in and
giving identity and reason should be necessary. This documentation shows who had access
and why, promoting accountability.
Visitors should always be accompanied by authorized employees in restricted areas to
increase security. An escort prevents guests from entering prohibited areas and responds
quickly to security issues. Contractors, service professionals, and vendors that require
occasional access to these places for maintenance or other approved operations should be
covered by visitor access regulations. Clear communication of policies to all relevant parties
and their compliance are crucial.
Compliance with guest access rules requires regular training and reminders. Audit
policies periodically to verify compliance and identify areas for improvement. Organizations
may strengthen data asset physical security by strictly enforcing visitor access restrictions to
decrease the risk of unauthorized access to sensitive data in data storage places.
VII. Conclusion
In conclusion, Data Management data security requires a complete access control
strategy. Reviewing and maintaining access restrictions and following rules are the
foundation of data security. Following the techniques and actions in this article, companies
may decrease data management risks and protect their important information assets. Data
security requires continuing access control improvements to keep ahead of changing threats.
VIII. References
Bertino, E., Ghinita, G., & Kamra, A. (2011). Access control for databases: Concepts and systems.
Foundations and Trends® in Databases, 3(1–2), 1-148.
https://ieeexplore.ieee.org/abstract/document/312842/
Hu, V. C., Iorga, M., Bao, W., Li, A., Li, Q., & Gouglidis, A. (2020). General access control guidance for
cloud systems. Nist special publication, 800(210), 50-52ex.
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-210.pdf?ref=julien.io
Jansen, W. A. (2011). Cloud hooks: Security and privacy issues in cloud computing. 2011 44th Hawaii
International Conference on System Sciences, 1-10.
https://ieeexplore.ieee.org/abstract/document/5719001/
Zhu, H., & Lü, K. (2007). Fine-grained access control for database management systems. British
National Conference on Databases,