CISSP Domain 2: Asset Security
Section 2.1: Understand and Apply Information Classification and Ownership
What is Information Classification?
Information classification is the structured process of identifying, evaluating, labeling,
and protecting data based on its sensitivity, regulatory requirements, value to the
organization, and potential impact if compromised.
Without proper classification, organizations cannot:
• Apply the correct level of security controls
• Comply with legal and contractual requirements
• Prevent data misuse, breaches, or unintentional exposure
Objectives of Classification
Objective Description
Confidentiality Ensure sensitive information is not disclosed to unauthorized
parties.
Integrity Prevent tampering or unauthorized modification of data.
Availability Ensure access to important data is maintained when needed.
Compliance Meet legal/regulatory requirements (GDPR, HIPAA, PCI-DSS,
SOX, etc.)
Operational Maintain internal security processes to avoid insider threats
Security and human error.
Competitive Edge Safeguard trade secrets, pricing strategies, customer lists, and
IP from competitors.
Key Terms & Definitions
Term Definition
Asset Anything valuable to an organization – data, people, devices,
software, services
Data Owner The person responsible for defining classification and determining
access
Data Implements and manages controls to protect data
Custodian
User Uses the data within the scope of authorization
Sensitivity Degree of impact if data is disclosed, altered, or unavailable
Criticality Importance of the data to operations and mission success
Types of Information Classification Systems
1. Government/Military Classification (Mandatory Access Control)
Based on federal policy, classified by levels of national security impact:
Level Description
Top Secret Extremely sensitive information; unauthorized disclosure
causes "exceptionally grave damage" to national security
Secret Unauthorized disclosure causes "serious damage" to national
security
Confidential Unauthorized disclosure causes "damage" to national security
Unclassified/Public No damage if released; may still require control (e.g., FOIA
compliance)
2. Commercial/Enterprise Classification (Discretionary Access Control)
Level Description
Confidential Sensitive internal information (e.g., financials, legal
documents)
Private/Internal Use Business-impacting information like employee data,
Only project plans
Sensitive May be personal or regulated (e.g., PII, PHI, cardholder
data)
Public Approved for external release (e.g., press releases,
marketing material)
Organizations may create hybrid models depending on their sector, geography, and
applicable regulations.
Classification Process Lifecycle
1. Identify Data and Assets
o Conduct a full data inventory: structured (databases) and unstructured
(emails, docs).
o Tagging tools, DLP scanners, and manual reviews help locate data.
o Understand where and how data flows through systems (data flow
diagrams).
2. Assign an Owner
o A senior employee (not IT) who understands the business use case of the
data.
o Owner must be able to define risk tolerances, impact if lost, and required
access restrictions.
3. Determine Sensitivity & Criticality
o Analyze what happens if the data is exposed, deleted, or altered.
o Use Business Impact Analysis (BIA) and Risk Assessment inputs.
4. Label Data
o Labels must be visible and standardized: e.g., "CONFIDENTIAL -
INTERNAL HR USE ONLY".
o Use metadata tagging, header/footer markings, and color-coding (e.g.,
Red for Confidential).
5. Apply Controls Based on Classification
o Examples include:
▪ Confidential: encrypted storage, 2FA, strict access control, audit
trails
▪ Public: no restriction, but integrity protection (e.g., signed
checksums)
o Controls should follow data wherever it resides (on-prem, cloud, mobile).
6. Review & Update Classification Regularly
o Classification may change over time: e.g., embargoed product data
becomes public post-launch.
o Set review cycles (e.g., annual) and automatic triggers (e.g., retention
expiry, re-orgs).
Access Control Enforcement by Classification
Control Type Description
MAC (Mandatory Access Admin-defined labels; users cannot change access
Control) rules (e.g., Top Secret)
DAC (Discretionary Access Data owner defines access list (e.g., SharePoint
Control) permissions)
RBAC (Role-Based Access Access based on job roles (e.g., Finance can view
Control) salary data)
ABAC (Attribute-Based Contextual: user location, time, device, project
Access Control) (used in Zero Trust models)
Real-World Scenarios
Scenario 1:
A marketing intern sends an unreleased press release to a blogger. The information was
labeled "Internal – Do Not Distribute". What classification process failed?
• Answer: Failure in access enforcement, likely no training, and poor label
visibility.
Scenario 2:
A VP wants unrestricted access to all HR records. How do you handle this as a security
architect?
• Answer: Apply least privilege and consult HR data owner. Even seniority does not
override need-to-know policies.
Responsibilities of Key Roles
Role Duties
Data Owner Defines classification, approves access, sets retention, requests
audits
Data Custodian Maintains backups, configures ACLs, updates classification
labels
System Owner Oversees systems that store/process data, manages
OS/application-level security
User Uses data per policy, reports suspicious activity
Privacy Officer Ensures data handling aligns with privacy laws and corporate
policies
Compliance Audits classification policy adherence, especially in regulated
Officer sectors (e.g., finance, healthcare)
Memory Aids & Mnemonics
• CLASS: Classification Lifecycle =
o Create Inventory
o Label Data
o Assign Owner
o Set Controls
o Schedule Review
• POLAR: What to consider when classifying
o Privacy
o Operational Impact
o Legal Risk
o Access Requirements
o Retention Duration
Exam Triggers from This Section
• “Who defines the classification?” → Data Owner
• “What type of control is used in military environments?” → MAC
• “Which role is responsible for technical enforcement of controls?” →
Custodian
• “Which principle is violated if a user accesses more than required?” → Least
Privilege
• “What is the best way to label unstructured documents?” → Visible
headers/footers and metadata tags
Section 2.2: Determine and Maintain Information and Asset Ownership
2.2.1 What Is Asset Ownership?
Every information asset—whether it’s a database, an email archive, or a physical
report—must have a designated owner who is accountable for how that asset is used,
secured, stored, and eventually disposed of.
Who Is the “Owner” of Data?
Not necessarily the creator. Not IT.
• Typically, the business unit leader who understands the value and purpose of the
asset.
• E.g., Payroll records → HR Director is the data owner, not the payroll tool vendor.
Core Responsibilities of a Data Owner
Responsibility Description
Classification Determines how sensitive data is (e.g., Public, Private,
Confidential)
Access Approval Authorizes who can access the data and at what level
Protection Level Decides what security controls are needed (e.g., encryption,
ACLs)
Compliance Ensures the data is handled in accordance with
Alignment laws/regulations
Retention & Disposal Defines how long data is kept and when/how it should be
destroyed
Important Distinction:
Ownership ≠ Custody. A custodian maintains technical controls. The owner defines
policies and oversight.
2.2.2 What Is Data Custodianship?
The data custodian implements and enforces the policies defined by the data owner.
Function Role of Custodian
Technical Access Configure and manage access control lists (ACLs)
Data Protection Apply encryption, backups, monitoring, patching
Logging & Maintain audit trails for who accessed/modified the data
Reporting
Data Recovery Ensure business continuity and disaster recovery plans are in
place
2.2.3 Key Roles Compared
Role Function
Data Owner Assigns classification, defines retention, approves access
Data Custodian Implements technical controls, manages backups
User Uses data responsibly, reports issues
System Owner Owns the infrastructure (servers, applications)
Security Officer Oversees enforcement of security policies
Auditor Verifies data is handled according to policy
2.2.4 Defining Ownership Through Policies
Organizations should define ownership responsibilities via:
• Data Classification Policy
• Access Control Policy
• Acceptable Use Policy
• Information Lifecycle Management Policy
These should be backed by awareness training, automated DLP solutions, and
enforcement processes.
2.3 Information and Asset Retention
Now we move into a major sub-area closely related to ownership:
2.3.1 What Is Data Retention?
Data retention refers to the strategic and policy-based decision of how long to keep
specific types of data and what procedures to follow for its eventual disposal.
Not all data should be kept forever. Excessive retention creates:
• Legal liability (discoverability in lawsuits)
• Compliance risk (GDPR fines for storing longer than needed)
• Storage cost & attack surface
Data Retention Policies Should Include:
1. Data Type – Personal data, financial, medical, source code, logs
2. Retention Period – e.g., HR records = 7 years, CCTV footage = 30 days
3. Storage Location – Cloud, backup tape, data warehouse
4. Access Control – Who can access it during retention
5. Secure Disposal Method – Based on classification (see 2.4)
Retention Standards & Regulations
Standard/Regulation Retention Requirement
SOX (Sarbanes- 7 years for financial records
Oxley)
HIPAA 6 years for health data
GDPR Only as long as necessary (no fixed duration, must be
justifiable)
PCI DSS 1 year for audit logs, 3 months must be immediately
available
Company IP May retain indefinitely, but with strict controls
2.4 Information Lifecycle & Secure Disposal
2.4.1 Information Lifecycle Stages
Stage Description
Create New data is generated or collected
Store Stored in secure environments (cloud, DB, backup)
Use Accessed, edited, analyzed; governed by access controls
Share Transmitted internally or externally (with encryption, DLP)
Archive Moved to long-term storage; rarely accessed
Destroy Secure deletion, wiping, or shredding after retention ends
2.4.2 Secure Disposal Methods
Media Type Recommended Disposal
Paper Cross-cut shredding, incineration
Hard Drives Degaussing, overwriting (DoD 5220.22-M), physical destruction
Flash Drives Cryptographic erasure or physical destruction
Cloud Data API-based deletion followed by cloud provider's sanitization process
Memory (RAM) Automatically cleared on shutdown (but consider hibernation data)
Tip: Always maintain a certificate of destruction for legal and audit trail purposes.
2.4.3 Data Sanitization Techniques
Technique Description Best Used When
Clearing Remove data with standard OS delete Reuse within trusted
commands environment
Purging Overwrite using tools like DBAN or DoD Medium sensitivity data
wipe utilities reuse
Degaussing Magnetic field disrupts drive platters Bulk HDD disposal
Destruction Physical destruction (drill, shred, melt) Highly sensitive or end-of-
life assets
Exam Tip: Don’t Confuse These
Term Definition
Erasure Making data unreadable by overwriting
Deletion Logical removal; data can often be recovered
Sanitization Comprehensive process of ensuring data is unrecoverable
Shredding Physical destruction of media (paper or hardware)
Privacy Protection, Data Residency, and Asset Handling in Complex Environments
2.5 Protect Privacy
Protecting privacy means ensuring personally identifiable information (PII), sensitive
personal data, and other private records are collected, processed, stored, and disposed
of in accordance with legal, ethical, and organizational obligations.
2.5.1 What is PII?
Personally Identifiable Information (PII) is any data that can be used to identify an
individual either directly or indirectly.
Examples:
Direct Identifiers Indirect Identifiers
Full Name IP Address
Passport Number GPS Coordinates
National ID Number Date of Birth
Biometric Data Purchase Behavior
2.5.2 Sensitive PII (SPII) & Special Categories
Some jurisdictions treat specific types of PII as extra sensitive, requiring explicit
consent and stronger controls.
Region Special Data Types
GDPR (EU) Health, biometrics, sexual orientation, political views
HIPAA (US) Personal Health Information (PHI)
PCI DSS Cardholder data (PAN, CVV)
2.5.3 Privacy Principles (OECD & GDPR-Aligned)
Principle Meaning
Notice Users must be informed when their data is collected
Consent Data collection must be voluntary unless exempted
Purpose Limitation Collected for specific, explicit purposes
Data Minimization Collect only what’s strictly necessary
Accuracy Ensure data is current and correct
Storage Limitation Data retained only as long as needed
Integrity and Confidentiality Protect data against loss or misuse
Accountability Data controllers must prove compliance
2.5.4 Privacy Roles in Organizations
Role Description
Data Controller Determines the purpose and means of processing PII
Data Processor Acts on behalf of the controller (e.g., cloud vendor)
Data Subject The individual whose data is collected
DPO (Data Protection Oversees privacy compliance, mandatory under GDPR for
Officer) large-scale sensitive data processing
2.5.5 Privacy by Design (PbD) & Privacy by Default
• PbD: Embed privacy into system architecture from the beginning.
• PbD Default: Settings should be private unless user opts in to share.
Example: Social media profile visibility is set to "Friends Only" by default—not
Public.
2.5.6 Privacy Breach Handling
• Detect: DLP alerts, anomaly detection
• Contain: Quarantine affected systems
• Report: Notify Data Protection Authorities (e.g., within 72 hours under GDPR)
• Notify: Inform impacted data subjects with actionable steps
Legal impact varies by jurisdiction; breach notification laws differ globally.
2.6 Ensure Appropriate Asset Handling
2.6.1 Protecting Data Across States
Data Description Protection Methods
State
At Rest Stored on disk or backup Full-disk encryption, access control, volume
encryption
In Transit Moving across networks TLS, VPN, encrypted APIs
In Use Active in memory or Encrypted memory, secure enclaves, access
processing logging
2.6.2 Handling Media Securely
1. Media Labeling
• Apply classification labels (e.g., "Confidential") on USBs, printed docs, HDDs.
• Use color codes, barcodes, or RFID tagging for tracking.
2. Storage of Media
• Lock physical drives in safes or racks
• Secure server rooms and offsite media vaults (fire-resistant, humidity-
controlled)
3. Transport of Media
• Always use tamper-proof, logged, secure carriers for sensitive data
• Chain of custody logs must be maintained
• Prefer electronic over physical transmission when possible
2.6.3 Remanence and Residual Risk
Remanence = residual data remaining after deletion or formatting
Threat: Skilled attackers may recover sensitive data from "deleted" media.
Controls:
• Use secure wipe tools
• Purge with DoD-standard software (7-pass overwrite)
• Destroy drives with crushers or shredders
2.6.4 BYOD & Mobile Asset Security
BYOD (Bring Your Own Device) introduces flexibility but increases risk.
Risk Control
Data leakage via untrusted apps MDM solutions, containerization
Lost/stolen devices Full disk encryption, remote wipe
Unauthorized cloud sync Disable third-party storage apps
Acceptable Use Policies (AUP) and Mobile Device Policies must:
• Define who can use personal devices
• Set security baselines (encryption, screen lock, antivirus)
• Enforce device registration and compliance
2.6.5 Asset Handling in Cloud & Outsourced Environments
Concern Control
Data sovereignty Host data in compliant regions
Shared responsibility Understand split between org and CSP
Loss of visibility Use CASB tools, require audit logs
Vendor lock-in Ensure data portability in contracts
Deletion & sanitization Demand verifiable deletion processes
Remember: Even if you outsource the process, you don’t outsource accountability
under law or compliance frameworks.
Intellectual Property, Licensing, Logging, and Asset Management
2.7 Identify and Support Intellectual Property (IP) Requirements
Organizations must protect intellectual property (IP) to maintain their competitive
advantage, compliance posture, and brand integrity.
2.7.1 What Is Intellectual Property (IP)?
IP refers to intangible creations of the mind that carry commercial value and are legally
protected.
IP Type Description
Trade Confidential business info (e.g., algorithms, formulas, internal
Secrets processes)
Copyrights Legal rights over original creative works (e.g., code, documentation,
graphics)
Patents Exclusive rights for inventions (granted after formal registration)
Trademarks Brand identity elements like logos, slogans, and product names
2.7.2 Handling Copyrighted Content
What you CAN’T do without permission:
• Reproduce licensed training videos or books
• Copy code libraries into your proprietary code
• Distribute open-source components without honoring license terms
2.7.3 Software Licensing Models
License Type Description
Proprietary Must be purchased; vendor retains IP rights (e.g.,
(Commercial) Microsoft Office)
Freeware Free to use but not to modify (e.g., Adobe Reader)
Shareware Try-before-you-buy; limited time use
Open Source Free to use, modify, and distribute (under conditions)
Copyleft (e.g., GPL) Derivative works must also be open source
Creative Commons Used for content, not software (multiple levels of
permission)
Understand how each type affects your ability to use, modify, and distribute
content/software.
2.7.4 Digital Rights Management (DRM)
DRM controls are implemented to prevent unauthorized duplication or distribution of
licensed materials.
Mechanism Use Case
License keys Software activation
Copy protection Media access control
Online validation Enforce usage limits (e.g., number of devices)
Organizations should ensure DRM solutions don’t interfere with user productivity or
incident response capabilities.
2.7.5 Legal Risks of Violating IP
Violation Consequences
Using pirated software Lawsuits, malware exposure, audit
failure
Breaching OSS licenses Forced release of proprietary code
(under GPL)
IP theft (e.g., ex-employee leaking Civil/criminal penalties
source code)
2.8 Establish Asset Handling Requirements
2.8.1 Asset Management Lifecycle
Phase Action
Acquisition Inventory assigned with unique ID
Deployment Configuration baseline applied (e.g., Group Policy, CIS
hardening)
Usage Tracked and monitored; access controlled
Maintenance Patches, upgrades, backups applied
Decommissioning Sanitized and removed from inventory; disposal certificate
issued
2.8.2 Asset Inventory Controls
• Maintain up-to-date asset inventory: hardware, software, cloud, virtual, mobile
• Include:
o Owner
o Serial Number
o Configuration baseline
o OS version, patch level
o Classification level
o Location
Tooling Examples:
• CMDBs (ServiceNow, BMC Remedy)
• Endpoint Detection & Response (EDR) tools
• Network scans to detect rogue/unmanaged devices
2.8.3 Logging and Monitoring
Objective Explanation
Integrity Logs must be tamper-proof (e.g., immutable or signed)
Accountability Capture who did what, when, and how
Forensics Logs are critical evidence in incident response
Compliance PCI DSS, SOX, HIPAA all require audit logging
Include:
• Asset provisioning logs
• Change management logs
• Incident and exception logs
• Decommissioning logs (with sanitization confirmation)
2.8.4 Protection of Asset Metadata
Even asset metadata (e.g., device IP, OS type, installed software) can be exploited if
leaked.
Threat Exploitable By
Open ports & firmware version Attackers scanning for vulnerabilities
Device names (e.g., FINANCE- Helps attackers map targets
PC01)
Software inventory Enables license compliance audits or exploit
targeting
• Enforce RBAC for inventory systems.
• Avoid exposing inventory reports via email or SharePoint
2.8.5 Example Policy Inclusions
• Who is authorized to handle sensitive assets
• Labeling requirements per classification level
• Chain of custody logs for movement of media or devices
• Acceptable Use rules (e.g., USB policy, BYOD terms)
• Escalation procedures for lost/stolen assets
Final Thoughts
Domain 2 is the heart of data governance, where trust, control, and responsibility converge.
It emphasizes that security isn't just about protecting systems—it's about safeguarding the
value embedded in assets throughout their lifecycle.
The Core Principle:
“You can’t secure what you don’t classify, own, and track.”
Foundation Pillars of Domain 2:
1. Data Classification – Label data based on its sensitivity and value. The more critical
the data, the tighter the controls.
2. Ownership – Every asset needs a clearly defined owner, not just someone who
maintains it. Owners make policy decisions.
3. Privacy Protection – Understand and enforce privacy laws (GDPR, HIPAA) and
embed privacy by design into all data handling.
4. Retention & Disposal – Keep data only as long as necessary, and dispose of it
securely to prevent data remanence.
5. Handling & Protection – Whether at rest, in transit, or in use, data must be protected
using appropriate encryption, access controls, and monitoring.
6. Special Environments – Cloud, BYOD, and outsourced ecosystems introduce
complexity—know your risks and your responsibilities.
7. IP & Licensing – Respect intellectual property, manage licenses legally, and avoid
legal landmines like pirated or misused software.
8. Asset Inventory & Logging – Maintain up-to-date records of your assets, and ensure
all actions on them are monitored and auditable.