官术网_书友最值得收藏!

Data security controls

Logical assets such as data that are in a intangible form need various levels of protection based on the state they are in. Data protection requirements are based on the classification of the information assets and CIA requirements such as legal, regulatory, and privacy compliance.

Data security requirements

In the past decade, data in corporations has been growing exponentially. Some studies indicate that the compounded annual growth rate (CAGR) of data is 70% or above. Besides, an organization has to comply with various requirements during its operations. Compliance requirements pertaining to data security are based on the CIA requirements and privacy of data. Some of the following compliance requirements may be applicable to corporations.

Payment Card Industry Data Security Standard (PCI DSS)

PCI DSS is a standard that pertains to payment card-related security requirements. The PCI Security Standards Council is an open global forum that develops and maintains this standard. Any entity that is involved in the payment card processing chain needs to comply with the safeguards of this standard. There are six core objectives in this standard:

  • Network security has to be robust. Hence, an entity has to implement and maintain a secure network and systems.
  • Cardholder data has to be protected from fraudulent transactions.
  • Vulnerability management program has to be maintained by the entities.
  • Access control measures have to be strong.
  • The monitoring and testing of the networks has to be regularly performed.
  • A formal maintenance of information security policy is mandatory.

Sarbanes-Oxley Act (SOX)

This is the US federal law that mandates various administrative controls pertaining to the financial reporting of publicly traded companies in the United States. From an information security perspective, this law mandates the demonstration of internal controls over financial reporting systems. One of the key objectives of this act is to enforces segregation of duties to reduce the chances of committing financial fraud.

Note

Segregation of duties or separation of duties is a security control measure to ensure that mutually exclusive roles are not assigned to a single user concurrently. In other words, if two roles are required to complete the job function and if one role ensures security, then they are mutually exclusive. Examples of such roles include system administrator versus security administrator, check signatory versus check approver, accounts receivable versus accounts payable, and so on.

Gramm-Leach-Bliley Act (GLBA)

This act in the United Sates mandates privacy rules for financial institutions, their customers, and their privacy rights. Various security safeguards are advised in the safeguards rules. As per this act, developing an information security plan and the protection of a client's nonpublic information are mandatory.

EU Data Protection Act (DPA)

This act is for the countries in the European Union and the primary focus is on data protection pertaining to the privacy information of client data.

In a nutshell, corporations are challenged with the explosive growth of data and with more and more regulations to protect the data and many channels of information exchange, where data can be compromised. Hence, appropriate strategies are required for Data Loss Prevention.

主站蜘蛛池模板: 罗江县| 蓝田县| 龙山县| 丁青县| 永胜县| 湘西| 朔州市| 苗栗市| 犍为县| 大邑县| 如皋市| 江永县| 禹州市| 蕉岭县| 阿拉善盟| 仪陇县| 彭阳县| 逊克县| 从江县| 忻州市| 汝城县| 湖口县| 岳西县| 中山市| 电白县| 长武县| 阜城县| 利津县| 安阳市| 桂林市| 普定县| 佛坪县| 永昌县| 吐鲁番市| 龙江县| 静安区| 晋江市| 淮南市| 池州市| 苍南县| 金塔县|