Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Awareness Training: Data Owners

Similar presentations


Presentation on theme: "Security Awareness Training: Data Owners"— Presentation transcript:

1 Security Awareness Training: Data Owners

2 Definition VITA 501-01, p. 8 2.2.8 Data Owner
The Data Owner is the agency manager responsible for the policy and practice decisions regarding data, and is responsible for the following: 1. Evaluate and classify sensitivity of the data. 2. Define protection requirements for the data based on the sensitivity of the data, any legal or regulatory requirements, and business needs. 3. Communicate data protection requirements to the System Owner. 4. Define requirements for access to the data.

3 Take Full Ownership Primary focus is to assume responsibility: As the data owner, it is your responsibility for it and to dictate how it is handled.

4 Comunication Communicate with the System Owner Regulations Policy
Access Control Reviewing Risk Assessment, Business Continuity Disposal Communicate with end-users

5 Regulations & Policies
What regulations, whether federal, state, local or organizational apply to your data: Federal: FERPA-Family Educational Rights and Privacy Act PCI DSS-Payment Card Industry Data Security Standard HIPAA-Health Insurance Portability and Accountability Act State/Regional: DHRM-Department of Human Resource Management SACS-Southern Association of Colleges and Schools SCHEV-State Council of Higher Education for Virginia VITA ITRM Standard SEC501-01 COV ITRM Standard SEC514-03 Removal of Commonwealth Data from Electronic Media Standard NSU: Acceptable Use of Technological Resources

6 Access Controls Define who has access and how:
Inform System Owner and admins as to what they need in order to protect VITA SEC Section 5 (p.26) Least privelege AAA Removing AAA Changes in AAA Shared accounts Local Admin rights Etc. NSU Password Policy Who can get to the data, when, how, permissions applied to that data Remote Access allowed? How to protect data at rest (not used or moving) Archives Not accessed often Does the Data need to be Encrypted How to protect data in motion (USB, Printing, memory) System interoperability/sharing

7 Review Data protection is no good without regular review:
VITA SEC Section 5 (p.26) “Do you know who has access and what kind of access?” (R, RW) “Who is checking those that can write?” “Protecting it?” How often Audit point Be prepared to be asked again The Access controls listed previously

8 Risk/Business Continuity
Develop with the system Owner Classify data Sensitive system is one with any data where risk is assessed as High in any of the Confidentiality, Integrity, and Availability of data.

9 Social Engineering Social Engineering Weakest link Phishing
Never give out your password Lock your computer Dumpster Diving/Shredding


Download ppt "Security Awareness Training: Data Owners"

Similar presentations


Ads by Google