Critical IT Requirements Related to Data Storage

Security rules and procedures protect information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Examples of IT requirements that support secure data storage include the following (Niels, Dempsey, and Pillitteri, 2017):

Data Protection

Encryption of data (at rest and in transit)

  • Encryption transforms intelligible data, called plaintext, into an unintelligible form, called ciphertext. This is reversed through the process of decryption.

Appropriate security technologies

  • e.g., intrusion detection and protection systems, firewalls, configuration settings

Audit Trails

Records of system activity, including information on system processes, application processes, and all user activities, should be maintained. These records could be used to find security violations, application flaws, and/or understand performance problems within the system.

Separation of Data

Separation of data in this context means that individual clients may require that their data be stored in an environment that is either logically separated using software or physically separated using hardware isolation.

Separation of Duties

Separation of duties is the process by which roles specific to handling sensitive systems and data are segmented so that no single individual has total control of—or access to—a system. Separation of duties can reduce insider threats by limiting the access any one individual has to a system. Such separation can also serve as a checks and balances system for security. This differentiates the individuals who design or test a system from those who conduct security testing or monitoring.

References

Niels, M., Dempsey, K., & Pillitteri, V. Y. (2017). NIST special publication 800-12 Rev. 1: An introduction to computer security: The NIST handbook. Retrieved from https://doi.org/10.6028/NIST.SP.800-12r1. In the public domain.