Always Learning

Security-X Security Architecture

CompTIA SecurityX

Security Architecture 2.0

Resilient System Design

Security Devices

Hardware or Software tools designed to protect networks and data

Monitoring and Dectection devices


Security Architecture

Categories: - Public - Internal - Confidential - Restricted - Data Labeling and Tagging Assigning markers to data to indicate its classification, sensitivity, or handling requirements Can be applied automatically or manually depending how the systems are configured. - Dirty words (Keywords found in data relating to a specific classification , like an email with certain keywords.) - Manual labeling User creates the data and adds a text-based classification label on their own Declassification - Frees up resources - Data tags - Can be used to provide additional detail on how data should be protected. - PII (Personal Identifiable Information) - SPI (Sensitive Personal Information) - PHI (Personal Health Information) - Financial or restricted data - Data format - Structured (Predefined models, i.e. CSV, JSON) - Un-structured (Not organized by a model at all, includes PPT, word docs, emails, text files, chat logs) - Data Loss Prevention Used to detect, prevent and respond to unauthorized access, transmission, or use of sensitive data Three components: - Policy server Configures rule sets that classify data based on its confidentiality, privacy or sensitivity level - Endpoint agent Enforces rules on individual client devices, even when disconnected from the corporate network. - Network agent Can identify structured and un-structured data formats and enforce DLP policies based on predefined rules - Data discovery Involves recognizing and labeling sensitive information based on predefined rules.

When a DLP system detects a rule violation - Alert System logs the incident and notifies admin but still allows the data to be transmitted. - Block Actively stops the data transfer, such as preventing a user from copying a file to an external device. - Quarantine Conducts both alert and block mode, as well as removing user access to the data entirely. - Tombstone Takes alert, block and quarantine actions and replaces the original file with a message indicating a policy violation


Security in Systems