Sensitivity Labels in Application Control Types

Sensitivity Labels

Prev Question Next Question

Question

Sensitivity labels are an example of what application control type?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A.

Sensitivity labels are a preventive security application controls, such as are firewalls, reference monitors, traffic padding, encryption, data classification, one-time passwords, contingency planning, separation of development, application and test environments.

The incorrect answers are: Detective security controls - Intrusion detection systems (IDS), monitoring activities, and audit trails.

Compensating administrative controls - There no such application control.

Preventive accuracy controls - data checks, forms, custom screens, validity checks, contingency planning, and backups.

Sources: KRUTZ, Ronald L.

& VINES, Russel.

D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 7: Applications and Systems Development (page 264)

KRUTZ, Ronald & VINES, Russel, The CISSP Prep Guide: Gold Edition, Wiley Publishing Inc., 2003, Chapter 7: Application Controls, Figure 7.1 (page 360).

Sensitivity labels are an example of preventive security controls.

Preventive security controls aim to prevent security incidents from happening by stopping or restricting unauthorized access to resources or data. Sensitivity labels are a form of access control that can be used to classify data and resources based on their sensitivity level. This classification allows administrators to control access to the resources and data based on their sensitivity level. Sensitivity labels are typically used in environments where there are strict data protection requirements, such as government agencies, financial institutions, or healthcare organizations.

Sensitivity labels can be used to define the following access control policies:

  1. Authentication: Sensitivity labels can be used to enforce strict authentication policies that require users to provide additional proof of their identity before accessing sensitive data or resources.

  2. Authorization: Sensitivity labels can be used to enforce strict authorization policies that restrict access to sensitive data and resources to only those users who are authorized to access them.

  3. Encryption: Sensitivity labels can be used to enforce strict encryption policies that encrypt sensitive data and resources when they are in transit or at rest.

By using sensitivity labels, organizations can ensure that their sensitive data and resources are protected against unauthorized access or use, which is a key goal of preventive security controls.