Page 37 - CISSO_Prep_ Guide
P. 37

percentage of data contamination comes from invalid input, the
            first step to protecting the integrity of the data in our systems
            and the integrity of the processes that manage the data is to
            enforce checks and validation of data being input to the system.
            Input data may originate from users, customers, or other
            processes. The general rule is to trust nothing! Validate all input
            data to ensure it is consistent with the rules - within acceptable
            limits, values (alphabetic or numeric, special characters, or
            symbols). This will be the first line of defense against integrity
            problems.

            The next step is to ensure that the processing of the data is
            correct - the right account is updated with the right amount!
            Arithmetic operations and calculations have to be checked to
            ensure completeness (no transactions were missed), correct
            addition, rounding, and storage.

            Log the transaction in case a follow-up is needed - who made
            the change, what change was made, and when the change was
            made, sometimes even where the change was made from. The
            logs should also be protected so that a user is not able to hide or
            delete their activity. While processing data, the memory areas
            allocated to the process need to be re-initialized before re-use to
            prevent data contamination or disclosure.

            The integrity of data may also be compromised during the
            output process if the data is not displayed correctly - the output
            field is too small, or the last transaction is not written to a file or
            report.

            Several sources also advocate the inclusion of another part to the
            information security triad - the aspect of non-repudiation. To
   32   33   34   35   36   37   38   39   40   41   42