States of Data - CompTIA Security+ SY0-701 - 3.3
Understanding Data States: At Rest, In Transit, and In Use
Data at Rest
- Data stored on devices like hard drives, SSDs, or flash drives is referred to as data at rest.
- Even unencrypted data qualifies as data at rest; however, encryption (full disk or selective) is recommended for security.
- Operating systems allow assignment of rights and permissions to control access to data at rest.
Data in Transit
- When data is transferred across networks, it is termed data in transit or data in motion.
- Unencrypted data in transit can be vulnerable to interception; thus, proper encryption methods are essential.
- Firewalls and intrusion prevention systems can help secure data in transit by filtering traffic based on established policies.
- Technologies like TLS encrypt web server communications; VPN solutions (e.g., IPsec) can secure all network traffic.
Data in Use
- Data in use refers to information actively processed by the CPU after being pulled from storage into memory.
- This type of data is typically unencrypted for operational purposes, making it a target for attackers seeking readable information.
- A notable example includes the 2013 Target Corporation breach where attackers accessed credit card information from point-of-sale terminals.
Legal Considerations: Data Sovereignty
- Organizations must navigate data sovereignty, which involves compliance with local laws governing stored information.
- Regulations like GDPR mandate that EU citizen data must be stored within the EU jurisdiction, highlighting the importance of legal awareness for global operations.
Geolocation and Access Control
- Understanding user location through geolocation technologies can inform access rights to sensitive data.