Skip to content Skip to footer

Source of the domain task list: (ISC)² CISSP Exam Outline. [isc2.org]

Domain 2 covers the identification, classification, handling, protection, tracking, and lifecycle management of information and assets. All responsibilities revolve around ensuring that data is properly governed at every stage from creation to destruction.


2.1 Identify and Classify Information and Assets

✔ What This Means

Organizations must understand what assets they own, including physical, digital, logical, and intangible assets. This begins with classification, which determines sensitivity, handling rules, retention, and security controls.
Source: “Identify and classify information and assets; Data classification; Asset classification.” [isc2.org]

✔ Classification

Classification levels vary by organization, but all classification schemes aim to define impact if the asset is compromised.
Examples of common classification categories:

  • Public
  • Internal
  • Confidential
  • Restricted
    (Example classification schemes provided in study resources.) [passitexams.com]

✔ Why Classification Matters

Classification informs:

  • Access control strength
  • Retention rules
  • Encryption requirements
  • Legal/regulatory handling requirements
    Source: Classification governs the handling requirements described throughout Domain 2. [isc2.org]

2.2 Establish Information and Asset Handling Requirements

Organizations must create formal handling rules for each data classification level.
Source: “Establish information and asset handling requirements.” [isc2.org]

Handling requirements include:

  • Labeling (physical/digital)
  • Access procedures
  • Transmission rules (secure email, encrypted channels)
  • Storage rules (on‑prem, cloud, encrypted, physical safes)
  • Retention and destruction requirements
    Source: Handling requirements are part of applying classification and lifecycle controls. [isc2.org]

2.3 Provision Information and Assets Securely

Provisioning ensures assets are introduced into the environment in a controlled, secure, and documented manner.
Source: “Provision information and assets securely.” [isc2.org]

✔ Asset Ownership

  • Every asset must have an assigned owner responsible for classification, policy adherence, and authorization decisions.
    Source: “Information and asset ownership.” [isc2.org]

✔ Asset Inventory

  • Organizations must maintain detailed asset inventories, covering tangible and intangible assets.
    Source: “Asset inventory (e.g., tangible, intangible).” [isc2.org]

✔ Asset Management Practices

  • Tracking assets through their lifecycle
  • Ensuring provisioning follows policy
  • Maintaining accurate system of record
    Source: “Asset management.” [isc2.org]

2.4 Manage the Data Lifecycle

Data moves through distinct phases from creation to destruction, each requiring security controls.
Source: “Manage data lifecycle.” [isc2.org]

The lifecycle activities explicitly listed in the outline:

  • Data roles: owners, controllers, custodians, processors, users/subjects. [isc2.org]
  • Data collection: understanding lawful and minimal collection. [isc2.org]
  • Data location: knowing geographical and logical data placement. [isc2.org]
  • Data maintenance: ensuring accuracy, completeness, and secure storage. [isc2.org]
  • Data retention: storing information for the correct period based on business and regulatory requirements. [isc2.org]
  • Data remanence: residual data that persists even after attempts to delete; requires sanitization methods. [isc2.org]
  • Data destruction: final stage; must follow approved destruction methods (shredding, degaussing, crypto‑shredding). [isc2.org]

2.5 Ensure Appropriate Asset Retention (End‑of‑Life / End‑of‑Support)

Retention and disposal rules apply to hardware, software, and data.
Source: “Ensure appropriate asset retention (e.g., End of Life (EOL), End of Support).” [isc2.org]

Key tasks include:

  • Identifying when an asset reaches EOL or EOS
  • Migrating data from unsupported systems
  • Ensuring secure decommissioning
  • Preventing use of unpatched, unsupported software/hardware
    Source: Explicitly included in the EOL/EOS retention requirement. [isc2.org]

2.6 Determine Data Security Controls and Compliance Requirements

Controls must be chosen based on:

  • The data state (in use, in transit, or at rest)
  • Compliance obligations
  • Risk level and classification
    Source: “Determine data security controls… Data states (e.g., in use, in transit, at rest).” [isc2.org]

✔ Scoping and Tailoring

Organizations must define which controls apply based on system boundaries and risk.
Source: “Scoping and tailoring.” [isc2.org]

✔ Standards Selection

Choosing standards for:

  • Encryption
  • Storage
  • Transmission
  • Data handling
    Source: “Standards selection.” [isc2.org]

✔ Data Protection Methods

Organizations apply technologies including:

  • DRM (Digital Rights Management) to enforce usage restrictions on documents and media
  • DLP (Data Loss Prevention) to prevent unauthorized exfiltration
  • CASB (Cloud Access Security Broker) to enforce cloud governance and data policies
    Source: “Data protection methods (e.g., DRM, DLP, CASB).” [isc2.org]