Data Risks in Full Disk Encryption and File Share Permissions

Data Risks in Full Disk Encryption and File Share Permissions

Prev Question Next Question

Question

A company stores highly sensitive data files used by the accounting system on a server file share.

The accounting system uses a service account named accounting-svc to access the file share.

The data is protected will a full disk encryption, and the permissions are set as follows: File system permissions: Users = Read Only Share permission: accounting-svc = Read Only Given the listed protections are in place and unchanged, to which of the following risks is the data still subject?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A.

Based on the scenario described, the highly sensitive data files stored on the server file share are protected by full disk encryption and file system permissions. The accounting system uses a service account named accounting-svc to access the file share, and the share permission is set to Read Only for this account.

A. Exploitation of local console access and removal of data This risk is mitigated by the full disk encryption that protects the data on the server. Even if an attacker gains access to the local console, they would not be able to access the data without the encryption key.

B. Theft of physical hard drives and a breach of confidentiality Full disk encryption protects against theft of physical hard drives as well. Without the encryption key, the data on the stolen drives is inaccessible.

C. Remote exfiltration of data using domain credentials The scenario does not provide information on the network security measures in place or whether the domain credentials used by the accounting-svc account are adequately protected. As a result, this risk cannot be ruled out entirely.

D. Disclosure of sensitive data to third parties due to excessive share permissions The share permission for the accounting-svc account is Read Only, which means that this account can only read data from the share but cannot write to it. Therefore, this risk is also mitigated.

In conclusion, based on the protections described in the scenario, the data is still subject to the risk of remote exfiltration of data using domain credentials, but risks of exploitation of local console access, theft of physical hard drives, and disclosure of sensitive data to third parties due to excessive share permissions are all mitigated.