The organization’s resources (hardware, devices, data, time, personnel, information, and software) shall be prioritized based on their classification, criticality, and business value.
Guidance
- Determine organization’s resources (e.g., hardware, devices, data, time, personnel, information, and software):
- What would happen to my business if these resources were made public, damaged, lost…?
- What would happen to my business when the integrity of resources is no longer guaranteed?
- What would happen to my business if I/my customers couldn’t access these resources? And rank these resources based on their classification, criticality, and business value.
- Resources should include enterprise assets.
- Create a classification for sensitive information by first determining categories, e.g.
- Public - freely accessible to all, even externally
- Internal - accessible only to members of your organization
- Confidential - accessible only to those whose duties require access.
- Communicate these categories and identify what types of data fall into these categories (HR data, financial data, legal data, personal data, etc.).
- Consider the use of the Traffic Light Protocol (TLP).
- Data classification should apply to the three aspects: C-I-A
- Consider implementing an automated tool, such as a host-based Data Loss Prevention (DLP) tool to identify all sensitive data stored, processed, or transmitted through enterprise assets, including those located onsite or at a remote service provider.
Data classification can be used to give data processors a quick view of how critical data is and how data should be processed and protected.
The data categories used and the corresponding security levels are defined. The category of information is defined by analyzing the confidentiality, integrity and availability of the information in question, as well as any other requirements. Each level is given a clear and descriptive name.
Data classifications can be, for example, the following:
CONFIDENTIAL paper information may require e.g. the following protections:
CONFIDENTIAL electronic information may require e.g. the following protections:
The dataset owners (or the owners of the related information asset, such as a data store or data system) are responsible for the classifications of the datasets and the correspondence of the classification to the definitions of the classes.
The owner updates the data classification over the life cycle of the asset according to variations in its value, sensitivity, and criticality.
An organization must classify its information assets, such as information systems, data, units, key personnel, and other assets to be protected (e.g., equipment), according to priorities. Prioritization can be done, for example, based on the requirements for confidentiality, integrity, and availability of the information being processed.
Data Loss Prevention (DLP) policies can be used to protect sensitive data from accidental or intentional disclosure. Policies can alert, for example, when they detect sensitive data (such as personal identification numbers or credit card numbers) in email or another data system to which they would not belong.
The organization defines DLP policies related to endpoints in a risk-based manner, taking into account the data classification of the processed data.
The DLP system aims to prevent the loss or leakage of sensitive data. The system can be used to prevent unwanted actions by monitoring, detecting and preventing the processing of sensitive data without meeting the desired conditions. Blocking can be done during use (in-use, terminal operations), in motion (in-transit, network traffic) or in storage locations (at-rest).
In Cyberday, all frameworks’ requirements are mapped into universal tasks, so you achieve multi-framework compliance effortlessly.