SlideShare une entreprise Scribd logo
1  sur  10
INFORMATION
CLASSIFICATION
• SMELLS LIKE A BUSINESS GLOSSARY,
• TASTES LIKE A BUSINESS GLOSSARY,
• FOR DATA SECURITY AND ASSET MANAGEMENT – THIS IS WHERE YOU START
ABOUT ME
• Contact and Summary Details
• LinkedIn: https://www.linkedin.com/in/howarddiesel-infogovernance?trk=hp-identity-
name
• Twitter: @howarddiesel
• Skype: howarddiesel
• Mail: howard@modelwaresystems.com
CLASSIFICATION: PROBLEM RECOGNITION
• TRUISM: The Requirement to protect information is required by all organizations
• PROTECT
• LOSS
• EXPOSURE
• EFFECT
• LOSS: hampers business operations
• EXPOSURE: affect reputation and advantage
• LOSS
• Complete / Destroyed
• Inability to Find
• CONSEQUENCE: Hoard & Secure Everything (Expensive & Not practical)
CLASSIFICATION: HOW IMPORTANT IS IT?
• Intellectual Property
• Privacy
• Legal Issues
• Sensitivity
CLASSIFICATION: PURPOSE
• Availability, integrity and confidentiality are provided for all identified assets
• Return on investment by implementing controls where they are needed the most
• Map data protection levels with organizational needs
• Mitigate threats of unauthorized access and disclosure
• Comply with legal and regulation requirements
CLASSIFICATION: GOALS
CLASSIFICATION: 4 HUSBANDS AND A WIFE
• WHAT
• Process of organizing data into categories for its most effective and efficient use.
• WHY
• Achieve our Classification Goals
• WHERE
• All data storage locations
• WHEN
• Entire Data Lifecycle until DISPOSED
• HOW
• Written procedures and guidelines for data classification should define what
categories and criteria the organization will use to classify data and specify the roles
and responsibilities of employees & systems within the organization regarding data
stewardship.
SYSTEM OF PROCESSES FOR CLASSIFICATION
Understand Information
• Information Types
• Identify Risks to Information
• Applicable Regulations
Create Classification System
• Classification Scheme
• Standards and Procedures
• Access to data
• Classifying Information
• Creating and Handling Classified Information
• Storing Classified Information
• Transmitting Classified Information
• Receiving Classified information from External
Parties
Implement
• Classification Policy
• Requirement for information classification
• Mandate the use of the classification system
• Highlight RACI for maintain the classification
system
• Security grading documents
• Provide more detailed level of guidance for a
specific area of data
• Classification of existing data
Educate
• Formal training
• Awareness campaigns
• Staff Induction
Maintain
• Not a discrete project
• Cycle of Continuous Improvement
CLASSIFICATION: MODEL STRUCTURE
• Content: Type of information, irrespective of format and medium. What the
information applies to. Typical derived from the related Business Subject Area
• Reg Authority: Reference to the regulatory document which specifies storage
and/or disposal requirements.
• Security Requirement
• C: contains sensitive info – handled CONFIDENTLY
• I: INTEGRITY, specifically protected against unintentional or unauthorised changes
• A: Handled especially with regard to high ACCESSIBILITY
CLASSIFICATION: MODEL STRUCTURE – CONT’D
• Preservation Period
• LEG – legal value
• ENT – Enterprise critical value
• HIST: Historical value
• Archive Index (File Plan)
REFERENCE MATERIAL
• Guidelines for Classification of Information Best Practice Document; Produced by
UNINETT led working group on Information Security
(http://services.geant.net/cbp/Knowledge_Base/Security/Documents/gn3-na3-t4-
ufs136.pdf)
• Tips for creating a data classification policy
(http://searchsecurity.techtarget.com/feature/Tips-for-creating-a-data-classification-
policy)
• Implementing information classification enterprise
(https://www.giac.org/paper/gsec/4198/implementing-information-classification-
enterprise/106714)
• Drafting data classification policies and guidelines
(http://searchfinancialsecurity.techtarget.com/news/1289406/Drafting-data-
classification-policies-and-guidelines)
• Information classification according to ISO 27001
(http://advisera.com/27001academy/blog/2014/05/12/information-classification-
according-to-iso-27001/)

Contenu connexe

Tendances

DATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWSylvain Martinez
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policycharlesgarrett
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Securitychauhankapil
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security AssessmentsTom Eston
 
Basic Concepts of information security.ppt
Basic Concepts of information security.pptBasic Concepts of information security.ppt
Basic Concepts of information security.pptZaheer720515
 
Information Security
Information SecurityInformation Security
Information Securityhaneefvf1
 
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architectureDenise Bailey
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and IntegrityZaid Shabbir
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
IT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesIT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesSlideTeam
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider ThreatPECB
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slidesNaomi Holmes
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence pptKumar Gaurav
 

Tendances (20)

DATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEW
 
Secure remote work
Secure remote workSecure remote work
Secure remote work
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
Network Security
Network SecurityNetwork Security
Network Security
 
Access Controls
Access ControlsAccess Controls
Access Controls
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Basic Concepts of information security.ppt
Basic Concepts of information security.pptBasic Concepts of information security.ppt
Basic Concepts of information security.ppt
 
Information Security
Information SecurityInformation Security
Information Security
 
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Physical security
Physical securityPhysical security
Physical security
 
IT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesIT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation Slides
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
information security
information securityinformation security
information security
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 

En vedette

Classifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoftClassifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoftDavid J Rosenthal
 
Why content model
Why content modelWhy content model
Why content modelcleveg
 
Using content types and metadata in share point intrateam24-04-2013
Using content types and metadata in share point   intrateam24-04-2013Using content types and metadata in share point   intrateam24-04-2013
Using content types and metadata in share point intrateam24-04-2013Anders Skjønaa
 
BitTorrent's Pitch Deck
BitTorrent's Pitch DeckBitTorrent's Pitch Deck
BitTorrent's Pitch DeckDigiday
 
Content Modelling Workshop (J Gollner TC World 2013)
Content Modelling Workshop (J Gollner TC World 2013)Content Modelling Workshop (J Gollner TC World 2013)
Content Modelling Workshop (J Gollner TC World 2013)Joe Gollner
 
Essential Content Types
Essential Content TypesEssential Content Types
Essential Content TypesChris Beckett
 
SharePoint 2013 Taxonomy Tour
SharePoint 2013 Taxonomy TourSharePoint 2013 Taxonomy Tour
SharePoint 2013 Taxonomy TourRegroove
 
Introduction to Content Modelling
Introduction to Content Modelling Introduction to Content Modelling
Introduction to Content Modelling PebbleRoad
 
Steps to Effective SharePoint Governance - SPFest Chicago
Steps to Effective SharePoint Governance - SPFest ChicagoSteps to Effective SharePoint Governance - SPFest Chicago
Steps to Effective SharePoint Governance - SPFest ChicagoRichard Harbridge
 
IA Summit 2013 Closing Plenary
IA Summit 2013 Closing PlenaryIA Summit 2013 Closing Plenary
IA Summit 2013 Closing PlenaryKaren McGrane
 
Establishing Content Structure & Information Governance in SharePoint
Establishing Content Structure & Information Governance in SharePointEstablishing Content Structure & Information Governance in SharePoint
Establishing Content Structure & Information Governance in SharePointNick Inglis
 
Content Networks: Slides, Video, Audio, Lists, Graphic, Social & Docs
Content Networks: Slides, Video, Audio, Lists, Graphic, Social & DocsContent Networks: Slides, Video, Audio, Lists, Graphic, Social & Docs
Content Networks: Slides, Video, Audio, Lists, Graphic, Social & DocsNick Kellet
 
Implementing a Taxonomy in a Content Management Portal
Implementing a Taxonomy in a Content Management PortalImplementing a Taxonomy in a Content Management Portal
Implementing a Taxonomy in a Content Management PortalAccess Innovations, Inc.
 
Content Architecture At Work
Content Architecture At WorkContent Architecture At Work
Content Architecture At Workcleveg
 
IMMERSE 2016 Introducing content fragments
IMMERSE 2016 Introducing content fragmentsIMMERSE 2016 Introducing content fragments
IMMERSE 2016 Introducing content fragmentsAdobeMarketingCloud
 
A Pragmatist's Guide to Designing Enterprise Content Types by Chris Beckett -...
A Pragmatist's Guide to Designing Enterprise Content Types by Chris Beckett -...A Pragmatist's Guide to Designing Enterprise Content Types by Chris Beckett -...
A Pragmatist's Guide to Designing Enterprise Content Types by Chris Beckett -...SPTechCon
 
Content Modelling Workshop Preview
Content Modelling Workshop PreviewContent Modelling Workshop Preview
Content Modelling Workshop PreviewRachel Lovinger
 
Thriving in a world of change: Future-friendly content with Drupal
Thriving in a world of change: Future-friendly content with DrupalThriving in a world of change: Future-friendly content with Drupal
Thriving in a world of change: Future-friendly content with DrupalKaren McGrane
 
Defining Content Architecture
Defining Content ArchitectureDefining Content Architecture
Defining Content Architecturecleveg
 

En vedette (20)

Classifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoftClassifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoft
 
Why content model
Why content modelWhy content model
Why content model
 
Using content types and metadata in share point intrateam24-04-2013
Using content types and metadata in share point   intrateam24-04-2013Using content types and metadata in share point   intrateam24-04-2013
Using content types and metadata in share point intrateam24-04-2013
 
Building a content strategy with content types
Building a content strategy with content typesBuilding a content strategy with content types
Building a content strategy with content types
 
BitTorrent's Pitch Deck
BitTorrent's Pitch DeckBitTorrent's Pitch Deck
BitTorrent's Pitch Deck
 
Content Modelling Workshop (J Gollner TC World 2013)
Content Modelling Workshop (J Gollner TC World 2013)Content Modelling Workshop (J Gollner TC World 2013)
Content Modelling Workshop (J Gollner TC World 2013)
 
Essential Content Types
Essential Content TypesEssential Content Types
Essential Content Types
 
SharePoint 2013 Taxonomy Tour
SharePoint 2013 Taxonomy TourSharePoint 2013 Taxonomy Tour
SharePoint 2013 Taxonomy Tour
 
Introduction to Content Modelling
Introduction to Content Modelling Introduction to Content Modelling
Introduction to Content Modelling
 
Steps to Effective SharePoint Governance - SPFest Chicago
Steps to Effective SharePoint Governance - SPFest ChicagoSteps to Effective SharePoint Governance - SPFest Chicago
Steps to Effective SharePoint Governance - SPFest Chicago
 
IA Summit 2013 Closing Plenary
IA Summit 2013 Closing PlenaryIA Summit 2013 Closing Plenary
IA Summit 2013 Closing Plenary
 
Establishing Content Structure & Information Governance in SharePoint
Establishing Content Structure & Information Governance in SharePointEstablishing Content Structure & Information Governance in SharePoint
Establishing Content Structure & Information Governance in SharePoint
 
Content Networks: Slides, Video, Audio, Lists, Graphic, Social & Docs
Content Networks: Slides, Video, Audio, Lists, Graphic, Social & DocsContent Networks: Slides, Video, Audio, Lists, Graphic, Social & Docs
Content Networks: Slides, Video, Audio, Lists, Graphic, Social & Docs
 
Implementing a Taxonomy in a Content Management Portal
Implementing a Taxonomy in a Content Management PortalImplementing a Taxonomy in a Content Management Portal
Implementing a Taxonomy in a Content Management Portal
 
Content Architecture At Work
Content Architecture At WorkContent Architecture At Work
Content Architecture At Work
 
IMMERSE 2016 Introducing content fragments
IMMERSE 2016 Introducing content fragmentsIMMERSE 2016 Introducing content fragments
IMMERSE 2016 Introducing content fragments
 
A Pragmatist's Guide to Designing Enterprise Content Types by Chris Beckett -...
A Pragmatist's Guide to Designing Enterprise Content Types by Chris Beckett -...A Pragmatist's Guide to Designing Enterprise Content Types by Chris Beckett -...
A Pragmatist's Guide to Designing Enterprise Content Types by Chris Beckett -...
 
Content Modelling Workshop Preview
Content Modelling Workshop PreviewContent Modelling Workshop Preview
Content Modelling Workshop Preview
 
Thriving in a world of change: Future-friendly content with Drupal
Thriving in a world of change: Future-friendly content with DrupalThriving in a world of change: Future-friendly content with Drupal
Thriving in a world of change: Future-friendly content with Drupal
 
Defining Content Architecture
Defining Content ArchitectureDefining Content Architecture
Defining Content Architecture
 

Similaire à Information classification

Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionNicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss PreventionNicholas Davis
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionNicholas Davis
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)Peter GEELEN ✔
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarConcept Searching, Inc
 
Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)Peter GEELEN ✔
 
Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Innovators
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to ComplianceSecurity Innovation
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsKarthikeyan Dhayalan
 
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...Cloudera, Inc.
 
Bsu skills and_careers_in_cybersecurity
Bsu skills and_careers_in_cybersecurityBsu skills and_careers_in_cybersecurity
Bsu skills and_careers_in_cybersecuritySandra (Sandy) Dunn
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesSam Bowne
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset SecurityKarthikeyan Dhayalan
 
bh-win-04-conacher.ppt
bh-win-04-conacher.pptbh-win-04-conacher.ppt
bh-win-04-conacher.pptRakesh Kumar
 
DoD Data Quality Challenges
DoD Data Quality ChallengesDoD Data Quality Challenges
DoD Data Quality ChallengesJay j
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast Logikcull.com
 
CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)Sam Bowne
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityErnest Staats
 

Similaire à Information classification (20)

Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 Webinar
 
Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)
 
Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
PPD511 Week 3 HIT Strategy and Delivery
PPD511 Week 3 HIT Strategy and DeliveryPPD511 Week 3 HIT Strategy and Delivery
PPD511 Week 3 HIT Strategy and Delivery
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
 
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
 
Bsu skills and_careers_in_cybersecurity
Bsu skills and_careers_in_cybersecurityBsu skills and_careers_in_cybersecurity
Bsu skills and_careers_in_cybersecurity
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
 
bh-win-04-conacher.ppt
bh-win-04-conacher.pptbh-win-04-conacher.ppt
bh-win-04-conacher.ppt
 
DoD Data Quality Challenges
DoD Data Quality ChallengesDoD Data Quality Challenges
DoD Data Quality Challenges
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast
 
CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 

Dernier

Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023ymrp368
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxMohammedJunaid861692
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Researchmichael115558
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...SUHANI PANDEY
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...shambhavirathore45
 

Dernier (20)

Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Research
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...
 

Information classification

  • 1. INFORMATION CLASSIFICATION • SMELLS LIKE A BUSINESS GLOSSARY, • TASTES LIKE A BUSINESS GLOSSARY, • FOR DATA SECURITY AND ASSET MANAGEMENT – THIS IS WHERE YOU START
  • 2. ABOUT ME • Contact and Summary Details • LinkedIn: https://www.linkedin.com/in/howarddiesel-infogovernance?trk=hp-identity- name • Twitter: @howarddiesel • Skype: howarddiesel • Mail: howard@modelwaresystems.com
  • 3. CLASSIFICATION: PROBLEM RECOGNITION • TRUISM: The Requirement to protect information is required by all organizations • PROTECT • LOSS • EXPOSURE • EFFECT • LOSS: hampers business operations • EXPOSURE: affect reputation and advantage • LOSS • Complete / Destroyed • Inability to Find • CONSEQUENCE: Hoard & Secure Everything (Expensive & Not practical)
  • 4. CLASSIFICATION: HOW IMPORTANT IS IT? • Intellectual Property • Privacy • Legal Issues • Sensitivity
  • 5. CLASSIFICATION: PURPOSE • Availability, integrity and confidentiality are provided for all identified assets • Return on investment by implementing controls where they are needed the most • Map data protection levels with organizational needs • Mitigate threats of unauthorized access and disclosure • Comply with legal and regulation requirements CLASSIFICATION: GOALS
  • 6. CLASSIFICATION: 4 HUSBANDS AND A WIFE • WHAT • Process of organizing data into categories for its most effective and efficient use. • WHY • Achieve our Classification Goals • WHERE • All data storage locations • WHEN • Entire Data Lifecycle until DISPOSED • HOW • Written procedures and guidelines for data classification should define what categories and criteria the organization will use to classify data and specify the roles and responsibilities of employees & systems within the organization regarding data stewardship.
  • 7. SYSTEM OF PROCESSES FOR CLASSIFICATION Understand Information • Information Types • Identify Risks to Information • Applicable Regulations Create Classification System • Classification Scheme • Standards and Procedures • Access to data • Classifying Information • Creating and Handling Classified Information • Storing Classified Information • Transmitting Classified Information • Receiving Classified information from External Parties Implement • Classification Policy • Requirement for information classification • Mandate the use of the classification system • Highlight RACI for maintain the classification system • Security grading documents • Provide more detailed level of guidance for a specific area of data • Classification of existing data Educate • Formal training • Awareness campaigns • Staff Induction Maintain • Not a discrete project • Cycle of Continuous Improvement
  • 8. CLASSIFICATION: MODEL STRUCTURE • Content: Type of information, irrespective of format and medium. What the information applies to. Typical derived from the related Business Subject Area • Reg Authority: Reference to the regulatory document which specifies storage and/or disposal requirements. • Security Requirement • C: contains sensitive info – handled CONFIDENTLY • I: INTEGRITY, specifically protected against unintentional or unauthorised changes • A: Handled especially with regard to high ACCESSIBILITY
  • 9. CLASSIFICATION: MODEL STRUCTURE – CONT’D • Preservation Period • LEG – legal value • ENT – Enterprise critical value • HIST: Historical value • Archive Index (File Plan)
  • 10. REFERENCE MATERIAL • Guidelines for Classification of Information Best Practice Document; Produced by UNINETT led working group on Information Security (http://services.geant.net/cbp/Knowledge_Base/Security/Documents/gn3-na3-t4- ufs136.pdf) • Tips for creating a data classification policy (http://searchsecurity.techtarget.com/feature/Tips-for-creating-a-data-classification- policy) • Implementing information classification enterprise (https://www.giac.org/paper/gsec/4198/implementing-information-classification- enterprise/106714) • Drafting data classification policies and guidelines (http://searchfinancialsecurity.techtarget.com/news/1289406/Drafting-data- classification-policies-and-guidelines) • Information classification according to ISO 27001 (http://advisera.com/27001academy/blog/2014/05/12/information-classification- according-to-iso-27001/)

Notes de l'éditeur

  1. We have to protect against the loss and inappropriate exposure to external parties of organizational information assets.
  2. There are myriad reasons for protecting information. Examples include1: • Intellectual Property. The compromise of this type of information could result in the loss of a competitive advantage and market share. In a recent example, InstallShield accused a rival software manufacturer of using proprietary information to design software to help customers migrate to their competing product2. • Privacy. Privacy is becoming a significant issue for all companies and increasing legislation in the area requires companies to be aware of their responsibilities for protecting this type of data. • Legal issues. Non-disclosure contracts, archive acts and requirements of taxation law are all examples of external influences on your data classification requirements. It is important that you are aware of all relevant requirements in this area prior to formulating a classification scheme. • Sensitivity. While the release of some information may not damage the company or breach privacy legislation, it may still be desirable to protect sensitive data such as the companies payroll details.
  3. Owner The organizational unit or process which holds ownership of the information Content Type of information, irrespective of format and medium. What the information applies to. Typical derived from the related Business Subject Area Regulatory Authority Reference to the regulatory document which specifies storage and/or disposal requirements. Storage Location The name of the system and/or physical archive in which the information object is located in the storage period Unrestricted data Open or Public data (still may include handling requirements Security Classification The degree of protection required for the information object. An object may contain more than one level of classification (Email) Classification Level Definition: Open Internal Sensitive Highly Sensitive   Security requirement Special security considerations based on confidentiality, integrity and/or accessibility of information objects: C – object contains sensitive information and should be handled confidently I – Integrity of information object shall be specifically protected against unintentional or conscious unauthorised changes A – object shall be handled especially with regard to high accessibility Maximum down-time Maximum acceptable time for which electronically stored information object can be inaccessible. Recommended periods are: 1 Hour 1 Day 1 Week 1 Month Preservation Period Preservation period is a criterion which specifies the relative importance the information has for the organization: LEG – legal value ENT – Enterprise Critical value HIST – Historical value Personal Data If the information object contains or may contain personal data: Personal Data (P) – data that can be associated with an individual Sensitive Personal Data (S) – data relating to racial, ethnic, political, religious Archive Index (File Plan) An archive index is a system for organizing documents based on one or more classification principles. Normally use a sorting principle based on Subject areas. The subject groups, and thereby the folders in the physical archive, are organized per the decimal system. Examples: Class 1 is Finance Main Group 13 is Accounting and Auditing Group 133 is Completed Accounts
  4. Owner The organizational unit or process which holds ownership of the information Content Type of information, irrespective of format and medium. What the information applies to. Typical derived from the related Business Subject Area Regulatory Authority Reference to the regulatory document which specifies storage and/or disposal requirements. Storage Location The name of the system and/or physical archive in which the information object is located in the storage period Unrestricted data Open or Public data (still may include handling requirements Security Classification The degree of protection required for the information object. An object may contain more than one level of classification (Email) Classification Level Definition: Open Internal Sensitive Highly Sensitive   Security requirement Special security considerations based on confidentiality, integrity and/or accessibility of information objects: C – object contains sensitive information and should be handled confidently I – Integrity of information object shall be specifically protected against unintentional or conscious unauthorised changes A – object shall be handled especially with regard to high accessibility Maximum down-time Maximum acceptable time for which electronically stored information object can be inaccessible. Recommended periods are: 1 Hour 1 Day 1 Week 1 Month Preservation Period Preservation period is a criterion which specifies the relative importance the information has for the organization: LEG – legal value ENT – Enterprise Critical value HIST – Historical value Personal Data If the information object contains or may contain personal data: Personal Data (P) – data that can be associated with an individual Sensitive Personal Data (S) – data relating to racial, ethnic, political, religious Archive Index (File Plan) An archive index is a system for organizing documents based on one or more classification principles. Normally use a sorting principle based on Subject areas. The subject groups, and thereby the folders in the physical archive, are organized per the decimal system. Examples: Class 1 is Finance Main Group 13 is Accounting and Auditing Group 133 is Completed Accounts