4 hours 25 minutes
Hi. Welcome to module to lessen six. And all of the previous lessons in this module have been talking about all the different layers getting all the way down closer and closer to the data layer and finally in less and six were at the data layer.
This is a layer where everything exists that were actually trying to protect This is the actual data were trying to protect. We've been talking a lot about all of the different components that we can put it different layers to slow Attackers down as they're trying to get access to our data. And now we'll talk about some of the controls that we can put in place directly against that data itself.
The first thing we can dio is we can establish a data classification scheme we need to identify what are critical data even is
data classification is just simply creating a category set of categories for that data and putting them into ah, hierarchical format so that we know which data is more important than other data.
Classifications should be marked. There's a lot of ways you can mark classifications within the data. Let's say we're talking about the concept of, ah, word document a text, a text file, some sort of word processing document. You can
mark that data in the metadata itself of the documents. So behind the scenes you can tag that data with metadata and tag that document with metadata.
And then you can have tools that can read that metadata tag. Or you can put tags directly in the in the document itself. Maybe you create ah, custom header or footer, and you create a process in your organization that says, every document that gets created in this organization has toe have this particular header. And in that header
is a key word. You know, it's one of your classifications Now you can take your tools once you've done that, and you can point them
at this data and they can start to sort some of it and understand what the more critical data is and what it's not.
But in some way, shape or form, you need to mark that data once you start to put classifications in place so that your tools could know what to do with it.
And just like everything else, this data classification is gonna need some periodic tuning when you create the classification to begin with, maybe down the road there's some new set of data that you didn't have a classification for. When you built it. You may need to add another classification. Oftentimes, data
is very, very restricted at first. In an overtime,
the public starts to find out about it, and it becomes less restricted data so you can move that down down the classification ranks.
But it's important that you at least review it periodically to make sure that your classifications structure still makes sense for your business.
Some common examples of data classification. First out you don't want O make sure I generate that classification.
We're not gonna ever protect every piece of data. Nor should we. Classifications gives us that way to determine. Okay, which data do we even care about protecting? In which data should we put more controls around the higher up the classification chain you go? The less people that should have access to that data and the more security controls and monitoring
it should be in place to protect that particular data.
So one classic example. So in the D. O. D. Or military space might be unclassified confidential, secret and top secret
in the civilian world. In the public space, you may have public, internal, confidential and restricted in this case, maybe public data. That's marketing material. Let's data for everybody to know Internal data might be just internal communications. You know, maybe there's an all hands meeting coming up, and the CEO wants toe
tell the company something and that might be classified as internal communications.
Maybe you're a managed service provider and you actually hold customer data that could be considered confidential data. And then maybe you're developing new technology. That's gonna have a huge impact on the world that it's gonna become intellectual property that might be in that restricted category. We're only just a certain handful of people should even know about it.
That wraps up our lesson on data classification. Next up, we're going to go toe lesson 262 or we're gonna talk about DLP
ISACA CISM - Certified Information Security Manager
The ISACA Certified Information Security Manager (CISM) practice test from CyberVista helps students to prepare ...
The CompTIA Security+ SY0-501 certification course helps you develop your competency in topics such as ...
46 CEU/CPE Hours Available
Certificate of Completion Offered