Solved

classifacation guide for data

Posted on 2014-10-16
4
260 Views
Last Modified: 2014-10-28
does anyone maintain a classification guide for their applications/databases? I have been looking into some best practice for security management/compliance, and it states for all apps/databases which store sensitive data you should have a "classification guide" which should

define the need to know rules and the classification level for the data with the application/database, and the relationship between those rules and the apps role definitions.

I cant find anyone who actually has a classification guide for their databases - or what one actually looks like for some guidance on how and what they actually look like.
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 40

Accepted Solution

by:
lcohan earned 250 total points
ID: 40385039
In my opinion that's more like a custom company document rather than some template and is very much related to the level of Security your company needs to comply to - take for instance PCI compliance data security standards:

https://www.pcisecuritystandards.org/security_standards/
http://www.titus.com/GAW/GAW_CLS_DS_Top_Reasons_For_Data_Classification.php?gclid=CLLV2pXcscECFQoEaQodpocAyw
http://www.cmu.edu/iso/governance/guidelines/data-classification.html
http://www.oit.gatech.edu/sites/default/files/DSC_handbook.pdf
0
 
LVL 16

Assisted Solution

by:Wasim Akram Shaik
Wasim Akram Shaik earned 250 total points
ID: 40385977
>>does anyone maintain a classification guide for their applications/databases?
Yes. Every one does.

>>I have been looking into some best practice for security management/compliance, and it states for all apps/databases which store sensitive data you should have a "classification guide"

I agree with the expert comment above, it should be a custom policy.

Every Company has its own custom requirements when it comes to classification.

On a broad level if you are going after classification it fairly depends on the way how your company does the business.

Identify the Financial/Non-Financial Stream applications which has direct/indirect impact on your customers, company operations.

By doing this segregation you can get a fair idea of how an each application/database has to classified into.
0
 
LVL 3

Author Comment

by:pma111
ID: 40386307
can anyone provide then a sample classifacation guide for a database with various types and sensitivity of data, so I can see what exactly is involved. If "everyone does" it should be quite easy to locate a template, but I couldnt find one when looking into this, making me think perhaps "not everyone does".
0
 
LVL 40

Expert Comment

by:lcohan
ID: 40386976
That was exactly my point and as per your searches as well maybe is indeed true that "not everyone does" it however...please don't take just my word on it and wait maybe for other opinions. Mine is that you will have to start reading and do it on your own depending on your business Security requirements.
0

Featured Post

Webinar: Choosing a MySQL HA Solution

Join Percona’s Principal Technical Services Engineer, Marcos Albe as he presents Choosing a MySQL High Availability Solution on Thursday, June 29, 2017 at 10:00 am PDT / 2:00 pm EDT (UTC-7).

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Here's a look at newsworthy articles and community happenings during the last month.
Recovering from what the press called "the largest-ever cyber-attack", IT departments worldwide are discussing ways to defend against this in the future. In this process, many people are looking for immediate actions while, instead, they need to tho…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…

689 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question