Solved

classifacation guide for data

Posted on 2014-10-16
4
239 Views
Last Modified: 2014-10-28
does anyone maintain a classification guide for their applications/databases? I have been looking into some best practice for security management/compliance, and it states for all apps/databases which store sensitive data you should have a "classification guide" which should

define the need to know rules and the classification level for the data with the application/database, and the relationship between those rules and the apps role definitions.

I cant find anyone who actually has a classification guide for their databases - or what one actually looks like for some guidance on how and what they actually look like.
0
Comment
Question by:pma111
  • 2
4 Comments
 
LVL 39

Accepted Solution

by:
lcohan earned 250 total points
ID: 40385039
In my opinion that's more like a custom company document rather than some template and is very much related to the level of Security your company needs to comply to - take for instance PCI compliance data security standards:

https://www.pcisecuritystandards.org/security_standards/
http://www.titus.com/GAW/GAW_CLS_DS_Top_Reasons_For_Data_Classification.php?gclid=CLLV2pXcscECFQoEaQodpocAyw
http://www.cmu.edu/iso/governance/guidelines/data-classification.html
http://www.oit.gatech.edu/sites/default/files/DSC_handbook.pdf
0
 
LVL 16

Assisted Solution

by:Wasim Akram Shaik
Wasim Akram Shaik earned 250 total points
ID: 40385977
>>does anyone maintain a classification guide for their applications/databases?
Yes. Every one does.

>>I have been looking into some best practice for security management/compliance, and it states for all apps/databases which store sensitive data you should have a "classification guide"

I agree with the expert comment above, it should be a custom policy.

Every Company has its own custom requirements when it comes to classification.

On a broad level if you are going after classification it fairly depends on the way how your company does the business.

Identify the Financial/Non-Financial Stream applications which has direct/indirect impact on your customers, company operations.

By doing this segregation you can get a fair idea of how an each application/database has to classified into.
0
 
LVL 3

Author Comment

by:pma111
ID: 40386307
can anyone provide then a sample classifacation guide for a database with various types and sensitivity of data, so I can see what exactly is involved. If "everyone does" it should be quite easy to locate a template, but I couldnt find one when looking into this, making me think perhaps "not everyone does".
0
 
LVL 39

Expert Comment

by:lcohan
ID: 40386976
That was exactly my point and as per your searches as well maybe is indeed true that "not everyone does" it however...please don't take just my word on it and wait maybe for other opinions. Mine is that you will have to start reading and do it on your own depending on your business Security requirements.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

If you are looking at this article, you have most likely been hit by some version of ransomware and are trying to find out if there is anything you can do, or what way you should react - READ ON!
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question