Printer Friendly

Should drive your security strategy: why data classification.

THERE ARE TWO types of businesses in the world today: those that run on data and those that will run on data. Data security now sits at the top of nearly every organization's priority list. But with such a high volume of data coming into most businesses every day, how can information security professionals quickly identify which data is the highest priority for protection? After all, security costs time and money, and not all types of data are as sensitive or vulnerable as others.

It is for this very reason that data discovery and classification techniques are making a significant resurgence. In fact, global analyst houses such as Forrester and Gartner have emphasized that a renewed focus on data classification is now foundational to establishing an effective data security strategy.

What Is Data Classification?

Data classification is a process of consistently categorizing data based on specific and predefined criteria so that it can be efficiently and effectively protected. In addition to simplifying security strategies, data classification can greatly assist companies in meeting governance, compliance, or regulatory mandates such as PCI DSS and GDPR, as well as protecting important intellectual property.

Here are some of the most common misperceptions around data classification:

1. It takes too long to provide value.

Automated classification drives insights from Day 1. Automation for both context and content brings order to all your sensitive data both quickly and easily. Data collection and visibility can continue until the organization is prepared to deploy and operationalize a policy, and even without a policy, insights from automated data classification can drive security improvements.

2. It is too complicated.

Many data classification projects get bogged down because of overly complex classification schemes. When it comes to classification, adding more sets often adds complexity, not quality. Start with three categories to dramatically simplify getting your program off the ground. If more schemes or sets are needed after deployment, your decision will be driven by data, not speculation.

3. It is just another layer of bureaucracy for my organization.

Data classification can be an enabler and a way to simplify data protection. By understanding what portion of your data is sensitive, the resources can be allocated appropriately. Everyone understands what needs to be protected. Sensitive and regulated data is prioritized, and public data is given lower priority--or destroyed--to eliminate future risk to its theft.

It's easier to manage the data deluge with classification. Considering how fast volumes of new data are accelerating, an information security professional responsible for protecting an organization's digital assets must take a new approach to stay ahead of the challenge. Classification enables them to avoid the inefficiency of taking a "one size fits all" approach or the risk of arbitrarily choosing what data to expend resources protecting.

How Can Businesses Implement an Effective Classification Strategy?

Every business has different data classification needs to address, so a strategy must be tailored accordingly. The following five-point action plan can be used to create the foundation of an effective strategy for nearly any business:

1. Define a data classification policy. What are the goals, objectives, and strategic intent? Each organization must clearly communicate how classification can support increased revenue, trim costs, and reduce risk to achieve buy-in from the executive leadership team. Once this has been accomplished, it is equally important to make sure users are aware of data classification policies and to ensure they understand why a program is being put in place. An effective policy must also balance the confidentiality and privacy of employees and users against the integrity and availability of the data being protected. A policy that is too stringent can alienate staff and impede their ability to carry out their jobs, but if it's too lax, the very data the business is trying to protect could be put at risk.

2. Establish the scope.

It is important to establish where the boundaries will be early on; otherwise, data classification efforts can quickly grow out of control. This is particularly important when considering partners and third parties. In setting up a scope for their data classification program, organizations must consider how far into their network they aim to reach, and whether it is even feasible. It is equally important to consider legacy and archived data. Where is this data and how will it be protected? Finally, make sure to note anything that's out of scope and ensure this is evaluated and adjusted regularly.

There are a few key questions organizations must ask as they define their "buckets" in order to help guide these efforts and get the program started:

* What are the data types (structured versus unstructured)?

* What data needs to be classified?

* Where does sensitive data live?

* What are some examples of classification levels?

* How can data be protected and which controls should be used?

* Who is accessing the data?

Organizations may need to carefully consider how they establish these buckets to weigh sensitivities around highly specified types of data, e.g.:

* Personal data and unique identifiers--includes date of birth, name and address, credit card information and health records, as well as certain online identifiers such as location data and mobile device ID

* Pseudonymous data--sensitive information that no longer allows the identification of an individual without additional information and is kept separate from it via measures such as hashing or encryption

* Genetic and biometric data--information such as fingerprints, facial recognition data, and retinal scans

* Other types of data, such as criminal records, which naturally have more impact and requirements around it

3. Discover all sensitive data defined in the scope.

Once data policy and scope have been established, the next task is to identify all the sensitive data that requires classification and protection within the business. First, understand what data it is you are looking for. This could take many forms, ranging from personally identifiable information (PII), payment card numbers, and healthcare records through to business IP, source code, proprietary formulas, etc. Next, focus on where this data is likely to be found, from endpoints and servers to on-site databases and in the cloud. Remember that discovery is not a one-time event; it should be continuously re-evaluated, taking into account data at rest, data in motion, and data in use across all business platforms.

4. Evaluate appropriate solutions

When the time comes to identify an appropriate data classification solution, there are plenty of options to choose from. Many of the best solutions today are automated, and classification can be context (e.g., file type, location) and/or content-based (e.g., fingerprint, regular expressions). This option can be expensive and may require a high degree of fine-tuning, but once up and running it is extremely fast and classification can be repeated as often as desired.

An alternative to automated solutions is a manual approach which allows users themselves to choose the classification of a file. This approach relies on a data expert to lead the classification process and can be time intensive, but in businesses where the classification process is intricate and/or subjective, a manual approach can often be preferable.

A final option is to outsource the classification process to a service provider or consulting firm. This approach is rarely the most efficient or cost-effective, but can provide a one-time classification of data and give any business a good idea of where it stands in terms of compliance and risk.

5. Ensure feedback mechanisms are in place.

The final stage is to ensure there are effective feedback mechanisms in place that allow swift reporting both up and down the business hierarchy. As part of this, data flow should be analyzed regularly to ensure classified data isn't moving in unauthorized ways or resting in places it shouldn't be. Any issues or discrepancies should be immediately flagged for follow up.

While it's tempting to think your organization has gotten along just fine without a classification strategy, taking a passive approach to the challenge is akin to saying, "I've never needed insurance in the past." It reflects a lack of understanding of the importance of classification or a misperception that it is only for more mature organizations. While businesses can protect their data without classification, it comes at the expense of efficiency.

With a strong classification strategy, organizations will be able to better understand the difference between regulated, internal-only, and public data. This insight intelligently elevates data risks based on the impact of a breach. Without classification, data protection solutions, including data loss prevention and advanced threat protection, will be prone to higher false positives and false negatives, and alerts will be of lower fidelity.

With data now playing a pivotal role in nearly every business around the world, the ability to track, classify, and protect it is no longer a luxury. An effective data classification strategy should sit as a cornerstone of any modern security initiative, allowing businesses to quickly identify which data is most valuable to the organization and ensure it is safe at all times.

By Thomas Fischer

Thomas Fischer is global security advocate at Digital Guardian.
COPYRIGHT 2017 Information Today, Inc.
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2017 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Title Annotation:APPLICATIONS
Author:Fischer, Thomas
Publication:Database Trends & Applications
Date:Jun 1, 2017
Previous Article:The companies that matter most in Data Management.
Next Article:Business Intelligence and MultiValue: a winning combination.

Terms of use | Privacy policy | Copyright © 2018 Farlex, Inc. | Feedback | For webmasters