SlideShare a Scribd company logo
INFORMATION
CLASSIFICATION
• SMELLS LIKE A BUSINESS GLOSSARY,
• TASTES LIKE A BUSINESS GLOSSARY,
• FOR DATA SECURITY AND ASSET MANAGEMENT – THIS IS WHERE YOU START
ABOUT ME
• Contact and Summary Details
• LinkedIn: https://www.linkedin.com/in/howarddiesel-infogovernance?trk=hp-identity-
name
• Twitter: @howarddiesel
• Skype: howarddiesel
• Mail: howard@modelwaresystems.com
CLASSIFICATION: PROBLEM RECOGNITION
• TRUISM: The Requirement to protect information is required by all organizations
• PROTECT
• LOSS
• EXPOSURE
• EFFECT
• LOSS: hampers business operations
• EXPOSURE: affect reputation and advantage
• LOSS
• Complete / Destroyed
• Inability to Find
• CONSEQUENCE: Hoard & Secure Everything (Expensive & Not practical)
CLASSIFICATION: HOW IMPORTANT IS IT?
• Intellectual Property
• Privacy
• Legal Issues
• Sensitivity
CLASSIFICATION: PURPOSE
• Availability, integrity and confidentiality are provided for all identified assets
• Return on investment by implementing controls where they are needed the most
• Map data protection levels with organizational needs
• Mitigate threats of unauthorized access and disclosure
• Comply with legal and regulation requirements
CLASSIFICATION: GOALS
CLASSIFICATION: 4 HUSBANDS AND A WIFE
• WHAT
• Process of organizing data into categories for its most effective and efficient use.
• WHY
• Achieve our Classification Goals
• WHERE
• All data storage locations
• WHEN
• Entire Data Lifecycle until DISPOSED
• HOW
• Written procedures and guidelines for data classification should define what
categories and criteria the organization will use to classify data and specify the roles
and responsibilities of employees & systems within the organization regarding data
stewardship.
SYSTEM OF PROCESSES FOR CLASSIFICATION
Understand Information
• Information Types
• Identify Risks to Information
• Applicable Regulations
Create Classification System
• Classification Scheme
• Standards and Procedures
• Access to data
• Classifying Information
• Creating and Handling Classified Information
• Storing Classified Information
• Transmitting Classified Information
• Receiving Classified information from External
Parties
Implement
• Classification Policy
• Requirement for information classification
• Mandate the use of the classification system
• Highlight RACI for maintain the classification
system
• Security grading documents
• Provide more detailed level of guidance for a
specific area of data
• Classification of existing data
Educate
• Formal training
• Awareness campaigns
• Staff Induction
Maintain
• Not a discrete project
• Cycle of Continuous Improvement
CLASSIFICATION: MODEL STRUCTURE
• Content: Type of information, irrespective of format and medium. What the
information applies to. Typical derived from the related Business Subject Area
• Reg Authority: Reference to the regulatory document which specifies storage
and/or disposal requirements.
• Security Requirement
• C: contains sensitive info – handled CONFIDENTLY
• I: INTEGRITY, specifically protected against unintentional or unauthorised changes
• A: Handled especially with regard to high ACCESSIBILITY
CLASSIFICATION: MODEL STRUCTURE – CONT’D
• Preservation Period
• LEG – legal value
• ENT – Enterprise critical value
• HIST: Historical value
• Archive Index (File Plan)
REFERENCE MATERIAL
• Guidelines for Classification of Information Best Practice Document; Produced by
UNINETT led working group on Information Security
(http://services.geant.net/cbp/Knowledge_Base/Security/Documents/gn3-na3-t4-
ufs136.pdf)
• Tips for creating a data classification policy
(http://searchsecurity.techtarget.com/feature/Tips-for-creating-a-data-classification-
policy)
• Implementing information classification enterprise
(https://www.giac.org/paper/gsec/4198/implementing-information-classification-
enterprise/106714)
• Drafting data classification policies and guidelines
(http://searchfinancialsecurity.techtarget.com/news/1289406/Drafting-data-
classification-policies-and-guidelines)
• Information classification according to ISO 27001
(http://advisera.com/27001academy/blog/2014/05/12/information-classification-
according-to-iso-27001/)

More Related Content

PPTX
Introduction to security
PPTX
Information classification
PPSX
Security policies
PPTX
An introduction to Cyber Essentials
PPTX
Information Security Awareness Training Open
PDF
Wired and Wireless Network Forensics
PDF
Privacy and Data Security
PDF
Threat Intelligence
Introduction to security
Information classification
Security policies
An introduction to Cyber Essentials
Information Security Awareness Training Open
Wired and Wireless Network Forensics
Privacy and Data Security
Threat Intelligence

What's hot (20)

PPTX
Information security
PPTX
Physical access control
PPTX
GDPR: Training Materials by Qualsys
PDF
What is Social Engineering? An illustrated presentation.
PPTX
Sensitive Data Exposure
PPTX
Digital forensic tools
PPTX
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
PDF
1. Security and Risk Management
PPTX
Chapter 11: Information Security Incident Management
PPT
Personal privacy and computer technologies
PPTX
Information Security Governance and Strategy - 3
PPTX
OSINT: Open Source Intelligence gathering
PPTX
ETHICAL HACKING.pptx
PPTX
Data protection ppt
PPTX
PDPA Compliance Preparation
PDF
Information Security Awareness Training
PPTX
Dos attack
PPTX
Incident response process
PPTX
Cybersecurity Audit
PPTX
Basics of Maltego
Information security
Physical access control
GDPR: Training Materials by Qualsys
What is Social Engineering? An illustrated presentation.
Sensitive Data Exposure
Digital forensic tools
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
1. Security and Risk Management
Chapter 11: Information Security Incident Management
Personal privacy and computer technologies
Information Security Governance and Strategy - 3
OSINT: Open Source Intelligence gathering
ETHICAL HACKING.pptx
Data protection ppt
PDPA Compliance Preparation
Information Security Awareness Training
Dos attack
Incident response process
Cybersecurity Audit
Basics of Maltego
Ad

Viewers also liked (20)

DOCX
Classifying Data to Help Secure Business Information - Template fromMicrosoft
PDF
Why content model
PPTX
Using content types and metadata in share point intrateam24-04-2013
PPTX
Building a content strategy with content types
PDF
BitTorrent's Pitch Deck
PDF
Content Modelling Workshop (J Gollner TC World 2013)
PPTX
Essential Content Types
PPTX
SharePoint 2013 Taxonomy Tour
PDF
Introduction to Content Modelling
PPTX
Steps to Effective SharePoint Governance - SPFest Chicago
PDF
IA Summit 2013 Closing Plenary
PPTX
Establishing Content Structure & Information Governance in SharePoint
PDF
Content Networks: Slides, Video, Audio, Lists, Graphic, Social & Docs
PPTX
Implementing a Taxonomy in a Content Management Portal
PDF
Content Architecture At Work
PDF
IMMERSE 2016 Introducing content fragments
PPTX
A Pragmatist's Guide to Designing Enterprise Content Types by Chris Beckett -...
PDF
Content Modelling Workshop Preview
PDF
Thriving in a world of change: Future-friendly content with Drupal
PPTX
Defining Content Architecture
Classifying Data to Help Secure Business Information - Template fromMicrosoft
Why content model
Using content types and metadata in share point intrateam24-04-2013
Building a content strategy with content types
BitTorrent's Pitch Deck
Content Modelling Workshop (J Gollner TC World 2013)
Essential Content Types
SharePoint 2013 Taxonomy Tour
Introduction to Content Modelling
Steps to Effective SharePoint Governance - SPFest Chicago
IA Summit 2013 Closing Plenary
Establishing Content Structure & Information Governance in SharePoint
Content Networks: Slides, Video, Audio, Lists, Graphic, Social & Docs
Implementing a Taxonomy in a Content Management Portal
Content Architecture At Work
IMMERSE 2016 Introducing content fragments
A Pragmatist's Guide to Designing Enterprise Content Types by Chris Beckett -...
Content Modelling Workshop Preview
Thriving in a world of change: Future-friendly content with Drupal
Defining Content Architecture
Ad

Similar to Information classification (20)

PPTX
Chapter 5: Asset Management
PPTX
CISSP Domain 02 Asset Securitycissp.pptx
PPTX
Introduction to Incident Response Management
PPTX
CYBER LAW & ETHICS (PART OF THE JNTUH SYLLABUS)
PPTX
Electronic data & record management
PDF
Data Classification Guide | Nanonets Blog.pdf
PPTX
Information Asset Classification .pptx
PDF
Notes prep guide
PPTX
L2 - Protecting Security of Assets_.pptx
PDF
Cissp Study notes.pdf
PPTX
Module 3_Lesson 7.pptx
PPTX
MIS: Information Security Management
PPTX
Information awareness program
PPTX
Data Management - NA CACS 2009
PPTX
Dynamic access control sbc12 - thuan nguyen
PPT
Testing
PPTX
Protecting the Crown Jewels – Enlist the Beefeaters
PPTX
Training Information Asset Owners
PDF
Basic of Information Security
PPTX
Training Procurement
Chapter 5: Asset Management
CISSP Domain 02 Asset Securitycissp.pptx
Introduction to Incident Response Management
CYBER LAW & ETHICS (PART OF THE JNTUH SYLLABUS)
Electronic data & record management
Data Classification Guide | Nanonets Blog.pdf
Information Asset Classification .pptx
Notes prep guide
L2 - Protecting Security of Assets_.pptx
Cissp Study notes.pdf
Module 3_Lesson 7.pptx
MIS: Information Security Management
Information awareness program
Data Management - NA CACS 2009
Dynamic access control sbc12 - thuan nguyen
Testing
Protecting the Crown Jewels – Enlist the Beefeaters
Training Information Asset Owners
Basic of Information Security
Training Procurement

More from Howard Diesel (CDMP BI, DW, DBA, Msc Elec Eng) (6)

PPTX
DAMA International DMBOK V2 - Comparison with V1
PDF
DAMA June 2017 User Group presentation on ECM
PPTX
5 Hot Trends for Data Analytics in 2017
PPTX
PPTX
PDF
Information Governance Outcomes and Benefits
DAMA International DMBOK V2 - Comparison with V1
DAMA June 2017 User Group presentation on ECM
5 Hot Trends for Data Analytics in 2017
Information Governance Outcomes and Benefits

Recently uploaded (20)

PPTX
Managing Community Partner Relationships
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
PPTX
Computer network topology notes for revision
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
PPTX
oil_refinery_comprehensive_20250804084928 (1).pptx
PDF
Introduction to the R Programming Language
PDF
Lecture1 pattern recognition............
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PPTX
Database Infoormation System (DBIS).pptx
PPT
Miokarditis (Inflamasi pada Otot Jantung)
PPTX
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PDF
Business Analytics and business intelligence.pdf
PPTX
Supervised vs unsupervised machine learning algorithms
PDF
Introduction to Data Science and Data Analysis
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
Managing Community Partner Relationships
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
Computer network topology notes for revision
climate analysis of Dhaka ,Banglades.pptx
Data_Analytics_and_PowerBI_Presentation.pptx
STUDY DESIGN details- Lt Col Maksud (21).pptx
oil_refinery_comprehensive_20250804084928 (1).pptx
Introduction to the R Programming Language
Lecture1 pattern recognition............
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
IBA_Chapter_11_Slides_Final_Accessible.pptx
Database Infoormation System (DBIS).pptx
Miokarditis (Inflamasi pada Otot Jantung)
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
Acceptance and paychological effects of mandatory extra coach I classes.pptx
Business Analytics and business intelligence.pdf
Supervised vs unsupervised machine learning algorithms
Introduction to Data Science and Data Analysis
MODULE 8 - DISASTER risk PREPAREDNESS.pptx

Information classification

  • 1. INFORMATION CLASSIFICATION • SMELLS LIKE A BUSINESS GLOSSARY, • TASTES LIKE A BUSINESS GLOSSARY, • FOR DATA SECURITY AND ASSET MANAGEMENT – THIS IS WHERE YOU START
  • 2. ABOUT ME • Contact and Summary Details • LinkedIn: https://www.linkedin.com/in/howarddiesel-infogovernance?trk=hp-identity- name • Twitter: @howarddiesel • Skype: howarddiesel • Mail: howard@modelwaresystems.com
  • 3. CLASSIFICATION: PROBLEM RECOGNITION • TRUISM: The Requirement to protect information is required by all organizations • PROTECT • LOSS • EXPOSURE • EFFECT • LOSS: hampers business operations • EXPOSURE: affect reputation and advantage • LOSS • Complete / Destroyed • Inability to Find • CONSEQUENCE: Hoard & Secure Everything (Expensive & Not practical)
  • 4. CLASSIFICATION: HOW IMPORTANT IS IT? • Intellectual Property • Privacy • Legal Issues • Sensitivity
  • 5. CLASSIFICATION: PURPOSE • Availability, integrity and confidentiality are provided for all identified assets • Return on investment by implementing controls where they are needed the most • Map data protection levels with organizational needs • Mitigate threats of unauthorized access and disclosure • Comply with legal and regulation requirements CLASSIFICATION: GOALS
  • 6. CLASSIFICATION: 4 HUSBANDS AND A WIFE • WHAT • Process of organizing data into categories for its most effective and efficient use. • WHY • Achieve our Classification Goals • WHERE • All data storage locations • WHEN • Entire Data Lifecycle until DISPOSED • HOW • Written procedures and guidelines for data classification should define what categories and criteria the organization will use to classify data and specify the roles and responsibilities of employees & systems within the organization regarding data stewardship.
  • 7. SYSTEM OF PROCESSES FOR CLASSIFICATION Understand Information • Information Types • Identify Risks to Information • Applicable Regulations Create Classification System • Classification Scheme • Standards and Procedures • Access to data • Classifying Information • Creating and Handling Classified Information • Storing Classified Information • Transmitting Classified Information • Receiving Classified information from External Parties Implement • Classification Policy • Requirement for information classification • Mandate the use of the classification system • Highlight RACI for maintain the classification system • Security grading documents • Provide more detailed level of guidance for a specific area of data • Classification of existing data Educate • Formal training • Awareness campaigns • Staff Induction Maintain • Not a discrete project • Cycle of Continuous Improvement
  • 8. CLASSIFICATION: MODEL STRUCTURE • Content: Type of information, irrespective of format and medium. What the information applies to. Typical derived from the related Business Subject Area • Reg Authority: Reference to the regulatory document which specifies storage and/or disposal requirements. • Security Requirement • C: contains sensitive info – handled CONFIDENTLY • I: INTEGRITY, specifically protected against unintentional or unauthorised changes • A: Handled especially with regard to high ACCESSIBILITY
  • 9. CLASSIFICATION: MODEL STRUCTURE – CONT’D • Preservation Period • LEG – legal value • ENT – Enterprise critical value • HIST: Historical value • Archive Index (File Plan)
  • 10. REFERENCE MATERIAL • Guidelines for Classification of Information Best Practice Document; Produced by UNINETT led working group on Information Security (http://services.geant.net/cbp/Knowledge_Base/Security/Documents/gn3-na3-t4- ufs136.pdf) • Tips for creating a data classification policy (http://searchsecurity.techtarget.com/feature/Tips-for-creating-a-data-classification- policy) • Implementing information classification enterprise (https://www.giac.org/paper/gsec/4198/implementing-information-classification- enterprise/106714) • Drafting data classification policies and guidelines (http://searchfinancialsecurity.techtarget.com/news/1289406/Drafting-data- classification-policies-and-guidelines) • Information classification according to ISO 27001 (http://advisera.com/27001academy/blog/2014/05/12/information-classification- according-to-iso-27001/)

Editor's Notes

  • #4: We have to protect against the loss and inappropriate exposure to external parties of organizational information assets.
  • #5: There are myriad reasons for protecting information. Examples include1: • Intellectual Property. The compromise of this type of information could result in the loss of a competitive advantage and market share. In a recent example, InstallShield accused a rival software manufacturer of using proprietary information to design software to help customers migrate to their competing product2. • Privacy. Privacy is becoming a significant issue for all companies and increasing legislation in the area requires companies to be aware of their responsibilities for protecting this type of data. • Legal issues. Non-disclosure contracts, archive acts and requirements of taxation law are all examples of external influences on your data classification requirements. It is important that you are aware of all relevant requirements in this area prior to formulating a classification scheme. • Sensitivity. While the release of some information may not damage the company or breach privacy legislation, it may still be desirable to protect sensitive data such as the companies payroll details.
  • #9: Owner The organizational unit or process which holds ownership of the information Content Type of information, irrespective of format and medium. What the information applies to. Typical derived from the related Business Subject Area Regulatory Authority Reference to the regulatory document which specifies storage and/or disposal requirements. Storage Location The name of the system and/or physical archive in which the information object is located in the storage period Unrestricted data Open or Public data (still may include handling requirements Security Classification The degree of protection required for the information object. An object may contain more than one level of classification (Email) Classification Level Definition: Open Internal Sensitive Highly Sensitive   Security requirement Special security considerations based on confidentiality, integrity and/or accessibility of information objects: C – object contains sensitive information and should be handled confidently I – Integrity of information object shall be specifically protected against unintentional or conscious unauthorised changes A – object shall be handled especially with regard to high accessibility Maximum down-time Maximum acceptable time for which electronically stored information object can be inaccessible. Recommended periods are: 1 Hour 1 Day 1 Week 1 Month Preservation Period Preservation period is a criterion which specifies the relative importance the information has for the organization: LEG – legal value ENT – Enterprise Critical value HIST – Historical value Personal Data If the information object contains or may contain personal data: Personal Data (P) – data that can be associated with an individual Sensitive Personal Data (S) – data relating to racial, ethnic, political, religious Archive Index (File Plan) An archive index is a system for organizing documents based on one or more classification principles. Normally use a sorting principle based on Subject areas. The subject groups, and thereby the folders in the physical archive, are organized per the decimal system. Examples: Class 1 is Finance Main Group 13 is Accounting and Auditing Group 133 is Completed Accounts
  • #10: Owner The organizational unit or process which holds ownership of the information Content Type of information, irrespective of format and medium. What the information applies to. Typical derived from the related Business Subject Area Regulatory Authority Reference to the regulatory document which specifies storage and/or disposal requirements. Storage Location The name of the system and/or physical archive in which the information object is located in the storage period Unrestricted data Open or Public data (still may include handling requirements Security Classification The degree of protection required for the information object. An object may contain more than one level of classification (Email) Classification Level Definition: Open Internal Sensitive Highly Sensitive   Security requirement Special security considerations based on confidentiality, integrity and/or accessibility of information objects: C – object contains sensitive information and should be handled confidently I – Integrity of information object shall be specifically protected against unintentional or conscious unauthorised changes A – object shall be handled especially with regard to high accessibility Maximum down-time Maximum acceptable time for which electronically stored information object can be inaccessible. Recommended periods are: 1 Hour 1 Day 1 Week 1 Month Preservation Period Preservation period is a criterion which specifies the relative importance the information has for the organization: LEG – legal value ENT – Enterprise Critical value HIST – Historical value Personal Data If the information object contains or may contain personal data: Personal Data (P) – data that can be associated with an individual Sensitive Personal Data (S) – data relating to racial, ethnic, political, religious Archive Index (File Plan) An archive index is a system for organizing documents based on one or more classification principles. Normally use a sorting principle based on Subject areas. The subject groups, and thereby the folders in the physical archive, are organized per the decimal system. Examples: Class 1 is Finance Main Group 13 is Accounting and Auditing Group 133 is Completed Accounts