Define and Develop a Data Classification Program
Simplify data classification for broader visibility into your security program.
- Huge volumes of data, in all different types, make data discovery a daunting task. With such backlogs of information, it can be difficult figuring out where to start classification.
- Ad hoc classification systems may lack consistency and accountability. Which formal classification system is right for you?
- End users are one of the weakest links in data security. Relying on end users to accurately classify and handle sensitive information requires significant awareness and training.
- Avoid analysis paralysis. Classifying all your data at once may not be feasible. Start small, quantify your results, report it to management, and then go back and tackle a larger portion.
- Data is dynamic. Data, by its nature, does not stay static. A piece of data’s criticality will peak, but strategic reassessment will eliminate over/under protection of data. Data classification must be a program, not a project.
- Classify what matters. Focus the program on data whose classification is measurable, auditable, and manageable.
Impact and Result
- Formalize the data classification initiative with the proper policies and handling standards, as well as a structured steering committee to ensure accountability and consistency.
- Understand where your data lives and what controls are implemented to protect the data. Make sure the protection is proportional to the sensitivity and criticality of the assets.
- Understand what tools are available to implement an efficient data classification program – whether provided from a third party or done in-house. Know how and when to revisit classifications to keep them up to date.
- Charles Tatosi Chavapi – Information Security Manager, Debswana Mining Industry
- Ken Dewitt – IT Director, Navajo County
- Jim Finlayson – IT Director, City of Grand Junction
- Lian Guan – Enterprise Information Management Advisor, Ontario Lottery and Gaming Corporation
- Diane Kelly – Information Security Manager, Colorado Judicial ITS
- Leon Letto – Senior Technical Sales Engineer, AirWatch
- Jim McGann – VP, Marketing and Business Development, Index Engines, Inc.
- William Mendez – Information System Security Officer, City of Miami
- Ian Parker – Head of Corporate System Information Security, Risk, and Compliance, Fujitsu Services
- Claudiu Popa – President & CEO, Informatica Corporation
- Doug Waram – Director of IT, County of Wellington
- Chris Whiting – Solutions Architect, APA Group
- 3 anonymous contributors
Get the Complete Storyboard
See how all the steps you need to take come together, with tools and advice to help with each task on your list.Download Now
Get to Action
Start here – read the Executive Brief
Read our concise Executive Brief to find out why you should define and develop a data classification program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.
Define the requirements
Formalize your data classification steering committee, classification scheme, and documentation.
Discover the data
Perform data discovery to understand where your most sensitive data resides.
Implement data classification
Perform data classification and draw out valuable insights to drive strategic security decisions.
Module 1: Define the Requirements
- Define and formalize the data classification program to fit your organization’s needs.
Key Benefits Achieved
- A right-sized classification program with formal documentation laying the foundation
|1.1||Assemble the Data Classification Steering Committee||
|1.2||Define the Data Classification Steering Committee Charter||
|1.3||Determine the classification scheme||
|1.4||Develop the Data Classification Policy||
|1.5||Develop the Data Classification Standard||
Module 2: Discover the Data
- To effectively mitigate risk and classify data, you must know where your data resides.
Key Benefits Achieved
- Initial insight into where your data resides
|2.1||Develop questionnaire to conduct data discovery with key data owners||
|2.2||Interview key departments / data owners||
|2.3||Identify where to prioritize classification||
|2.4||Re-evaluate policy and standard||
Module 3: Implement Data Classification
- Classify the data to inform strategic security decisions.
Key Benefits Achieved
- Development of supporting evidence regarding current state of data protection based on classification to drive future security initiatives
|3.1||Classify data in the inventory tool||
|3.2||Analyze results of the preliminary classification||
|3.3||Begin developing a data classification training and awareness program||
|3.4||Determine metrics to measure the effectiveness of the program||