Access "Data classification best practices: Techniques, methods and projects"
This article is part of the March 2009 issue of Top considerations for midmarket security
The process of data classification is not something that comes naturally to us. So why even bother to do it at all? Because it just makes no sense to treat all information as if it has the same security significance (or integrity significance or availability significance). Without making a conscious decision to perform different levels of control on different types of data, you inevitably either treat all data as if it were nuclear waste, carefully securing it to such a degree that nobody can get any work done, or apply no controls whatsoever, ensuring that proprietary and regulated data will get into the wrong hands. A data classification model is a mechanism to optimize the level of security effort, maintaining the maximum possible flexibility while ensuring a proportionate level of control for sensitive data. But how do we do choose a model that is practical and useful? What data classification best practices should we follow? Given that classification is a practice we borrowed directly from military organizations, it's illuminating to examine what ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Five considerations for securing a midmarket company
Smaller organizations need to be more resourceful, and we'll explain how risk management, automation and managed security services, among others, can help.
-
Choosing the right Web application firewall
by Michael Cobb, Application Security
PCI DSS is requiring companies to buy Web application firewalls. We'll show how you how to pick the WAF that's right for you, and how to use it so your company is compliant -- and more secure.
-
Cloud computing security framework may ease security concerns
The Jericho Forum is expected to release a framework of security considerations for organizations moving business to the cloud.
-
Five considerations for securing a midmarket company
-
-
How to Secure Cloud Computing
On-demand computing services can save large enterprises and small businesses a lot of money, but security and regulatory compliance become difficult.
-
How to secure use of Web 2.0
How much information is too much information, and how will you monitor and manage the use of Web 2.0 inside your organization?
-
How to Secure Cloud Computing
-
Columns
-
Cybersecurity's profile rising under Obama
The Obama Administration is conducting a review of the government's cybersecurity policies and process. We should be encouraged that security could move beyond the useless paper exercise it is today
-
Enforcing a vendor risk assessment to avoid outsourcing security risks
by David Mortman, Contributor
As enterprises outsource more services and share data, they must be vigilant about the security of third parties.
-
Data classification best practices: Techniques, methods and projects
by Jay Heiser, Contributor
Effective data classification in the enterprise requires a simple approach.
-
Cybersecurity's profile rising under Obama
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO