Please enable JavaScript.
Coggle requires JavaScript to display documents.
8.5.5 (4)
9.5.5
6.5 (DATA CLASSIFICATION (How data is classified? (Data…
8.5.5 (4)
9.5.5
6.5
-
-
SHADOW IT
Shadow IT is an application, tool, service or system that is used within an organization to collaborate, develop software, share content, store and manipulate data or serve any number of other purposes
WITHOUT being reviewed, tested, approved, implemented or secured by the organization’s IT and/or information security functions, in accordance with written policies and procedures.
. To manage the upside and downside of shadow IT, an organization must ,
-
-
-
-
DATA CLASSIFICATION
Creating this list is the first step in classifying assets and determining the level of protection needed for each asset.
-
Advantages
By assigning classes or levels of sensitivity and criticality to information resources and establishing specific security rules for each class
, it is possible to define the LEVEL OF ACCESS CONTROLS that should be applied to each information asset.
reduces the risk and cost of over- or under-protecting information resources in linking security to business objectives because
it helps to build and maintain a consistent perspective of the security requirements for information assets throughout the organization
INFORMATION OWNER is responsible for the information and should decide on the appropriate classification, based on the organization’s data classification and handling policy
End-user managers and security administrators can then use these classifications in their risk assessment process
to assist with determining who should be able to access what, and the most appropriate level of such access
How data is classified?
-
must consider legal, regulatory, contractual and internal requirements
for maintaining privacy, confidentiality, integrity and availability of information
-
WHY?
If documents or media are not labeled according to a classification scheme, this is an indicator of a potential misuse of information.
Users might reveal confidential information because they did not know that the requirements prohibited disclosure