17.07.2015 Views

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2 – Data Classification and Rolesprior chapter there are some, such as the United States Department of Healthand Human Services' "Health Insurance Portability and Accountability Act"(HIPAA), which defines how long sensitive data is to be retained in additionto identifying its sensitivity.Disaster recovery planning is another area in which data classification can beuseful. In the event of a disaster, the ideal situation is the total recovery of allsystems, in a very short timeframe. However, depending upon the nature of thedisaster, this is not always possible and so a prioritization of system recoverymust be defined. So, for example, the data classification system may assign thefollowing priorities to the various data elements in regard to the urgency oftheir recovery:• Mission-Critical – a system that must be recovered immediately.• Intermediate – a system that is important, but not critical for the basicfunctioning of the business.• Low – a subsidiary system that is either disposable, such as atemporary database use to massage data for a special report, or onewhere limited data loss may be acceptable to the business requiring aless frequent backup schedule.Data Classification Based on Data SensitivityAs noted, we'll base our data classification purely on the different levels ofsensitivity of the data in our sample database. When defining any dataclassification system, the definitions of each class must be based uponobjective properties that are easily recognizable. The definitions of theseclasses will reflect the criteria that data must meet in order to be classified tothat level. In addition, the definition should include, in general terms, examplesof the roles that should have access to data in that class. Clear criteria should beprovided that will allow the security analyst to unambiguously recognize theclass that should be assigned to an element of data. It may be tempting tosuggest methods of mitigating risk with the class descriptions, such as "all datain this class must be encrypted", but this should be reserved for thedevelopment of data handling policies which occurs immediately following thecreation and assignment of sensitivity classes.A key aspect to the success of a data classification system, regardless of itspurpose, is simplicity. The creation of too many classes will result in a systemthat is difficult to manage and enforce. In our sample HomeLending database,a simplified scale of sensitivity classes, each presenting a progressive level of39

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!