Data Classification Can Boost Risk Management

  /     /     /  
Publicated : 22/11/2024   Category : security


Data Classification Can Boost Risk Management


The trouble is that organizations must execute on classification and retention policies to gain benefits



The effectiveness of data classification and retention policies can have strong ripple effects across an organizations entire IT risk management framework. After all, how data is classified can determine what risk management priorities are placed on it, and the less data that is retained long-term, the less volume the organization has to sift through to determine appropriate protection levels.
Risk management practices should be based on data or system classification. System classification is simply the high water mark of data stored, processed, or transmitted on the system, says Doug Landoll, CEO of Assero Security. The required security controls for a system are based on the system classification. Risk management, as one of those controls, would be based on this as well.
Survey data released this week by IT risk management consultancy Protiviti suggests that many IT leaders at large organizations do understand the implicit importance of solid data classification and retention practices. Among a pool of more than 200 IT decision makers, 72 percent reported that they have a data classification policy in place to categorize their organizations information. But at the same time, these same organizations are having a hard time making good on those policies because the practices necessary to execute on written policies still lag. Approximately 63 percent reported having an actual data classification scheme in place. And far fewer organizations -- only about 19 percent -- reported that they have a detailed classification system to define data that determines how they retain or destroy it at specific dates.
[How have attackers managed to break AV with a glut of malware? See
10 Ways Attackers Automate Malware Production
.]
I think it is really hard to move from policy to action, says Charly Paelinck, senior vice president and CTO for Caesars Entertainment, of this disparity in the classification and retention world. Weve been building our policies, weve bought some tools, including DLP [and] archiving tools. But, first of all, discovering where all the different things are and then getting agreement to get rid of data has been pretty challenging for a large corporation like ours thats distributed.
As difficult as it can be, organizations that want to improve their risk management decision making should remain cognizant of how important classification is to the process of planning for better security on a budget.
This ability to use data classification to stratify how you apply security to different types of data is not just a great thing from a security perspective, but also from an economical one, says Cal Slemp, managing director for Protiviti.
One of the difficulties that many IT organizations are running into as they try to put their classification policies into action is that they are doing so in isolation. If classifications are what risk management decisions will be built on, then line-of-business participation should be mandatory, says Paul Borchardt, vice president of client success for risk management vendor Vigilant, who explains that data owners should review and approve assigned classification levels with the understanding of what that will mean for how that data will be controlled.
Approval should also be sought from legal, compliance, and risk management teams, Borchardt says. Some regulations require board approval of data classification results and include this step as part of an annual recertification during the Information Security Steering Committee.
This is why it is crucial that classification be elevated in the eyes of senior management. According to Paelinck, many organizations, like his, face a similar struggle with leadership that they did back in the early days of disaster recovery.
Theres a parallel to the struggle that a lot of IT organizations went through with disaster recovery, [which is] if you cant get a definitive statement from senior management on what is critical with disaster recovery, IT is left in the position of creating a backup plan that is much more expensive than it needs to be, he says. I think we have the same issue with sensitive data. If we dont clearly define what is sensitive and what is not, IT is left in the position of trying to guard everything.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Data Classification Can Boost Risk Management