insignia One technophile's reference library
Home | Recommended | About

The data classification system is based on the principle of least privilege. This principle stipulates that accounts have the least amount of privilege required to perform their business processes, or that information is not disclosed or assessible to any person who does not have a legitimate and demonstrable business need to receive the information. This principle in combination with the measures detailed in the matrix will protect the Company and its customers’ information from unauthorized disclosure, use, modification, and deletion.

Data Classification Matrix

  Public Proprietary Confidential
Information Classification Guideline Information is not confidential and can be made public without any implications for Company. Loss of availability due to system downtime is an acceptable risk. Integrity is important but not vital. Unauthorized access could influence the Company’s operational effectiveness, cause meaningful financial loss, provide a significant gain to a competitor, or cause a substantial reduction in customer confidence. Information which by regulation or contractual obligation must be secured from unauthorized exposure or only exposed upon obtaining written authorization.








Classification of Common Data Elements – Marketing material
– Public filings
– Public web site material
– Company goals and objectives
– Macro financial data such as what is reported on our dashboard
– Organizational charts
– Protected individually identifying information
– data covered by PCI (bank account numbers, credit card numbers, etc)
– Third party data elements protected by contract terms








Access and Authentication Controls None – Information is restricted to management and authorized staff based on supervisor approval.
– Information is protected from external access.*
Information is restricted on a need-to-know basis
– Role based access control
– Systems presenting data must be password protected.
–- Formal approval by supervisor*








Security Controls None – Encryption at rest
– Systems protected from direct access by external systems via firewall*
– End-to-end encryption
– Systems protected from direct access by external systems via a firewall in the DMZ*








Transmission Controls None Data at this level that is transmitted to external parties must be encrypted* Data at this level must be encrypted (internal network or outside the Company network)*








Storage – Plain text
– Backup is recommended
– Encryption at rest at disk/media level
– Backup is required*
– Encryption at rest at disk/media and file level
Encrypted backup at off-site storage is required*
– Physical media must be reformatted before re-use*



* Applies unless there is an approved exception or a waiver has been issued.




©2018 kab | kab@bestul.us | Powered by GitHub Pages