Data Handling Controls
Data classification is governed by your organization's “Data Classification Policy” also known as an “Information Security Policy”. The extent of depth and breadth of this topic can seem overwhelming. BCSF recognizes how important data classification is and also how cumbersome it can be to implement and control, and this is why we developed a guide to handling data. The Data Handling Controls provide clear and simple terms for storing and transmitting information in three tiers: Low, Medium, and High. Your organization can frame a policy and control system around this practical guide in an unusual attempt to govern from the bottom up.
Data Handling Controls
| Public / Low | Sensitive / Medium | Confidential / High |
---|---|---|---|
Non-Disclosure Agreement (NDA) | None | NDA is required prior to access by non-staff | NDA is required prior to access by staff |
Access | Access request, review, approval and termination process | • Password(s) • Access request, review, approval and termination process • Secure storage when not in use • Situational awareness for verbal communications | • Strong password(s) • Access request, review, approval and termination process • Asset Owner-approved access • Non-Disclosure Agreement (NDA) for third-parties • Immediate retrieval when printing or faxing • Secure storage when not in use • Situational awareness for verbal communications |
Cloud-based Storage (DropBox, OneDrive, Google Drive) | None | <designated system> | <designated system> |
E-Mail (with and without attachments) | None | • internal <designated system> • external <designated system> | • internal <designated system> • external <designated system> |
Encryption | None | • Encryption during transmission • Encryption for third parties | • Encryption during creation, storage, processing and transmission • Encryption for third parties |
Internal & External Network Transmission (wired & wireless) | None | • Encryption is required • Instant Messaging is prohibited • Non-IT approved FTP solutions are prohibited | • Encryption is required • Instant Messaging is prohibited • Non-IT approved FTP solutions are prohibited • Remote access should be used only when necessary and only with approved VPN and two- factor authentication solutions |
Faxing / Printing | None | Verify destination printer • Attend fax/printer while printing | Verify destination printer • Attend fax/printer while printing |
Labelling | None | None | Document watermark |
Mobile Devices (iPhone, iPad, MP3 player, USB drive, etc.) | None | Encryption is required | Encryption is required |
Monitoring | None | Auditing and Passive Monitoring | • Active/Real-time monitoring • Security monitoring and alerting • Privileged identity monitoring |
Removable Media (flash drives, jump drives, external hard drives, CD’s, DVD’s, etc.) | None | Only use IT approved solutions | Only use IT approved solutions |
Retention | None | • Backup testing and verification • Inclusion in Business Continuity and Disaster Recovery Plans | • Backup testing and verification • Inclusion in Business Continuity and Disaster Recovery Plans • Redundancy or automatic failover • Offsite backup • Secure physical storage |
Destruction | None | Approved secure destruction solutions, including shredding and secure wiping | Approved secure destruction solutions, including shredding and secure wiping |
Audit | None | Biennial controls audit | Annual controls audit |
Physical | None | • Secure courier when shipping • Media possession at all times • Mark “Open by Addressee Only” • Use “Certified Mail” and sealed, tamper- resistant envelopes for external mailings • Delivery confirmation is required | • Secure courier when shipping • Media possession at all times • Mark “Open by Addressee Only” • Use “Certified Mail” and sealed, tamper- resistant envelopes for external mailings • Delivery confirmation is required |