Data Encryption
Data Encryption
Data Encryption
1. Encryption at Rest
Use Case:
Any stored data can be classified into categories. To classify your data, you must
ask several questions as you discover and review it. Use the following sample
questions as you review each section of your data:
What types of data does the organization create when generating a new record?
How sensitive is the data using a numeric scale (e.g., 1-10, with 1 being the most
sensitive)?
Using these questions, you can loosely define categories for your data,
including:
High sensitivity: This data must be secured and monitored to protect it from
threat actors. It often falls under compliance regulations as information that
requires strict access controls that also minimize the number of users who can
access the data.
Medium sensitivity: Files and data that cannot be disclosed to the public, but a
data breach would not pose a significant risk could be considered medium risk. It
requires access controls like high-sensitivity data, but a wider range of users can
access it.
Low sensitivity: This data is typically public information that doesn’t require
much security to protect it from a data breach.
Internal-Only Data
Memos, intellectual property, and email messages are a few examples of data
that should be restricted to internal employees.
Confidential Data
The difference between internal-only data and confidential data is that
confidential data requires clearance to access it. You can assign clearance to
specific employees or authorized third-party vendors.
Restricted Data
Restricted data usually refers to government information that only authorized
individuals can access. Disclosure of restricted data may result in irrefutable
damage to corporate revenue and reputation.
DATA LOSS PREVENTION
Data loss prevention (DLP) is a set of tools and processes used to
ensure that sensitive data is not lost, misused, or accessed by
unauthorized users.
Data loss prevention (DLP) helps organizations stop data leaks and losses
by tracking data throughout the network and enforcing security policies
on that data. Security teams try to ensure that only the right people can
access the right data for the right reasons.
Human Error
Cyberattacks
Insider Threats
System Failure
Policy Enforcement
DLP administrators define rules which determine the access restrictions on
data that may be accessed, and what actions to take if restricted data is
identified.
Data Encryption
DLP solutions are capable of enforcing data encryption rules for data at
rest or in transit, proactively encrypting or removing data that violates
policy.
Incident Response
DLP typically provides tools and procedures to aid in security incident
investigations and responses, enabling security teams to swiftly respond
to breaches and minimize damage.