3.3 Data Types and Classifications Flashcards
Regulated
Managed by a third-party
– Government laws and statutes
Trade secret
An organization’s secret formulas
– Often unique to an organization
Intellectual property
May be publicly visible
– Copyright and trademark restrictions
Legal information
Court records and documents, judge and attorney
information, etc.
– PII and other sensitive details
– Usually stored in many different systems
Financial information
Internal company financial details
– Customer financials
– Payment records
– Credit card data, bank records, etc.
Human-readable
Humans can understand the data
– Very clear and obvious
Non-human readable
Not easily understood by humans
– Encoded data
– Barcodes
– Images
Some formats are a hybrid
CSV, XML, JSON, etc.
Classifying sensitive data
Not all data has the same level of categorization
– License tag numbers vs. health records
* Different levels require different security and handling
– Additional permissions
– A different process to view
– Restricted network access
Data classifications
Proprietary
– Data that is the property of an organization
– May also include trade secrets
– Often data unique to an organization
* PII - Personally Identifiable Information
– Data that can be used to identify an individual
– Name, date of birth, mother’s maiden name,
biometric information
* PHI - Protected Health Information
– Health information associated with an individual
– Health status, health care records, payments for
health care, and much more
General Data classifications
Sensitive - Intellectual property, PII, PHI
* Confidential - Very sensitive, must be approved to view
* Public / Unclassified - No restrictions on viewing the data
* Private / Classified / Restricted
– Restricted access, may require an NDA
* Critical - Data should always be available
Data at rest
The data is on a storage device
– Hard drive, SSD, flash drive, etc.
* Encrypt the data
– Whole disk encryption
– Database encryption
– File- or folder-level encryption
* Apply permissions
– Access control lists
– Only authorized users can access the data
Data in transit
Data transmitted over the network
– Also called data in-motion
* Not much protection as it travels
– Many different switches, routers, devices
* Network-based protection
– Firewall, IPS
* Provide transport encryption
– TLS (Transport Layer Security)
– IPsec (Internet Protocol Security)
Data in use
Data is actively processing in memory
– System RAM, CPU registers and cache
* The data is almost always decrypted
– Otherwise, you couldn’t do anything with it
* The attackers can pick the decrypted information out of
RAM
– A very attractive option
* Target Corp. breach - November 2013
– 110 million credit cards
– Data in-transit encryption and data at-rest encryption
– Attackers picked the credit card numbers out of the
point-of-sale RAM
Data sovereignty
Data sovereignty
– Data that resides in a country is subject to the
laws of that country
– Legal monitoring, court orders, etc.
* Laws may prohibit where data is stored
– GDPR (General Data Protection Regulation)
– Data collected on EU citizens must be stored in the EU
– A complex mesh of technology and legalities
* Where is your data stored?
– Your compliance laws may prohibit moving data
out of the country