Data classification and level can be implemented in practice

0 33
1. Basic statementData security is different from traditional security, and the...
Data classification and level can be implemented in practice

1. Basic statement

  1. Data security is different from traditional security, and the objects that need to be protected in data security are much larger than those in traditional security. Therefore, the first thing to face in the construction of data security is data classification and level. Only through data classification and level can we achieve targeted protection and provide object basis for data desensitization and encryption.
  2. This article includes the concepts, processes, precautions, and solutions of data classification and level, and introduces what needs to be done and the possible problems that may be encountered in classification and level from the shallow to the deep. It can help enterprises find a suitable solution when they are at a loss when facing data classification and level for the first time, and inform enterprises in advance of the possible problems and solutions they may encounter in the actual classification and level process.
  3. This article lists the data classification and level specifications of the automotive, financial, medical, and telecommunications industries, and all are equipped with official links, saving a lot of time in searching for classification and level reference materials.

2. Conceptual standards

  1. Classification: based on the data'sSource, content, and usageClassify data;
  2. Classification: according to the data'sValue, content sensitivity, impact, and distribution scopeDifferent levels of sensitivity classification for data
  3. Function:
    • It is convenient for enterprises to take corresponding security control measures for control
    • It can minimize the use of sensitive data, and assign designated data to designated users
    • It is convenient for enterprises to assess losses and the scope of impact when data leakage occurs
  4. Level division:
    • Top secret
    • Secret
    • Confidential
    • Privacy
    • Sensitive
    • Public
  5. Division basis:
    • Data usage
    • Data value
    • Data lifespan
    • Leakage hazards
    • Legal provisions

3. Technical process

(i) System support
  1. Article 21 of the Data Security Law of the People's Republic of China:The state establishes a data classification and level protection system, classifies and protects data according to the importance of data in economic and social development, as well as the degree of harm caused to national security, public interests, or the legitimate rights and interests of individuals and organizations once the data is tampered with, destroyed, leaked, or illegally obtained or used. The coordination mechanism for national data security work coordinates and coordinates the relevant departments to formulate an important data catalog and strengthen the protection of important data.
  2. data related to national security, the lifeline of the national economy, important people's livelihood, and major public interests belong tonational core dataimplement more stringent management systems.
  3. Each region and department shall, in accordance with the data classification and level protection system, determine the specific catalog of important data in their respective regions, departments, and related industries and fields, and give priority protection to the data listed in the catalog.
  4. important datarefers to data that, once leaked, may directly affect national security, economic security, social stability, public health and safety, such as non-public government information, large-scale population, genetic health, geography, mineral resources, and so on. Important data generally does not include information on corporate production and operation and internal management, as well as personal information
  5. Based on the law:
(2) Formulate specifications
  1. Enterprises can formulate enterprise data classification types in accordance with the aforementioned legal provisions and the characteristics of enterprise data, and can be classified according to the following references:
    image.png
  2. Enterprise classification needs to be judged by combining personal reputation influence, enterprise business influence, enterprise reputation influence, national security influence, social order influence, and public interest influence.
  3. Common considerations for data field identification, such as
    • Industry fields;
    • Business lines, business categories;
    • Business operations and activities;
    • Process links;
    • Content themes;
    • Fields related to national security, economic operation, social order, and public interest, etc.
  4. Common considerations for data group identification, such as
    • Crowds;
    • Groups, units, organizations;
    • Networks, information systems, data centers;
    • Resources, raw materials, materials;
    • Components, equipment;
    • Projects;
    • Infrastructure;
    • Groups related to national security, economic operation, social order, and public interest, etc.
  5. Common considerations for data area identification, such as
    • Administrative divisions;
    • Specific areas;
    • Geographical environment;
    • Important places;
    • Cyberspace;
    • Areas related to national security, economic operation, social order, and public interest, etc.
(3) Implement scanning
  1. Scanning generally uses two methods for scanning:
    • Regular expression matching: The most common scanning method, matching data features through writing regular expressions to achieve identification
    • Machine learning: Input standard rules and examples of enterprises, train the model through machine learning, and achieve automatic matching
  2. Scan process:
    • Enter the database connection information (generally including IP, port, database type, database account, and database password)
    • Scan and identify the database name, table name, table comments, field name, field comments
    • Extract data examples
    • Perform regular expression matching on the obtained database name, table name, table comments, field name, field comments, and data examples to achieve classification and grading.
(4) Review the results
  1. Manually review the results that have been classified and graded, mainly to determine whether the data field names and field comments correspond to the classification situation. If they correspond, it indicates that the rules are correct; if not, the matching rules need to be modified.
  2. If the enterprise initially implements data classification and grading, it needs to manually review the scan results. If the enterprise has fully optimized the scan rules after scanning, then only spot checks are needed, and a certain proportion of classification and grading results are extracted from each result table for review to judge the accuracy of the scan.
(5) Modify Matching
  1. When there is a mismatch, the classification and grading rules need to be modified.
  2. The following principles should be followed when modifying matching rules:
    • Gradual improvement: modifying rules may not be able to be perfected at one time, and continuous modification and improvement can be used to perfect the rules.
    • Targeted modification: targeted modification is made, and multiple categories are targeted for modification, which can achieve twice the result with half the effort.
(6) Rescan
  1. After the rules are modified, a rescan is required to determine whether the rules are effective and whether they are correctly matched.
  2. When rescan is performed, focus should be on the locations where errors occurred previously, and there is no need to conduct a full review again.
  3. When re-examining, if no other issues are found, the scan results can be regarded as the final scan and version management can be implemented.
(7) Result Utilization
  1. Classification and grading is not the ultimate goal, and the main considerations for the utilization of the following results are classified and graded.
    • Display of classification and grading results, showing the data types and sensitivity levels of the database data of the system.
    • Data grading control, implement hierarchical control for data of different levels, focus on monitoring databases containing core data and important data to prevent data leakage.
    • Implement hierarchical authorization control, implement different authorization control requirements for data of different sensitivity levels, and require approval from the company's leadership for core data and important data.
    • Implement data technology control, implement different desensitization, encryption and other technical controls for data of different sensitivity levels, and share core data and important data after desensitization, and implement encrypted storage.

4. Matters needing attention

  1. Even if the enterprise spends a lot of manpower and material resources to improve and modify the matching rules, it is impossible to be 100% accurate, and in fact, it is not necessary to be 100% accurate.
  2. Attention should be paid to the realization of the purpose of data classification and grading. When formulating the classification and grading plan at the beginning, the purpose of classification and grading should be considered. And keep moving towards this goal continuously, while also being targeted and grasping the main purpose to achieve classification and grading, which can save time and money for the enterprise.
  3. Version control is required for the classification and grading results of data. Since the data in the database is not static, when system iteration occurs, it is necessary to compare and differentiate the scan results of different versions.
  4. The encryption of data storage will affect the classification and grading scan results. If classification and grading as well as encryption and desensitization can be implemented on the same platform, it is the optimal solution. Not only can it compare and measure the effects of encryption and desensitization, but it can also directly use the results of classification and grading for encryption and desensitization control.
  5. Data security classification and grading should be integrated with data governance as a part of the data management process. When data field names have been standardized, the process of identifying data becomes very easy.
你可能想看:

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

As announced today, Glupteba is a multi-component botnet targeting Windows computers. Google has taken action to disrupt the operation of Glupteba, and we believe this action will have a significant i

A Brief Discussion on Data Security Governance and Hierarchical Classification Implementation

4.5 Main person in charge reviews the simulation results, sorts out the separated simulation issues, and allows the red and blue teams to improve as soon as possible. The main issues are as follows

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

Ensure that the ID can be accessed even if it is guessed or cannot be tampered with; the scenario is common in resource convenience and unauthorized vulnerability scenarios. I have found many vulnerab

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

Article 2 of the Cryptography Law clearly defines the term 'cryptography', which does not include commonly known terms such as 'bank card password', 'login password', as well as facial recognition, fi

About the related technologies and implementations associated with tracing the source of posts by PDD employees

最后修改时间:
admin
上一篇 2025年03月28日 05:19
下一篇 2025年03月28日 05:42

评论已关闭