Implementing a data-centric security model is a strategic shift from protecting the perimeter to protecting the data itself.
Data Inventory and Classification
- • Identify: Identify all critical and sensitive data storage locations
- • Classify: Develop and implement a classification scheme. Label data based on its value and risk (automatically or manually).
Define Access Policies
Develop detailed, restrictive access policies based on classification labels. Specify: who (users/roles), what (read, write, copy, print, forward), where (trusted networks/devices), when and how can interact with the data. The principle of least privilege is the basis.
Technology Selection and Implementation
Implement solutions that bind policies to data and enforce them regardless of location.
Integration and Audit
Integrate selected technologies with each other and with your existing IT infrastructure. Set up end-to-end auditing and monitoring of all sensitive data activities to detect anomalies and verify the effectiveness of policies.
Training and Culture
- • Train employees to: understand the classification scheme, the importance of labels, the rules for working with different classes of data and the consequences of violations.
- • Build a culture of security: Data is a key asset, and protecting it is everyone's responsibility.
Continuous Management and Adaptation
Adapt the model to changes in business, new threats and technologies. DSCM is an ongoing process.
Larry Ellison, Chairman of the Board of Directors of ORACLE