4
Enterprise Data Strategy Identify Security Drivers Define Policy & Classify Discover Data Assess Risk Identify Control Gaps Strategy

Enterprise Data Strategy Identify Security Drivers Define Policy & Classify Discover Data Assess Risk Identify Control Gaps Strategy

Embed Size (px)

Citation preview

Page 1: Enterprise Data Strategy Identify Security Drivers Define Policy & Classify Discover Data Assess Risk Identify Control Gaps Strategy

Enterprise Data Strategy

IdentifySecurity Drivers

DefinePolicy & Classify

DiscoverData

AssessRisk

IdentifyControl Gaps

Strategy

Page 2: Enterprise Data Strategy Identify Security Drivers Define Policy & Classify Discover Data Assess Risk Identify Control Gaps Strategy

Enterprise Discover Data

Enterprise App Database

BackupDisk

BackupTape

Backup

Disk Storage

Bulk Analysis ReplicatedDatabase

Disk Storage

WAN

Other Campuses & Data Centers

LAN

ExchangeServer

File Server

Portals

Disk Storage

Disk Storage

Disk StorageInternet

Disk StorageCustom App Database

End Point Network Application DB/FS Storage

Database instances

1

Replicated DB for DR, bulk analysis

2

Transformed data on file shares

9

Data stored on disks

3Tape Backups

4

Disk Backups

5

Application Data

6Transformed Data on End Points

7

Removable and Printed media

8

Transformed data emailed & on exchange srv

10

Collaboration on Portals

11Restricted DataInternal DataPublic Data

Data in transit across WANs

12

Data sent/stored on public

infrastructure

13

IdentifySecurity Drivers

DefinePolicy & Classify

DiscoverData

AssessRisk

IdentifyControl Gaps

Page 3: Enterprise Data Strategy Identify Security Drivers Define Policy & Classify Discover Data Assess Risk Identify Control Gaps Strategy

Assessing the Risk

Enterprise App Database

BackupDisk

BackupTape

Backup

Disk Storage

Bulk Analysis ReplicatedDatabase

Disk Storage

WAN

Other Campuses & Data Centers

LAN

ExchangeServer

File Server

Portals

Disk Storage

Disk Storage

Disk StorageInternet

Disk StorageCustom App Database

End Point Network Application DB/FS Storage

Threat

X High RiskMedium RiskLow Risk

Media lost or stolen

1

Discarded media exploited

2

Packets sniffed in transit

3

Privileged User Breach DBA/FSA

4

Unintentional Distribution

6

Database/File Server Hack

5

ApplicationHack

8

(Semi)Trusted User

Misuse

9

Privileged UserBreach

7

UnintentionalDistribution

10

Physical theft of media or lost media

exploited

13

Trojans / Key Loggers

15Public Infrastructure

Access Hack

12

Packets sniffed in transit

3

End Point Leakprint-copy-xform

14

Network LeakEmail-IM-HTTP-

FTP-etc.

11Media lost or stolen

1

Discarded media exploited

2

Packets sniffed in transit

3

Privileged User Breach DBA/FSA

4

Unintentional Distribution

6

Database/File Server Hack

5

ApplicationHack

8

(Semi)Trusted User

Misuse

9

Privileged UserBreach

7

UnintentionalDistribution

10

Physical theft of media or lost media

exploited

13

Trojans / Key Loggers

15

End Point Leakprint-copy-xform

14

Public Infrastructure Access Hack

12

Packets sniffed in transit

3

Network LeakEmail-IM-HTTP-

FTP-etc.

11

IdentifySecurity Drivers

DefinePolicy & Classify

DiscoverData

AssessRisk

IdentifyControl Gaps

Page 4: Enterprise Data Strategy Identify Security Drivers Define Policy & Classify Discover Data Assess Risk Identify Control Gaps Strategy

Secure Data Rights Management: Secure Document Sharing

Enterprise App Database

BackupDisk

BackupTape

Backup

Disk Storage

Bulk Analysis ReplicatedDatabase

Disk Storage

WAN

Other Campuses & Data Centers

LAN

ExchangeServer

File Server

Portals

Disk Storage

Disk Storage

Disk Storage

Internet

Disk StorageCustom App Database

Registers Policy& Locks Doc

DistributesDoc

InappropriateDistribution

Assigns Policy

RequestsKey

DRMPolicy Server

WAN

Other Campuses & Data Centers

X

John

Bob Charlie