exim4:email_classification
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
exim4:email_classification [2016/11/25 11:27] – created peter | exim4:email_classification [2020/07/15 09:30] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 2: | Line 2: | ||
TODO | TODO | ||
+ | |||
+ | identify - sensitive and high-value data | ||
+ | discover - location and accessibility of sensitive data | ||
+ | classify - data according to value to the organisation | ||
+ | secure - employ security controls and protection measures | ||
+ | monitor - measure and evolve security practices | ||
+ | |||
+ | |||
+ | ===== Identify Data ===== | ||
+ | |||
+ | First, you need to build a strong foundation of knowledge around your data, to understand exactly what you hold and the potential risks to its security. | ||
+ | |||
+ | ===== Discover ===== | ||
+ | |||
+ | Unknown data makes you vulnerable to attack. | ||
+ | Cut retention costs, too, by disposing of redundant data | ||
+ | |||
+ | You need to establish: | ||
+ | |||
+ | what data you hold | ||
+ | what is being collected | ||
+ | what is being created | ||
+ | where it's stored or located | ||
+ | why you have it | ||
+ | how sensitive it is, and | ||
+ | who is accessing, using or sharing it. | ||
+ | |||
+ | Data discovery examine file stores and databases, scanning for certain types of information, | ||
+ | |||
+ | |||
+ | ===== Classify Data ===== | ||
+ | |||
+ | Data needs to be classified according to its importance or sensitivity to ensure data is appropriately controlled. | ||
+ | |||
+ | automate the process, and human input. | ||
+ | |||
+ | who should have access to each type of data. | ||
+ | |||
+ | decide how many categories you’ll have. Aim for three or four such as Confidential, | ||
+ | |||
+ | The EU General Data Protection Directive (Directive 95/46/EC) is designed to protect all personal data collected for, or about, citizens of the EU, in particular as it relates to processing, using, or exchanging data. | ||
+ | |||
+ | The US Health Insurance Portability and Accountability Act (HIPAA) is intended to improve the efficiency of the U.S. health care system by encouraging the widespread use of electronic data. | ||
+ | |||
+ | ===== Secure Data ===== | ||
+ | |||
+ | Data loss prevention (DLP) solutions. | ||
+ | |||
+ | Email gateways which will automatically encrypt any file marked ‘Confidential’. | ||
+ | |||
+ | Discovery tools – enabling employees to rapidly locate information and understand instantly how it can be used. | ||
+ | |||
+ | Security incident and event monitoring (SIEM) tools that pick up on potentially risky user behaviour before a breach occurs – flagging up, for example, if someone keeps copying sensitive documents to a storage device. | ||
+ | |||
+ | Data governance - Who is accessing sensitive information, | ||
+ | |||
+ | Data retention. | ||
+ | |||
+ | |||
+ | |||
+ | ===== Email Classification ===== | ||
To classify incoming and outgoing emails. | To classify incoming and outgoing emails. | ||
+ | |||
+ | Advanced attack defence focusing on the application content | ||
+ | |||
+ | Allow releasable data to pass from a " | ||
+ | |||
+ | Allow safe data to pass from a " | ||
ATTACHMENT INVENTORY | ATTACHMENT INVENTORY | ||
Application of a Microsoft Rights Management Service (RMS) policy or invoke S/MIME encryption and digital signing | Application of a Microsoft Rights Management Service (RMS) policy or invoke S/MIME encryption and digital signing | ||
+ | |||
+ | Apply security policy decisions before sensitive data either leaves or enters the organisation. | ||
AUDITING & REPORTING Records classification events to support audit and management reporting requirements, | AUDITING & REPORTING Records classification events to support audit and management reporting requirements, | ||
Automatically encrypt critical data automatically apply S/MIME protection according to the message classification. | Automatically encrypt critical data automatically apply S/MIME protection according to the message classification. | ||
+ | |||
+ | Block messages and attachments containing viruses and dirty words | ||
CLASSIFICATION ENFORCEMENT Option to require a user to classify each message – automating compliance with data classification and information assurance policies. | CLASSIFICATION ENFORCEMENT Option to require a user to classify each message – automating compliance with data classification and information assurance policies. | ||
Line 35: | Line 106: | ||
Where a message remains undelivered or unread after a set period of time, the message is forwarded onto a mailbox monitored 24 hours a day where action is guaranteed. Intended message recipients are sent a message explaining what has happened to the message. | Where a message remains undelivered or unread after a set period of time, the message is forwarded onto a mailbox monitored 24 hours a day where action is guaranteed. Intended message recipients are sent a message explaining what has happened to the message. | ||
- | |||
- | |||
- |
exim4/email_classification.1480073228.txt.gz · Last modified: 2020/07/15 09:30 (external edit)