当前位置:网站首页>Step by step how to perform data risk assessment
Step by step how to perform data risk assessment
2022-08-05 02:48:00 【software testnet】
Every business needs to protect the security and privacy of its sensitive data,以避免数据泄露、Intellectual property theft and others may result in fines、Litigation and business failure.
What is data risk assessment,为什么它很重要?
A data risk assessment is a review of how a business protects its sensitive data and what improvements might be needed.
Businesses should regularly perform data risk assessments,as a form of auditing,Can help identify information security and privacy control deficiencies and reduce risk.在数据泄露(无论是有意还是无意)之后,A data risk assessment needs to be performed,to improve control and reduce the likelihood of similar leaks in the future.
Perform data risk assessments5个步骤
The following five steps can be used to create a comprehensive data risk assessment.
(1)存储敏感数据
检查端点、云计算服务、storage media and other locations,to find and log all instances of sensitive data.The data list should include any characteristics that may affect risk requirements.例如,The geographic location where data is stored affects applicable laws and regulations.
Determine who is responsible for each instance of sensitive data,so that you can interact with them when necessary.
(2)Assign a data classification to each data instance
Organizations should define data classifications for all sensitive data,例如“受保护的健康信息”和“个人身份信息”.These definitions should indicate that for each sensitive data type,Which security and privacy controls are mandatory and recommended.
Even if the data is already classified,Also recheck regularly.The nature of data changes over time,And there may be new classifications that apply to related data.
(3)Prioritize which sensitive data to evaluate
Businesses may have large amounts of sensitive data,So much so that it is not feasible to review all the data during each assessment.如有必要,The most sensitive data needs to be prioritized、The most demanding data or the longest unassessed data.
(4)Check all relevant security and privacy controls
Auditing protects sensitive data usage、Storage and Transfer Controls.Its common audit steps include:
·Validate the principle of least privilege.Confirm that there are only necessary human and non-human users、服务、Administrators and Third Parties(For example business partners、contractors and suppliers)to access sensitive data,And they only have some necessary access rights,例如只读、读写等.
- Ensure that all policies restricting data access are actively enforced.例如,Businesses may restrict access to certain sensitive data based on the following factors:
- 用户的位置
- 数据的位置
- 其他时间
- 一周中的某一天
- The user's device type
- Make sure all other necessary security and privacy controls are in use.Common tools to reduce risk include:
- Data loss prevention software
- 防火墙
- 加密
- 多因素身份验证
- 用户和实体行为分析.Identify data retention violations.Determine if there is any data that should be destroyed to comply with the data retention policy.
(5)Document all security and privacy control deficiencies
While identifying security and privacy flaws falls within the scope of a data risk assessment,But fixing them falls outside the scope.It is reasonable for the assessment to include the following:
- The relative priority of each defect.
- A recommended course of action to address each deficiency.
These recommendations provide a roadmap for better data security.Risk matrices can be based on the severity and likelihood of occurrence of potential consequences,Help find and prioritize issues.
How to use data risk assessment results
Business leaders should develop strategies,to mitigate security and privacy flaws identified in data risk assessments,Also consider remediation recommendations and prioritize high-risk issues.
最终,The output of the data risk assessment should be the main input to the enterprise risk management and mitigation plan,Helps make smarter decisions,This helps to improve data protection.
边栏推荐
- PostgreSQL数据库 用navicat 打开表结构的时候报错 cannot update secondarysnapshot during a parallel operation 怎么解决?
- The problem of lack of dynamic library "libtinfo.so.5" in ksql application under UOS system
- VSCode Change Default Terminal 如何修改vscode的默认terminal
- [Fortune-telling-60]: "The Soldier, the Tricky Way"-2-Interpretation of Sun Tzu's Art of War
- How Jin Cang database correctness verification platform installation file
- Use @Mapper to query the partition status of oracle and report an error
- [Decryption] Can the NFTs created by OpenSea for free appear in my wallet without being chained?
- UOS系统下ksql应用缺少动态库”libtinfo.so.5“问题
- Matlab drawing 3
- 解决connect: The requested address is not valid in its context
猜你喜欢
线上MySQL的自增id用尽怎么办?
View handler 踩坑记录
dmp (dump) dump file
通过模拟Vite一起深入其工作原理
How OpenGL works
倒计时 2 天|云原生 Meetup 广州站,等你来!
剑指offer专项突击版第20天
Countdown to 2 days|Cloud native Meetup Guangzhou Station, waiting for you!
Apache DolphinScheduler, a new generation of distributed workflow task scheduling platform in practice - Medium
Matlab map with color representation module value size arrow
随机推荐
lua learning
dmp(dump)转储文件
开源协议说明LGPL
[In-depth study of 4G/5G/6G topic-51]: URLLC-16-"3GPP URLLC related protocols, specifications, and technical principles in-depth interpretation"-11-High reliability technology-2-Link adaptive enhancem
Access Characteristics of Constructor under Inheritance Relationship
Quickly learn chess from zero to one
语法基础(变量、输入输出、表达式与顺序语句)
Semi-Decentralized Federated Learning for Cooperative D2D Local Model Aggregation
通过模拟Vite一起深入其工作原理
[机缘参悟-60]:《兵者,诡道也》-2-孙子兵法解读
Access Characteristics of Constructor under Inheritance Relationship
金仓数据库如何验证安装文件平台正确性
1484. Sell Products by Date
剑指offer专项突击版第20天
OpenGL 工作原理
In 2022, you still can't "low code"?Data science can also play with Low-Code!
Matlab drawing 3
VSCode Change Default Terminal how to modify the Default Terminal VSCode
J9 Digital Currency: What is the creator economy of web3?
The pit of std::string::find return value