当前位置:网站首页>Step by step how to perform data risk assessment
Step by step how to perform data risk assessment
2022-08-05 02:48:00 【software testnet】
Every business needs to protect the security and privacy of its sensitive data,以避免数据泄露、Intellectual property theft and others may result in fines、Litigation and business failure.
What is data risk assessment,为什么它很重要?
A data risk assessment is a review of how a business protects its sensitive data and what improvements might be needed.
Businesses should regularly perform data risk assessments,as a form of auditing,Can help identify information security and privacy control deficiencies and reduce risk.在数据泄露(无论是有意还是无意)之后,A data risk assessment needs to be performed,to improve control and reduce the likelihood of similar leaks in the future.
Perform data risk assessments5个步骤
The following five steps can be used to create a comprehensive data risk assessment.
(1)存储敏感数据
检查端点、云计算服务、storage media and other locations,to find and log all instances of sensitive data.The data list should include any characteristics that may affect risk requirements.例如,The geographic location where data is stored affects applicable laws and regulations.
Determine who is responsible for each instance of sensitive data,so that you can interact with them when necessary.
(2)Assign a data classification to each data instance
Organizations should define data classifications for all sensitive data,例如“受保护的健康信息”和“个人身份信息”.These definitions should indicate that for each sensitive data type,Which security and privacy controls are mandatory and recommended.
Even if the data is already classified,Also recheck regularly.The nature of data changes over time,And there may be new classifications that apply to related data.
(3)Prioritize which sensitive data to evaluate
Businesses may have large amounts of sensitive data,So much so that it is not feasible to review all the data during each assessment.如有必要,The most sensitive data needs to be prioritized、The most demanding data or the longest unassessed data.
(4)Check all relevant security and privacy controls
Auditing protects sensitive data usage、Storage and Transfer Controls.Its common audit steps include:
·Validate the principle of least privilege.Confirm that there are only necessary human and non-human users、服务、Administrators and Third Parties(For example business partners、contractors and suppliers)to access sensitive data,And they only have some necessary access rights,例如只读、读写等.
- Ensure that all policies restricting data access are actively enforced.例如,Businesses may restrict access to certain sensitive data based on the following factors:
- 用户的位置
- 数据的位置
- 其他时间
- 一周中的某一天
- The user's device type
- Make sure all other necessary security and privacy controls are in use.Common tools to reduce risk include:
- Data loss prevention software
- 防火墙
- 加密
- 多因素身份验证
- 用户和实体行为分析.Identify data retention violations.Determine if there is any data that should be destroyed to comply with the data retention policy.
(5)Document all security and privacy control deficiencies
While identifying security and privacy flaws falls within the scope of a data risk assessment,But fixing them falls outside the scope.It is reasonable for the assessment to include the following:
- The relative priority of each defect.
- A recommended course of action to address each deficiency.
These recommendations provide a roadmap for better data security.Risk matrices can be based on the severity and likelihood of occurrence of potential consequences,Help find and prioritize issues.
How to use data risk assessment results
Business leaders should develop strategies,to mitigate security and privacy flaws identified in data risk assessments,Also consider remediation recommendations and prioritize high-risk issues.
最终,The output of the data risk assessment should be the main input to the enterprise risk management and mitigation plan,Helps make smarter decisions,This helps to improve data protection.
边栏推荐
- leetcode - symmetric binary tree
- 采用redis缓存的linux主从同步服务器图片硬盘满了移到新目录要修改哪些指向
- VSCode Change Default Terminal how to modify the Default Terminal VSCode
- HDU 1114:Piggy-Bank ← 完全背包问题
- undo问题
- CPDA|How Operators Learn Data Analysis (SQL) from Negative Foundations
- mysql tree structure query problem
- How to transfer a single node of Youxuan database to a cluster
- C language diary 9 3 kinds of statements of if
- 数据增强Mixup原理与代码解读
猜你喜欢
Principle and Technology of Virtual Memory
人人都在说的数据中台,你需要关注的核心特点是什么?
[C language] Detailed explanation of stacks and queues (define, destroy, and data operations)
北斗三号短报文终端露天矿山高边坡监测方案
In 2022, you still can't "low code"?Data science can also play with Low-Code!
View handler stepping record
Is your data safe in this hyperconnected world?
Multithreading (2)
Data storage practice based on left-order traversal
C language diary 9 3 kinds of statements of if
随机推荐
2022了你还不会『低代码』?数据科学也能玩转Low-Code啦!
Error: Not a signal or slot declaration
1484. Sell Products by Date
VSCode Change Default Terminal 如何修改vscode的默认terminal
1873. 计算特殊奖金
A small tool to transfer files using QR code - QFileTrans 1.2.0.1
1527. Patients suffering from a disease
数据增强Mixup原理与代码解读
采用redis缓存的linux主从同步服务器图片硬盘满了移到新目录要修改哪些指向
注意潍坊开具发票一般需要注意
Programmer's Tanabata Romantic Moment
链表的简单描述及代码的简单实现
使用二维码传输文件的小工具 - QFileTrans 1.2.0.1
Matlab drawing 3
[深入研究4G/5G/6G专题-51]: URLLC-16-《3GPP URLLC相关协议、规范、技术原理深度解读》-11-高可靠性技术-2-链路自适应增强(根据无线链路状态动态选择高可靠性MCS)
2022-08-04:输入:去重数组arr,里面的数只包含0~9。limit,一个数字。 返回:要求比limit小的情况下,能够用arr拼出来的最大数字。 来自字节。
dmp (dump) dump file
Is your data safe in this hyperconnected world?
Multithreading (2)
C student management system head to add a student node