Data Classification
Data Classification
com /learn/data-security/data-classification/
Data Classification
Blog: Top Challenges to Implementing Data Privacy: Nailing Down Discovery and Classification First is
Key.
1/4
If a database, file, or other data resource includes data that can be classified at two different levels, it’s
best to classify all the data at the higher level.
Data states—data exists in one of three states—at rest, in process, or in transit. Regardless of
state, data classified as confidential must remain confidential.
Data format—data can be either structured or unstructured. Structured data are usually human
readable and can be indexed. Examples of structured data are database objects and spreadsheets.
Unstructured data are usually not human readable or indexable. Examples of unstructured data are
source code, documents, and binaries. Classifying structured data is less complex and time-
consuming than classifying unstructured data.
Blog: How Organizations Manage to Understand Millions of Unstructured Data Files at Scale.
Data Discovery
Classifying data requires knowing the location, volume, and context of data. Most modern businesses
store large volumes of data, which may be spread across multiple repositories:
Before you can perform data classification, you must perform accurate and comprehensive data
discovery. Automated tools can help discover sensitive data at large scale. See our article on Data
Discovery for more information.
2/4
The Relation Between Data Classification and Compliance
Data classification must comply with relevant regulatory and industry-specific mandates, which may
require classification of different data attributes. For example, the Cloud Security Alliance (CSA) requires
that data and data objects must include data type, jurisdiction of origin and domicile, context, legal
constraints, sensitivity, etc. PCI DSS does not require origin or domicile tags.
Data classification can be the responsibility of the information creators, subject matter experts, or those
responsible for the correctness of the data.
The policy also determines the data classification process: how often data classification should take
place, for which data, which type of data classification is suitable for different types of data, and what
technical means should be used to classify data. The data classification policy is part of the overall
information security policy, which specifies how to protect sensitive data.
Sensitivity
Examples
Level
Credit card numbers (PCI) or other financial account numbers, customer personal
data, FISMA protected information, privileged credentials for IT systems, protected
High
health information (HIPAA), Social Security numbers, intellectual property, employee
records.
Supplier contracts, IT service management information, student education records
Medium (FERPA), telecommunication systems information, internal correspondence not
including confidential data.
Low Content of public websites, press releases, marketing materials, employee directory.
See how Imperva Data Security Solutions can help you with data classification.
3/4
Request demo Learn more
In addition to data classification, Imperva protects your data wherever it lives—on premises, in the cloud
and in hybrid environments. It also provides security and IT teams with full visibility into how the data is
being accessed, used, and moved around the organization.
Database firewall—blocks SQL injection and other threats, while evaluating for known
vulnerabilities.
User rights management—monitors data access and activities of privileged users to identify
excessive, inappropriate, and unused privileges.
Data masking and encryption—obfuscates sensitive data so it would be useless to the bad actor,
even if somehow extracted.
Data loss prevention (DLP)—inspects data in motion, at rest on servers, in cloud storage, or on
endpoint devices.
User behavior analytics—establishes baselines of data access behavior, uses machine learning
to detect and alert on abnormal and potentially risky activity.
Data discovery and classification—reveals the location, volume, and context of data on premises
and in the cloud.
Database activity monitoring—monitors relational databases, data warehouses, big data and
mainframes to generate real-time alerts on policy violations.
Alert prioritization—Imperva uses AI and machine learning technology to look across the stream
of security events and prioritize the ones that matter most.
4/4