(7 minute read) Guest Blog
Data protection is a generic term that brings together all the measures, activities, policies, technology, and other resources used by organizations to protect their data.
Recently, data has been increasingly used to mean personal information of an individual. But there are so many other types of data that an entity would need to protect:
The universal triad used to guide information security policies is confidentiality, integrity and availability.
Data should remain confidential – only authorized individuals and parties should see or access the protected data.
Data should have integrity – the data should be accurate (information is correct and up to date), consistent (the same user account profile information across different applications) and trustworthy (e.g, changed only by reliable methods).
Data should be available – the data should be accessible and available at any time is needed.
The consequences of data breaches include direct financial loss, reputational damage, potential loss of clients and regulatory investigations and fines.
In business, doing things in a structured and organized way tends to increase efficiency and save money. Frameworks or standards are used to organize the multitude of different activities, technologies, configurations, and operations that are needed to protect the information assets and is one of the easiest ways to implement adequate and efficient measures.
Standards and frameworks are built by experts using best practice guidelines in information security and privacy compliance. They provide lists of measures, activities, operations, actions (usually called controls) which are grouped into categories for ease of reference and implementation. Examples include NIST, CIS Critical Security Controls, SOC2, PCI DSS, OECD Privacy Principles, ISO 27701 and ISO 27001.
They can be used by any entity, regardless of size, ranging from a small contractor to a large organization employing many contractors. The immediate benefit is that the controls are already listed, and the organization needs only apply the relevant ones.
The words framework and standards are used interchangeably. Some standards provide the possibility to obtain a certification (ISO) or an independent’s auditor report to show compliance with the framework/standard (SOC2).
The following scenario is built on a mix of IT practices encountered in real situations and corresponding issues. ISO 27001 is used to exemplify how a framework/standard can help avoid these issues.
Widgets Inc is a small manufacturer of widgets with around 50 employees. It uses a number of applications on Amazon Web Services (AWS) as well as on its own hardware in the basement of their office. It employs 2 full time IT staff. There are no formal IT policies and controls in place.
Issue 1: During a regular virus scan, IT noted that one of the in-house servers became infected. The IT staff took the server offline and immediately wiped it clean. The server contained a number of temp folders used by business users to store necessary business documents. The IT staff did not report the incident to management.
Issue 2: The e-commerce platform is used by the finance staff who decided to share one account as it is easier to operate. The platform offers multi-factor authentication, but the staff also decided not to enable it.
Issue 1: ISO requires procedures to guide the organization’s response to security incidents. Management reporting of all incidents is included as well as post-event analysis to determine what went wrong and fix issues.
The business users would have been spared the frustration of looking for missing documents; management could have discussed training opportunities for the IT staff on incidents handling and resolve the issue of inappropriate storing spaces.
Issue 2: Implementing the ISO controls would require setting up a process for access rights reviews to be performed periodically. Additional controls require secure log-on procedures and protection of applications in line with the sensitivity of the information processed.
An access rights review would have noted only one account being used by a team of finance users and would have raised questions around the use of a single account. The information classification controls would have identified the data on the e-commerce platform as sensitive and would have dictated heightened authentication measures, such as multi-factor authentication.
In any organization of any size, management buy-in is vital to any project undertaken by the organization.
The first step is for management to commit themselves to implementing a standard or framework within the organization.
This is an important decision and the business needs, client base, objectives, and future growth should be carefully considered.
Stay tuned for an upcoming article on choosing a standard or framework on the ComplyWorks blog.
Implementation of a standard or framework for information security and/or privacy compliance should be approached as a project involving organization resources from all levels.
ComplyWorks CMS solution can help effectively implement and maintain data protection controls in a secure way. Here’s how:
Find out more about ComplyWorks and what we do by watching our video or requesting a free demo to get started.
Privacy Consultant, YYC Privacy
Data protection is a generic term that brings together all the measures, activities, policies, technology, and other resources used by organizations to protect their data.
Recently, data has been increasingly used to mean personal information of an individual. But there are so many other types of data that an entity would need to protect:
The universal triad used to guide information security policies is confidentiality, integrity and availability.
Data should remain confidential – only authorized individuals and parties should see or access the protected data.
Data should have integrity – the data should be accurate (information is correct and up to date), consistent (the same user account profile information across different applications) and trustworthy (e.g, changed only by reliable methods).
Data should be available – the data should be accessible and available at any time is needed.
Frameworks or standards are used to organize the multitude of different activities, technologies, configurations, and operations that are needed to protect the information assets and is one of the easiest ways to implement adequate and efficient measures. Examples include NIST, CIS Critical Security Controls, SOC2, PCI DSS, OECD Privacy Principles, ISO 27701 and ISO 27001.