Question: Are sensitive data elements identified, classified, and protected during processing, storage, and transmission?
-
Objective — Why This Matters
Protecting sensitive data — personal, financial, or proprietary — ensures regulatory compliance and trust. Data loss from unclassified or unencrypted flows leads to severe legal penalties. -
Maturity Levels (0–5)
No data classification or protection policy.
Developers decide which data to encrypt; no uniformity.
Data classification schema approved; sensitive fields tagged.
Encryption and masking consistently applied at rest and transit.
Automated discovery tools detect and classify new data flows.
Centralized DLP and key management with continuous validation.
- How to Level Up
| From → To | Actions |
|---|---|
| 0 → 1 | Identify data types and mark sensitive fields manually. |
| 1 → 2 | Approve classification schema and communicate to teams. |
| 2 → 3 | Enforce encryption (AES-256, TLS 1.3) for sensitive flows. |
| 3 → 4 | Deploy discovery tools to detect unclassified data. |
| 4 → 5 | Integrate DLP and centralized KMS for enforcement. |
-
People / Process / Technology Enablers
People – Developers, Privacy Officer, DB Admins.
Process – Data classification workflow, key rotation SOP.
Technology – Gitleaks, Trufflehog, OpenDLP, Vault KMS. -
Evidence Required
Classification matrix, encryption policy, DLP scan reports. -
Metrics / KPIs
• percentage of sensitive data encrypted at rest
• number of unclassified data stores discovered
• average time to classify new data source -
Low-Cost / Open-Source Options (MSME)
| Purpose | Tool | Notes |
|---|---|---|
| Data discovery | OpenDLP / Trufflehog | Identify sensitive data in files/code. |
| Encryption | HashiCorp Vault KMS | Centralized key storage and rotation. |
| Monitoring | Wazuh / Grafana | Alert on unencrypted or exposed assets. |
-
Common Pitfalls
Inconsistent classification; relying on database encryption only; no key rotation. -
Compliance Mapping
| Standard | Clauses / Notes |
|---|---|
| ISO 27001 | A.5.12 / A.8.10. |
| NIST CSF 2.0 | PR.DS-1 / PR.DS-3. |
| CERT-In 2022 | Encryption and privacy requirements. |
| NIRMATA Scoring | AS-Q09 ≥ Level 4 requires automated classification and DLP. |