Abstract
This article explores the creation of a data classification policy in line with SOC2 Type 2 compliance requirements. SOC2 Type 2 is a notable certification that attests to an organization's ability to adhere to the Trust Services Criteria including security availability processing integrity confidentiality and privacy. The initial and crucial step in formulating a solid data security strategy is data classification which helps organizations recognize their data and assign a sensitivity level guiding the appropriate security measures. Data classification aims to organize and manage data in a manner that enhances its protection and aligns with the organization's overall data security strategy. In the data classification process data security has a central role as it directly impacts the protection and management of classified data. The design of a data classification policy for SOC2 Type 2 compliance presents several challenges and considerations. Organizations must understand the scope of their data align with the Trust Services Criteria balance security with usability provide training and awareness conduct regular updates and reviews define classification levels ensure consistency automate classification integrate with other policies and controls handle third-party vendors monitor and enforce and comply with legal and regulatory requirements. Keywords: SOC2 Type 2 storage standards data classification data storage data security.
Publisher
Lviv Polytechnic National University
Reference25 articles.
1. B. Matturdi, X. Zhou, S. Li and F. Lin, "Big Data security and privacy: A review," in China Communications, vol. 11, no. 14, pp. 135-145, 2014, doi: 10.1109/CC.2014.7085614.
2. Susukailo, V., Opirskyy, I., Vasylyshyn, S. Analysis of the attack vectors used by threat actors during the pandemic // 2020 IEEE 15th International Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT 2020 - Proceedings, 2020, 2, pp. 261–264, 9321897. DOI: 10.1109/CSIT49958.2020.9321897.
3. Islam MN, Zaki T, Uddin MS, Hasan MM. Security threats for big data: An empirical study. Int J Inf Commun Technol Human Dev (IJICTHD). 2018;10(4): pp. 1–18. DOI:10.4018/IJICTHD.2018100101
4. A. Singh, A. Kumar, S. Namasudra: DNACDS: Cloud IoE big data security and accessing scheme based on DNA cryptography. Frontiers Comput. Sci. 18(1): 181801 (2024) DOI: 10.1007/s11704-022-2193-3.
5. O.I. Harasymchuk, Yu.M. Kostiv, V.M. Maksymovych, M.M. Mandrona. Generator of pseudorandom bit sequence with increased cryptographic security. Metallurgical and Mining Industry: scientific and technical jornal – Dnipropetrovsk. – 2014. – No. 5. – pр. 25-29. Available at: https://www.metaljournal.com.ua/assets/Journal/6-KostivY.pdf (Accessed: 15 March 2024).