Enterprise Data Strategy
IdentifySecurity Drivers
DefinePolicy & Classify
DiscoverData
AssessRisk
IdentifyControl Gaps
Strategy
Enterprise Discover Data
Enterprise App Database
BackupDisk
BackupTape
Backup
Disk Storage
Bulk Analysis ReplicatedDatabase
Disk Storage
WAN
Other Campuses & Data Centers
LAN
ExchangeServer
File Server
Portals
Disk Storage
Disk Storage
Disk StorageInternet
Disk StorageCustom App Database
End Point Network Application DB/FS Storage
Database instances
1
Replicated DB for DR, bulk analysis
2
Transformed data on file shares
9
Data stored on disks
3Tape Backups
4
Disk Backups
5
Application Data
6Transformed Data on End Points
7
Removable and Printed media
8
Transformed data emailed & on exchange srv
10
Collaboration on Portals
11Restricted DataInternal DataPublic Data
Data in transit across WANs
12
Data sent/stored on public
infrastructure
13
IdentifySecurity Drivers
DefinePolicy & Classify
DiscoverData
AssessRisk
IdentifyControl Gaps
Assessing the Risk
Enterprise App Database
BackupDisk
BackupTape
Backup
Disk Storage
Bulk Analysis ReplicatedDatabase
Disk Storage
WAN
Other Campuses & Data Centers
LAN
ExchangeServer
File Server
Portals
Disk Storage
Disk Storage
Disk StorageInternet
Disk StorageCustom App Database
End Point Network Application DB/FS Storage
Threat
X High RiskMedium RiskLow Risk
Media lost or stolen
1
Discarded media exploited
2
Packets sniffed in transit
3
Privileged User Breach DBA/FSA
4
Unintentional Distribution
6
Database/File Server Hack
5
ApplicationHack
8
(Semi)Trusted User
Misuse
9
Privileged UserBreach
7
UnintentionalDistribution
10
Physical theft of media or lost media
exploited
13
Trojans / Key Loggers
15Public Infrastructure
Access Hack
12
Packets sniffed in transit
3
End Point Leakprint-copy-xform
14
Network LeakEmail-IM-HTTP-
FTP-etc.
11Media lost or stolen
1
Discarded media exploited
2
Packets sniffed in transit
3
Privileged User Breach DBA/FSA
4
Unintentional Distribution
6
Database/File Server Hack
5
ApplicationHack
8
(Semi)Trusted User
Misuse
9
Privileged UserBreach
7
UnintentionalDistribution
10
Physical theft of media or lost media
exploited
13
Trojans / Key Loggers
15
End Point Leakprint-copy-xform
14
Public Infrastructure Access Hack
12
Packets sniffed in transit
3
Network LeakEmail-IM-HTTP-
FTP-etc.
11
IdentifySecurity Drivers
DefinePolicy & Classify
DiscoverData
AssessRisk
IdentifyControl Gaps
Secure Data Rights Management: Secure Document Sharing
Enterprise App Database
BackupDisk
BackupTape
Backup
Disk Storage
Bulk Analysis ReplicatedDatabase
Disk Storage
WAN
Other Campuses & Data Centers
LAN
ExchangeServer
File Server
Portals
Disk Storage
Disk Storage
Disk Storage
Internet
Disk StorageCustom App Database
Registers Policy& Locks Doc
DistributesDoc
InappropriateDistribution
Assigns Policy
RequestsKey
DRMPolicy Server
WAN
Other Campuses & Data Centers
X
John
Bob Charlie