Estimated time: 45 min
Justification
The main idea in this activity is to understand where the information lies, through which channels the information is transmitted, also to discuss the levels of security provided by these channels, and to associate data objects mapped in the previous activity in order to define key factors towards the construction of a data retention policy.
Input data
- Matrix of possible consequences.
- Data map depicting impact due to associated violations.
Products
Direct
- Data map listing places where the information lies.
- Data map listing channels through which information is transmitted.
- Basic security analysis according to where the information, lies and through which channel information is transmitted.
- Basic directives about handling of information according to their level of sensitivity.
Indirect
- Criteria for selecting secure transmission channels and storage places.
- Knowledge of which transmission channels and places should be used for existing and new data objects.
Previous planning
In case of carrying out this activity on digital equipment, it is Suggested to have a spreadsheet or other software with all the necessary fields and formats.
Materials
- Post-its or sticky notes and markers or a digital equivalent as in previous activities.
- Large sheet and only x on matrix.
Instructions
-
Ask the participants to think and share places and devices where the data of the organization are stored. These can be on paper, digitally or in any other way. Now you can build column headers as shown in the figure:
Data storage places
Some examples that may help the group to a better developed brainstorming are:
- Laptops and desktops.
- USB drives.
- Filing cabinets.
- External hard drives.
- Desks
- CDs.
- Internal server.
- Cloud storage services such as Dropbox or Google Drive.
- Mobile phones.
- Administrative and / or accounting software.
-
Continue the brainstorming, but now ask the participants, through which means the information is transmitted. Add answers to the previous list as the chart shows:
Some examples that may help the group to experience a better developed brainstorming are: * Conventional email. * Messaging services such as WhatsApp, Signal or Telegram. * Traditional mail service. * Phone calls. * SMS text messages. * Encrypted email services such as Protonmail, Hushmail or Tutanota. * Social networks. * Web site. * Remote device management.
Data transmission channels
-
Thinking about the headings of the columns written as one of the axes of a matrix, place on the vertical axis levels of impact used in the previous activity:
It is important to use the same levels of impact if the participants defined differently to those proposed in this manual.
Data matrix with levels of impact
- Ask about the data objects in each level of impact where they are stored or transmitted. It is recommended not to take note of each data object, but to mark each coincidence of impact level associated with the storage location or means to transmit data. Ideally, it is recommended drawing the matrix on a large sheet of paper that allows to mark with X in the corresponding places as shown in the graph.
- This step can be long, so you must take precautions when planning.
- It may help to have the post-its, sticky notes or equivalents of the previous activity for the data objects by impact level as a visual guide for the participants.
- Introduce pertinent concepts about security for storage places and transmission channels according to the items held as storage places and means to transmit data.
- Encryption
- Point to point encryption.
- Insurance, locks, safes, etc.
- Accessibility of resources (Who has access to what).
- Considerations of services in the cloud.
- Etc.
The success of this step is closely related to the knowledge that the facilitator as well as the group possesses about the equipment and services used. It may happen that in some activities there are services that the facilitator does not know about. It is important to ask the group not only what they know, but also to investigate any security considerations pertinent to unknown items.
Means of storage and transmission of data by level of impact currently implemented in the organization
- Discuss along with the group if there are considered unsecure channels in which sensitive information is stored or transmitted. Some key questions can be:
- Are some of the above considered unsecure channels?.
- Are some of these storage places easy to access for unauthorized people?.
Data map analysis
-
Suggest to the group a modification in the matrix where it is defined what type of information per level of impact should be in each column, and the pertinent considerations in each case (if a computer must be encrypted to contain certain information, if you must use VPN or https to access a specific resource, etc.). The use of another color can be effective and useful to work on the same matrix, makes the activity easier to see the differences between what is currently done in the organization and what should be done from that moment on.
Means of storage and transmission of data by level of impact for the organization
Closure of the activity
At the end of the activity you may discuss and emphasize all what has been achieved:
- Several forms of communication and places for data storage were mapped.
- The data objects of the organization were associated with channels and storage places.
- Discussion began based on the level of security of the means used to store and transmit data, and establish basic premises from which the data retention policy of the organization will be built on.
It is necessary to take into account that in order to elaborate a complete data retention policy it is important to consider other things besides the means of storage and communication of the data objects, for example:
- For how long each data object should be in storage (expiration of data)?
- How data objects should be deleted by expiration?
- E.g.,: Prepare annual reports of complaints that will be deleted.
- Who manages the data: implementation of the principle of minimum privilege?
- Who are the decision-makers in terms of creation, storage and custody of the data?
References
- R7:What is encryption? - Surveillance Self Defense EFF
- R8:Protect sensitive files on your computer - File Encryption Security in a box
- R9:Communicating with others - end-to-end encryption - Surveillance Self Defense EFF
- R10:Secure Messaging Scorecard - EFF - Although it is outdated it is still a valuable resource to consult.