Data classification and monitoring patterns
Let’s get started!
Problem
How do we discover the data and classify its existence to determine the protection strategy and mechanisms? The problem is also about solving how to monitor the access of data and alert on any important event or breach.
Context
Before determining the protection of data, enterprises need to acknowledge the existence of data. Then, it is required to classify the data based on the sensitivity to determine what data protection and monitoring strategy needs to be followed.
Many enterprises are unaware of their data distribution and sensitive content residing outside of expected security protocol. The other problem is that these organizations retain far too much data that may be redundant, obsolete, or trivial. Redundant data is data that is duplicated, and obsolete data has passed its useful life. Data that has no ongoing business value is considered trivial. Typical enterprises struggle with dark...