Data Protocol Docs Logo
0/

assessment

Evaluating Data Access Readiness

For more on this topic, take the Course: Security & Privacy

2 min read

Share this doc:


Protecting data privacy is complex; no single model or method is likely to account for every privacy risk. It's important to evaluate your organization's unique situation and prepare for the specific challenges and threats your team faces.

Use this assessment to evaluate your organization's data access practices and make a plan for actionable improvement. Read the following goals and select each statement that describes the data access strategy you implement at your organization.

Goals

  1. You use role-based access controls (RBAC) with roles mapped to data classification levels.

  2. You ensure critical access keys are never discoverable in code or stored on hard drives.

  3. You map decryption keys for less sensitive data to data stores so you can add or remove privileges at scale.

  4. You use access controls beyond the traditional username/password combination, like multifactor authentication (MFA).

  5. You require password protection for accounts and links and encryption for the most sensitive data while in transit.

  6. You require client-side encryption for any sensitive data stored in the public cloud.

Scoring

0-3 You've got work to do.

Data access levels need to be proactively planned, monitored, and enforced.

Engage with cross-functional stakeholders to review this assessment and determine next steps. Without improving your data access practices, you leave your team and your users vulnerable to exploitation.

4-6 You're on the way

You have taken some important first steps toward implementing a comprehensive data access level plan.

Meet with your cross-functional team and ask: What are we missing? Which internal, and/or external stakeholders do we need to consult to improve our data access strategy? What are the largest vulnerabilities you need to address, and in what order should you address them?

7-8 You're in a good position

You and your organization have built a solid foundation toward understanding the state of your data access strategy.

Meet with your cross-functional team to evaluate any readiness points you didn't achieve. Are you in the best position to operationalize your data access deployment?

For more on this topic, take the Course:


Data Protocol Course

Security & Privacy

In this course, you will learn how to build a framework that reduces the attack surface for sensitive data and how to implement tools for the management of access control and monitoring, such as Access Control Lists (ACLs) and encryption keys.

Share this doc:


Your privacy matters.

By clicking "Accept All", you are agreeing to Data Protocol's Cookie Policy.