Skip to the content.

Handling Data

Data States

Data at Rest

Data stored in a physical location, such as a hard drive, database, or cloud storage.

Data in Use

Data currently being processed, manipulated, or accessed by an application or user.

Data in Transit

Data actively moving between locations or systems, such as over networks, between servers, or through communication channels.

Data Types

By Nature

By Format

By Use

By Origin

By Sensitivity

Data Classification

In general, data can be classified as:

Government Classifications

Data Ownership

Data Lifecycle

Data undergoes a life cycle encompassing creation, usage, sharing, and modification. Various models exist, sharing common operational steps.

  1. Collect/Create
    • Creating the knowledge, which is usually tacit knowledge at this point.
  2. Store
    • Storing or recording it in some fashion (which makes it explicit).
  3. Use/Process
    • Using the knowledge, which may cause the information to be modified, supplemented or partially deleted.
  4. Share
    • Sharing the data with other users, whether as a copy or by moving the data from one location to another.
  5. Archive
    • Archiving the data when it is temporarily not needed.
  6. Destroy
    • Destroying the data when it is no longer needed.

Identify and Assess Data

  1. Identification of Valuable Assets
    • Recognize assets based on their value to the data owner.
  2. Risk Assessment
    • Evaluate risks concerning data compromise, destruction, or alteration.
    • Identify vulnerabilities in the data life cycle.
  3. Data Life Cycle Stages
    • Understand data handling practices from creation to destruction.
    • Recognize diverse risks and practices at each stage.
  4. Regulatory Compliance
    • Adhere to government standards and regulations.
    • Examples include OSHA, HIPAA, PCI DSS, and GDPR.
  5. Geographic Considerations
    • Be aware of regulations across different geographic areas.
    • Ensure compliance with multiple jurisdictional rules.
  6. Technical Considerations
    • Be cautious about relying on virtual trash cans for data deletion.
    • Use appropriate tools for secure destruction, considering recovery possibilities.
  7. Compliance Protocols
    • Follow specific protocols and processes for regulatory compliance.
    • Ensure data is irreversibly destroyed as required.

Data Sovereignty

Refers to the concept that digital information is subject to the laws of the country in which it is located.

Logging and Monitoring Security Events

Logging is critical for capturing events and ensuring accountability.

According to the ISC2 Study Guide (chapter 5, module 1, under Data Handling Practices), logging and monitoring systems are characterized as being “Essential to identifying inefficient performing systems, detecting compromises, and providing a record of how systems are used”.

Event Logging Best Practices

Ingress Monitoring

Egress Monitoring


Back to main page