The framework consists of five steps that begin with data ownership and classification and end with a clear and effective data protection program that enables incidents and breaches to be properly handled.
“The first step of Accuvant’s Data-Centric Security Framework is to understand and inventory our clients’ sensitive data handling and critical system ownership.
From this, we can determine the effectiveness of the current security program and system controls, and recommend the services and technologies that should be implemented to close the gap to get them where they need to be,” said Doug Landoll, director for Accuvant’s Risk and Compliance Management team.
“Defining what sensitive information exists, where it resides and how it must be protected is the underlying principle of Accuvant’s Data-Centric Security Framework, and ensures that our clients can make the most efficient use of their security dollars.”
Accuvant’s Data-Centric Security Framework is a departure from traditional DLP projects in that most are centered on the technology and assume that the organization has already defined its data, developed policies and put critical controls in place. Accuvant’s Data-Centric Security Framework turns this concept on its head and instead focuses on the sensitive data first, with a review of the existing controls and pragmatic use of available DLP tools and technology thereafter.
Step 2 – Locate: This step is for organizations that want to discover the location of all in-scope sensitive data assets, such as credit card data.
http://www.darkreading.com/security/management/showArticle.jhtml?articleID=224900104