Classification of Information

Information classification assigns information to different categories based on its sensitivity. Both nations and many major corporations have sensitive information that gets classified, limiting its availability both to the organization and to the outside world.

Classification Schemes

A classification scheme is a method of organizing sensitive information into various access levels. Only a person with the approved level of access is allowed to view the information. This access is called clearance. Every organization has its own method of determining clearance levels. The methods usually include a background check, interviews, and a determination of the user’s need for the information. Most nations and many corporations have classification schemes set up to handle the organization and access of sensitive information.

Need to Know and Least Privilege

Need to know” is a major component in accessing sensitive information. The requester should not receive access just because of his or her clearance, position, or rank. The requester must also establish a justifiable need to see the information. Access should be granted only if the information is essential for the requester’s official duties. This further secures the information and reduces the risk of one rogue official with security clearance compromising sensitive information. This concept is also seen in computer access controls with the principle of least privilege.

Following the principle of least privilege, a computer user or program should have only the access needed to carry out its job. For example, a web server service may run as a nonadministrative user with access only to the web directories. If the program is compromised, the attacker has access to only a limited part of the system.

National Security Classification

The United States government classifies sensitive information into four main categories based on the degree of damage that would occur to national security if the information were disclosed in an unauthorized manner. Individuals cleared for a particular classification level may access information at that level and below, provided that they have a specific need to know the particular information in question. The four classification levels used by the U.S. government are:

  • Unclassified—Information that has not otherwise been assigned a sensitivity level under the national security classification scheme. Generally speaking, unclassified information is subject to public release under the Freedom of Information Act (FOIA). Under certain circumstances, government agencies may designate unclassified information as Controlled Unclassified Information (CUI). CUI information is exempt from disclosure under FOIA.
  • Confidential—Information that, if disclosed, could reasonably be expected to cause damage to national security.
  • Secret—Information that, if disclosed, could reasonably be expected to cause serious damage to national security.
  • Top Secret—Information that, if disclosed, could reasonably be expected to cause exceptionally grave damage to national security.

NOTE

Unclassified information is included here for completeness of discussion. However, it is important to note that “unclassified” is not technically a classification level. It is a term used to describe information that does not meet the criteria to be classified. This may seem like a semantic nuance, but it’s an issue that often pops up on security certification exams.

Information may change classifications at any time, as circumstances warrant. Information that may have been deemed confidential in 1992 may be considered Secret or even Top Secret today. Likewise, information that was of Top Secret importance in 1939 may no longer be sensitive enough to be classified at all.

Corporations

The classification schemes used by private organizations vary widely but often share some elements with the government scheme. One commonly used approach to corporate classification has the following classification levels:

  • Public—Information that the company freely releases to the public. This category would include information that is published on the organization’s website or distributed in sales materials.
  • Internal—Information that is not normally released to the general public but may be disclosed without damaging the company. This may include information about product road maps or pricing that is released to customers but not widely published.
  • Sensitive—Information that, if disclosed, could cause serious damage to the firm. This may include new product development plans or internal marketing strategies. Sensitive information is often not released outside the company except under the terms of a formal nondisclosure agreement (NDA).
  • Highly sensitive—Information that, if disclosed, would be extremely damaging to the company. This may include customer Social Security numbers, credit card numbers, or other very sensitive information. Highly sensitive information is often encrypted at all times and requires special permission to access.

NOTE

The Freedom of Information Act (FOIA) requires that the federal government disclose records to any private citizen or organization who requests them. Certain information, such as classified and CUI information, is exempt from these requests. This law applies only to federal documents, but many states have similar laws, sometimes referred to as “sunshine laws.”

Reasons for Classification

Information is generally classified if disclosure could harm the controlling organization. Corporations classify information to try to keep a competitive advantage over other companies. A soup company, for example, may want to keep its recipes as trade secrets. A company that tests the strength of materials may want to keep its testing methodology proprietary. Governments want to classify any information that would damage their security, such as troop locations and movement, facility locations, and so on.

Declassification Process and Policy

Declassification is the process used to move a classified document into the public domain. Every country and organization that classifies documents has a method of declassification. Let’s look at the U.S. model as a baseline.

There are four ways a U.S. government document can become declassified:

  • Automatic declassificationAutomatic declassification happens with any document over 25 years old. Unless it meets strict criteria, the document is automatically declassified after the department that owns the document reviews it. It is then moved to the publicly accessible shelves of the national archives.
  • Systematic declassification—With systematic declassification, any document that is under 25 years old but of significant importance to the historic record of the United States is reviewed for early declassification. Once identified, these documents go through the same procedures as automatically declassified documents.
  • Mandatory declassification review—A mandatory declassification review is instigated when an individual attempts to get a document declassified. After the review request has been filed, the owning organization must respond with approval, denial, or the inability to confirm or deny the existence or nonexistence of the document. If the request is denied, the requester can appeal to the interagency security classification appeals board.
  • FOIA request—A FOIA request is an attempt by a member of the general public to get a document declassified. The act allows for full or partial disclosure of the document; if the owning organization refuses the request, the decision can be appealed in a judicial review.

Personally Identifiable Information (PII)

The U.S. Department of Commerce defines personally identifiable information (PII) as:

Information which can be used to distinguish or trace an individual’s identity, such as their name, social security number, biometric records, etc. alone, or when combined with other personal or identifying information which is linked or linkable to a specific individual, such as date and place of birth, mother’s maiden name, etc.

This is usually sensitive information for a corporation and must be safeguarded. It is also information that is targeted for theft, as it is the key to identity theft. Protection of this information is mandated by numerous federal and state laws, and any security breaches must be disclosed in a timely manner. It is especially tightly controlled in the healthcare and financial industries.

Privacy Act Information

This is any information that is covered by the Privacy Act of 1974. The act covers the collection, maintenance, and dissemination of PII inside the federal government. Information covered in this act includes Social Security numbers (SSN), payroll numbers, information on education, financial transactions, medical history, criminal history, and employment history. This information can be disclosed only with the written consent of the subject or if the use fits into one of the following exceptions:

  • By the U.S. Census Bureau or the U.S. Bureau of Labor Statistics for statistical purposes
  • Routine use within a U.S. government agency
  • A document with significant historical value for archival purposes
  • For law enforcement
  • Congressional investigation
  • Other administrative purposes

It is important to remember that this act applies only to organizations inside the federal government. State government and private entities are not governed by the Privacy Act of 1974.

Privacy Controls Catalog

The National Institute for Standards and Technology (NIST) produces standards that are not only binding on U.S. government agencies but also useful to others designing and implementing cybersecurity programs. NIST Special Publication 800-53 (SP 800-53) is a lengthy document providing a set of security and privacy controls for protecting sensitive information.

Appendix J of that publication provides a robust look at privacy controls, organized into four major areas of concern:

  • Authority and Purpose: Does the organization have the authority to collect PII, and is the purpose for that collection clearly stated?
  • Accountability, Audit, and Risk Management: Has the organization implemented privacy governance, detailed privacy requirements, and created the support structures to ensure that employees are properly implementing the privacy program?
  • Data Quality and Integrity: Is the organization taking appropriate steps to ensure the quality and integrity of PII that it collects and maintains?
  • Data Minimization and Retention: Is the organization retaining only the minimum amount of information necessary to carry out the stated purpose, and are data being promptly and properly destroyed when no longer necessary?

For more information on these controls, refer to Appendix J of NIST SP 800-53.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset