=Paper=
{{Paper
|id=Vol-3654/short7
|storemode=property
|title=Designing Data Classification and Secure Store Policy According to SOC 2 Type II (short paper)
|pdfUrl=https://ceur-ws.org/Vol-3654/short7.pdf
|volume=Vol-3654
|authors=Oleh Deineka,Oleh Harasymchuk,Andrii Partyka,Anatoliy Obshta,Nataliia Korshun
|dblpUrl=https://dblp.org/rec/conf/cpits/DeinekaHPOK24
}}
==Designing Data Classification and Secure Store Policy According to SOC 2 Type II (short paper)==
Designing Data Classification and Secure Store Policy
According to SOC 2 Type II
Oleh Deineka1, Oleh Harasymchuk1, Andrii Partyka1, Anatoliy Obshta1,
and Nataliia Korshun2
1 Lviv Polytechnic National University, 12 Stepana Bandery str., Lviv, 79000, Ukraine
2 Borys Grinchenko Kyiv Metropolitan University, 18/2, Bulvarno-Kudriavska str., Kyiv, 04053, Ukraine
Abstract
This paper discusses the design of a data classification policy for SOC 2 Type II
compliance. SOC 2 Type II is a significant certification that attests to a service
organization’s ability to meet the Trust Services Criteria, which encompass security,
availability, processing integrity, confidentiality, and privacy. Data classification is a
critical first step in establishing a robust data security strategy, as it helps organizations
understand what data they have and assigns a level of sensitivity to that data, which
informs the security controls that should be applied. The main objectives of data
classification are to organize and manage data in a way that enhances its protection and
aligns with the overall data security strategy of an organization. Data security plays a
pivotal role in the data classification process, as it directly influences how classified data
is protected and managed. Designing a data classification policy for SOC 2 Type II
compliance involves several challenges and considerations that organizations must
navigate to effectively protect sensitive information and maintain the integrity of their
service delivery. These challenges and considerations include understanding the scope of
data, aligning with the Trust Services Criteria, balancing security with usability, training,
and awareness, regular updates, and reviews, defining classification levels, ensuring
consistency, automating classification, integration with other policies and controls,
dealing with third-party vendors, monitoring and enforcement, and legal and regulatory
compliance.
Keywords 1
SOC 2 Type II, data classification, data security, access management, storage.
1. Introduction methods to counteract such malicious acts, as
well as the development of infrastructure in
The modern world is characterized by a rapid this direction [4–9]. An important direction is
growth of information assets, which contain a the development of standards for safe data
rather high percentage of critical information. storage [10, 11]. Security standards allow a
Large volumes of such information primarily better understanding of how exactly an
require classification by various parameters institution controls access to data and ensures
and features, their reliable storage and their security and confidentiality [12].
transmission, as well as protection from The standards and requirements for data
unauthorized access. Recently, the number of storage for organizations can vary depending
possible attacks on information resources has on the country, the organization’s industry, the
been constantly increasing [1–3]. sensitivity level of the information, and other
Cybersecurity specialists are constantly factors. For a specific organization, there may
developing new standards, approaches, and
CPITS-2024: Cybersecurity Providing in Information and Telecommunication Systems, February 28, 2024, Kyiv, Ukraine
EMAIL oleh.r.deineka@lpnu.ua (O. Deineka); garasymchuk@ukr.net (O. Harasymchuk); andrijp14@gmail.com (A. Partyka);
anatolii.f.obshta@lpnu.ua (A. Obshta); n.korshun@kubg.edu.ua (N. Korshun)
ORCID: 0009-0005-9156-3339 (O. Deineka); 0000-0002-8742-8872 (O. Harasymchuk); 0000-0003-3037-8373 (A. Partyka); 0000-0001-
5151-312X (A. Obshta); 0000-0003-2908-970X (N. Korshun)
©️ 2024 Copyright for this paper by its authors.
Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
CEUR Workshop Proceedings (CEUR-WS.org)
CEUR
ceur-ws.org
Workshop ISSN 1613-0073
Proceedings
398
be specific standards and requirements practices, check how the company follows its
dictated by its needs and legal requirements. procedures, and how it registers changes in
Most organizations or institutions form their processes.
security policy based on international standards, SOC 2 Type II is a significant certification
which are mostly carried out with the within the landscape of data security and
participation of external auditing companies that compliance. It serves as an attestation by an
certify compliance with the standard [13, 14]. independent auditor that a service
However, there are still many problems organization has not only designed its systems
that professionals who deal with secure to meet the Trust Services Criteria but also that
storage of large volumes of data encounter. For it operates effectively over time. The Trust
instance, they have to grapple with issues of Services Criteria encompass several critical
data integrity, confidentiality, and areas: security, availability, processing
accessibility. Ensuring that the information integrity, confidentiality, and privacy.
remains unaltered from creation through The importance of SOC 2 Type II lies in its
storage and retrieval can be a daunting task. ability to build trust with clients and
Moreover, professionals have to guarantee stakeholders. By demonstrating a commitment
confidentiality, so that only authorized to stringent data management practices,
individuals can access the data. They also need companies can assure clients that their
to ensure that the data is readily accessible sensitive data is handled responsibly. This is
when needed, which can be challenging in an especially crucial in sectors where data privacy
era of rapidly increasing data volumes. and security are paramount, such as financial
While there are a variety of effective services, healthcare, and cloud computing.
approaches, methods, and ways to organize big Moreover, the audit process SOC 2 Type II
data storage, there are still certain problems in helps organizations identify and mitigate
this area. The issue of searching for the potential security risks, ensuring that they
necessary information in unstructured data maintain a strong security posture. This
can be identified as a significant drawback. proactive approach to risk management is
ISO 27001 is a standard designed to ensure critical in an era where cyber threats are
proper management of a company’s digital constantly evolving, and data breaches can
assets, including financial information, have catastrophic consequences. Therefore,
intellectual property, employee data, and there is a constant search for new approaches
trusted third-party information. and methods to ensure reliable data storage
In turn, SOC 2 certification is more and user and device authentication where this
recognized and is usually preferred by data is stored [15–17].
American and Canadian companies. In an increasingly regulated environment,
Another important point: SOC is divided SOC 2 Type II compliance can also support
into SOC 1, SOC 2, and SOC 3. The first is adherence to legal and regulatory
exclusively about financial control, and the requirements. This can help organizations
third is mostly used for marketing purposes, so avoid costly penalties and legal issues
SaaS providers can focus solely on SOC 2. associated with non-compliance.
The Service and Organization Controls 2 From a business perspective, SOC 2 Type II
standard was developed by the American compliance can serve as a competitive
Institute of Certified Public Accountants using differentiator. It signals to the market that an
the Trust Services Criteria reliability criteria. organization is a reliable and secure partner,
SOC 2 provides an independent assessment of which can be instrumental in winning new
risk management control procedures in IT business and retaining existing customers [18].
companies that provide services to users. The result of implementing SOC 2 is a report
The standard pays special attention to data based on the AICPA Attestation Standards,
privacy and confidentiality, so it is turned to by section 101, Attest Engagement.
such giants as Google and Amazon—for them, Types of SOC 2 reports:
a high level of security and transparent data Type I report contains information about
processing processes are especially important. the design of control procedures and the result
External auditors are invited for certification. of an assessment of the internal control system
Their task is to study the implemented as of the date of the check. This type of report
399
is a starting point for further building SOC 2 accessed, modified, or destroyed. The
Type II compliance. objectives are as follows:
Type II report proves compliance with Identify Sensitive Data: Data classification
requirements over a certain period. The enables organizations to determine which data
organization must demonstrate adherence to is sensitive and requires more robust
control measures and policies during this protection measures. This includes data such
period, which usually requires a certain degree as Personal Identifiable Information (PII),
of automation and long-term commitments. financial details, health records, and
Goal of the work: Development of a solution intellectual property.
for optimizing the classification of Facilitate Risk Management: By classifying
organizational data and its appropriate storage data, organizations can better understand the
by the SOC 2 Type II standard. risks associated with each type of data. Higher
Task: Analyze the main requirements for classification levels typically indicate a higher
data classification and their storage need for protection due to increased risk.
organization, identify shortcomings, and Enhance Regulatory Compliance: Many
search for the optimal solution in terms of industries are governed by regulations that
speed and economic efficiency to ensure mandate the protection of certain types of data
compliance with the SOC 2 Type II standard. or dictate specific rules for their storage and
access.
2. Overview of Data Classification Data classification is critical for compliance
with regulations such as the General Data
and its Role in Data Security Protection Regulation (GDPR), the Health
Insurance Portability and Accountability Act
Data classification is the process of organizing (HIPAA), and others.
data into categories that make it easier to Enable Focused Security Measures: Through
manage and protect based on its level of data classification, organizations can apply
sensitivity and the impact on the organization appropriate security controls where they are
should that data be disclosed, altered, or most needed. This targeted approach ensures
destroyed without authorization. It is a critical that the most sensitive data receives the highest
first step in establishing a robust data security level of security, optimizing the use of security
strategy because it helps organizations resources.
understand what data they have and assigns a Support Access Controls: Proper data
level of sensitivity to that data, which informs classification assists in the implementation of
the security controls that should be applied. effective access controls. It ensures that access to
Recognizing this is important as big data plays sensitive data is restricted to authorized
a key role in data analytics. It’s the analytics individuals based on their roles and the need-to-
that allows us to correctly understand and know principle.
interpret this data so that it can be used for Inform Data Lifecycle Management:
making correct and justified decisions, Classification helps determine how data should
predicting trends, etc. It’s important to be handled throughout its lifecycle, including
understand that big data repositories are not retention, storage, archiving, organizing access
just a “large database”. The main difference lies to it, and secure destruction policies.
in the fact that databases typically store Prioritize Security Efforts: In the event of a
structured data and have a fixed schema, while security incident, understanding the
repositories of unstructured data can also classification of affected data can help prioritize
store unstructured data and process large response and recovery efforts, thereby
volumes of information. The main objectives of minimizing the potential impact on the
data classification are to organize and manage organization.
data in a way that enhances its protection and Raise Awareness and Accountability: It
aligns with the overall data security strategy of promotes awareness among employees about
an organization. The process involves the types of data they handle and their
assigning categories to data based on its level responsibilities in safeguarding it, thereby
of sensitivity and the potential impact on the fostering a culture of security and accountability
organization if that data were to be improperly within the organization [19, 20].
400
Data security plays a pivotal role in the data classification. This increases awareness and
classification process, as it directly influences reduces the likelihood of accidental data
how classified data is protected and managed. breaches or leaks, enhancing the reliability of
The role of data security in data classification their storage and control of access to them.
can be described through several key Auditing and Compliance Monitoring: Data
functions: security involves regular auditing and
Defining Protection Measures: Data monitoring to ensure that classified data is
security is the driving force behind the being managed by established security policies
selection of protection measures for each and procedures. This helps to identify and rectify
classification level. Once data is categorized, any deviations or weaknesses in the protection
data security principles guide the application of classified data [21, 22].
of appropriate security controls, such as
encryption, access controls, and monitoring 3. Challenges and Considerations
systems.
Risk Mitigation: Data security practices are
in Designing a Data
essential in mitigating the risks associated with Classification Policy for SOC 2
the handling of data. By understanding the Type II
classification of data, organizations can
implement security measures that are Designing a Data Classification policy for SOC 2
commensurate with the level of risk, ensuring Type II compliance involves several challenges
that sensitive data is afforded stronger and considerations that organizations must
safeguards. navigate to effectively protect sensitive
Regulatory Compliance: Many data security information and maintain the integrity of their
frameworks and regulations require the service delivery. Here are some of the key
classification of data as part of their challenges and considerations:
compliance standards. Data security ensures Understanding the Scope of Data:
that classified data is handled in a manner that Organizations must first identify and
complies with legal and industry-specific understand the types of data they handle,
requirements, thus avoiding potential fines which can be a complex task, especially for
and legal action. large or data-intensive businesses. This
Access Control: Data security policies involves mapping out where data resides, how
determine who has access to various classes of it flows through the organization, and what
data, based on their need to know and data is critical for the operation or sensitive by
authorization levels. By enforcing strict access nature.
control measures, data security helps prevent Aligning with Trust Services Criteria: SOC 2
unauthorized access to sensitive information. Type II revolves around the Trust Services
Data Lifecycle Management: The role of Criteria set by the AICPA, which include
data security extends throughout the entire security, availability, processing integrity,
lifecycle of the data, from creation to disposal. confidentiality, and privacy. A data
Security measures are applied differently at classification policy must ensure that controls
each stage of the lifecycle, depending on the are in place to address these criteria
classification of the data. appropriately for different categories of data.
Incident Response and Recovery: In case of Balancing Security with Usability:
a data breach or other security incident, the Implementing too stringent controls can
classification of the compromised data guides hinder business operations, while too lenient
the incident response and recovery efforts. controls can expose the organization to risk.
Data security teams can prioritize their actions Organizations must find the right balance to
based on the sensitivity of the data involved, ensure data is both secure and accessible to
ensuring that the most critical data is authorized users as needed and with
addressed first. appropriate rights and privileges.
Awareness and Training: Data security Training and Awareness: Employees must
involves educating and training employees on be aware of the data classification policy and
the importance of data classification and the understand their roles in maintaining
correct handling of data according to its
401
compliance. Training programs are essential to Addressing these challenges and
ensure that all personnel can correctly handle considerations requires a strategic approach
data according to its classification. and ongoing commitment to maintaining a
Regular Updates and Reviews: Data robust data classification policy. Organizations
classification policies must be dynamic, may seek guidance from compliance experts,
reflecting changes in the business legal counsel, and SOC 2 audit professionals to
environment, emerging threats, new data design and implement a policy that not only
types, and regulatory requirements. Regular meets SOC 2 Type II requirements but also
reviews and updates to the policy are necessary supports the organization’s overall data
to maintain SOC 2 Type II compliance. governance strategy [23, 24].
Defining Classification Levels: Organizations
need to define clear and practical classification 4. Data Classification Policy Design
levels that reflect the sensitivity and value of the 4.1. Requirements
data. These levels will determine the
corresponding controls and handling
While SOC 2 Type II itself does not prescribe
procedures.
specific data classification policies, it does
Ensuring Consistency: Consistency in how
require organizations to effectively manage and
data is classified across different departments
protect the confidentiality, privacy, and security
and systems is crucial. Inconsistencies can lead
of information, by the Trust Services Criteria
to gaps in protection and potential compliance
(TSC). A Data Classification Policy is a critical
issues, which can result in possible data loss or
component of meeting these criteria, particularly
unauthorized access.
the Security criterion, which is common to all
Automating Classification: Manual data
SOC 2 audits.
classification can be error-prone and
A SOC 2 audit measures the effectiveness of
inefficient and can be quite time-consuming.
your processes and systems based on the Trust
Implementing automated classification
Service Criteria and checks compliance with
solutions can help, but it is essential to choose
information security standards and rules,
tools that align well with the organization’s
including Common Criteria standards. Here are
specific needs and compliance requirements.
some general requirements that a Data
Integration with Other Policies and
Classification Policy should address to support
Controls: The data classification policy must
SOC 2 Type II compliance:
integrate seamlessly with other organizational
Identification of Data Type: The policy should
policies, such as access control, incident
define the types of data handled by the
response, and data retention policies, and not
organization, including sensitive data subject to
slow down their operation.
SOC 2 considerations, such as PII, business
Dealing with Third-Party Vendors: If third-
confidential data, and intellectual property.
party vendors manage or have access to the
Classification Levels: The policy must
organization’s data, they must also adhere to
establish clear classification levels that reflect the
the data classification policy. This requires
sensitivity of the data. Common levels include
careful vendor management and sometimes
public, internal use only, confidential, and highly
additional contractual agreements or audits,
confidential.
regarding their rights and privileges.
Ownership and Responsibilities: The policy
Monitoring and Enforcement: Ongoing
should define roles and responsibilities for data
monitoring is needed to ensure that the data
classification, including data owners, custodians,
classification policy is being followed and that
and users, and outline their responsibilities in
controls are effective. This includes regular
maintaining data classification.
audits and reviews, which are part of SOC 2
Handling Requirements: For each
Type II requirements.
classification level, the policy should specify
Legal and Regulatory Compliance:
handling requirements, including storage,
Organizations must consider various legal and
transmission, access controls, encryption
regulatory frameworks that apply to their data
standards, and end-of-life procedures.
and ensure that the classification policy helps
Labeling and Marking: The policy should
them meet these obligations and does not
provide guidelines on how data should be
contradict current legislation.
402
labeled or marked according to its classification To ensure alignment with SOC 2 Type II
to ensure that it is easily identifiable and handled requirements, developing a Data Classification
appropriately. Policy usually demands a comprehensive
Access Controls: The policy must address understanding of the AICPA’s TSC and the
access controls, ensuring that access to data is unique data protection requirements of the
based on the principle of least privilege and that organization. Engaging with seasoned
only authorized individuals can access sensitive compliance experts or auditors who can give
data. tailored advice and oversee compliance with
Retention and Disposal: The policy should the standard’s stipulations is highly
outline data retention periods and secure recommended. The AICPA’s guidance and
disposal methods for each classification level, frameworks such as ISO 27001, when
ensuring data is not kept longer than necessary consulted and utilized, can offer invaluable
and is disposed of securely. inputs for the creation and sustenance of a
Training and Awareness: The policy should strong data classification policy. It is crucial to
mandate regular training and awareness identify and categorize data based on its
programs for employees to understand the sensitivity, importance, and regulatory
importance of data classification and their role mandates. Moreover, regular reviews and
in it. updates of the policy should be conducted to
Auditing and Monitoring: The policy should ensure its efficiency and continued compliance
include provisions for regular auditing and with SOC 2 Type II requirements [25–29].
monitoring to ensure that classification
controls are effective and being followed. 4.2. Representation
Incident Response: The policy should be
linked to an incident response plan that A high-level overview of the interaction
addresses potential data breaches or loss, with between a system and its users, outlining the
procedures tailored to the classification level different functions (use cases) the system is
of the data involved. expected to perform and the roles that interact
Review and Update: The policy should with these functions.
specify intervals for reviewing and updating Considering the aforementioned
data classification procedures to ensure they requirements, we have developed the
remain relevant and effective as the following structure (Fig. 1), which fully allows
organization evolves, data volumes increase, for data classification, ensures their storage,
and new threats emerge. and authorizes access to them by SOC 2 Type II.
Third-Party Vendors: If data is shared with The diagram mentioned in the document
or handled by third-party vendors, the policy illustrates and provides detailed information
must extend to these vendors, often requiring about the various actions, processes, and roles
them to adhere to similar or compatible that are necessary to fulfill the requirements
classification and handling standards. for coverage.
403
Figure 1: Use case diagram
4.3. Roles it. This training should cover the data
classification policy, the different classification
We suggest applying for the following roles: levels, and the handling requirements for each
Employee: An employee is responsible for level.
adhering to the data classification policy, Data Steward: A data steward is responsible
correctly handling data according to its for the management and governance of data
classification, and reporting any incidents or within the organization. They ensure that data
violations. As the primary users of data within is classified correctly, that the classification
an organization, employees are responsible for policy is being followed, and that data is being
correctly handling data according to its used in compliance with legal and regulatory
classification level. This means that employees requirements. Data stewards play a crucial role
must understand the different classification in maintaining the integrity of the data
levels and the corresponding handling classification policy and ensuring that it is
requirements, such as storage, transmission, effectively implemented throughout the
access controls, and end-of-life procedures. In organization. They work closely with data
addition to correctly handling data, employees owners, custodians, and users to ensure that
are also responsible for adhering to the data data is correctly classified and that the
classification policy and reporting any appropriate controls and handling procedures
incidents or violations. This includes reporting are in place. Data stewards also monitor
any suspected data breaches, loss, or compliance with the data classification policy
unauthorized access to data. By promptly and report any incidents or violations to the
reporting incidents, employees can help the appropriate authorities.
organization to quickly respond and mitigate Auditor: An auditor plays a crucial role in
any potential damage or block unauthorized assessing an organization’s compliance with
access to data. To fulfill these responsibilities, SOC 2 requirements, including the data
employees must receive regular training and classification policy. They are responsible for
awareness programs to understand the independently reviewing the policy, processes,
importance of data classification, the rules, and and controls to ensure that they meet the Trust
methods of such classification, and their role in Services Criteria. The Trust Services Criteria
404
encompass several critical areas: security, process more efficient, enabling users to locate
availability, processing integrity, and retrieve the necessary data quickly.
confidentiality, and privacy. The auditor’s role Machine learning classification is an integral
is to provide an objective evaluation of the part of a processing system [31–34].
organization’s compliance with these criteria ITSM: IT Service Management (ITSM) is
and to identify any areas where improvements responsible for the delivery of IT services that
may be needed. This helps the organization to support the data classification policy. This
maintain a strong security posture, and includes the provision of systems, tools, and
reputation among its clients and partners, and processes that enable the organization to
to demonstrate its commitment to protecting effectively classify, manage, and protect its
sensitive data [19]. data. ITSM also plays a key role in access
Admin: An admin plays a crucial role in management, request fulfillment, and incident
maintaining the smooth operation of an management [32].
organization’s IT systems. They are
responsible for deploying new app versions, 4.4. Actions and Processes for Review
monitoring system performance, and patching Customer Data
all operational staff. Here are some of the key
responsibilities of an admin in this context: New customer information or category
Deploying new app versions: Admins are appears: If new customer information or
responsible for rolling out new versions of category appears it should be added to
applications to ensure that users have access to Customer Data Catalog. Adding new customer
the latest features and security updates. This information could include collecting additional
involves testing the new version, preparing the details with any relevant information.
deployment plan, and coordinating with other Adding a new category could involve creating
teams to ensure a smooth rollout. Monitoring: a new grouping or segmenting the existing
Admins are responsible for monitoring the customer data into different categories. Adding
performance and availability of IT systems. new customer information or categories is
This involves tracking key metrics, identifying usually done to improve the effectiveness of the
and resolving issues, and ensuring that Customer Data Catalog and enable to make more
systems are operating at optimal levels. informed business decisions. However, it’s
Patching all operational staff: Admins are important to ensure that the new information or
responsible for ensuring that all operational category is collected and stored in compliance
staff have the latest security patches and with data protection regulations and customer
updates installed on their systems. This privacy laws.
involves identifying and deploying patches, The sensitivity level has changed: The
testing their effectiveness, and ensuring that sensitivity level of the data category refers to
all systems are up-to-date and secure. how valuable or confidential the information
SSO system: A Single Sign-On (SSO) system is, and how much damage or harm could be
is responsible for managing user caused if it were to be disclosed or accessed by
authentication and access control, the rights, unauthorized individuals or entities.
and privileges of authorized individuals. It When the sensitivity level of the data
ensures that users are correctly authenticated category has changed, it means that the level of
and that they have access only to the data that importance or confidentiality of the data has
they are authorized to access based on their increased or decreased. If a previously non-
roles and the data classification [30]. sensitive data category has now become
Processing System: A processing system sensitive due to changes in regulations,
plays a crucial role in managing data in line business practices, or legal requirements, the
with the data classification policy. It ensures sensitivity level of that data category has
that data is processed, stored, and transmitted increased. Conversely, if the sensitive data
securely, adhering to the policies set forth by category has become less important or
the organization. The processing system also valuable due to changes in business practices
involves data indexing, which is a method of or legal requirements, the sensitivity level of
organizing data to optimize its retrieval. This that data category has decreased. It is
function is crucial as it makes the data search
405
important to review and assess the sensitivity your data can help you to better organize,
level of the data category to ensure that it is manage, and analyze your data [22].
being protected adequately and to make any Step 3: Using Integration Tools to Manage
necessary adjustments to security measures and Store Your Data
and access controls. After you have identified the types of data
The description of an existing category has your company owns and the metadata
changed: If the data being collected for a associated with that data, the next step is to use
specific category is changing or expanding, the integration tools to manage and store your
description of that category may need to be data. Integration tools allow you to extract data
edited to reflect the new data category being from various sources, transform it into a
collected. Editing the description of an existing common format, and load it into a data store.
customer data category is usually done to This process, known as Extract, Transform,
ensure that the information being collected is Load (ETL), allows you to consolidate your
accurately and completely described [22]. data into a single location, making it easier to
manage and analyze [31–34].
4.5. Data Flow Design Step 4: Creating a Data Model
Once your data has been extracted,
This diagram provides all data flow steps: transformed, and loaded into a data store, the
Step 1: Understanding the Types of Data Your next step is to create a data model. A data model
Company Owns is a visual representation of the relationships
The first step in creating a Data Flow between different data elements. It provides a
Diagram is to understand the types of data framework for organizing and structuring your
your company owns. Data can be broadly data and can help you to identify patterns and
classified into three categories: structured, trends within your data [37].
semi-structured, and unstructured. Step 5: Classifying and Linking Your Data to
Structured data refers to data that is Metadata
organized in a predefined manner, such as data After you have created a data model, the
stored in a relational database. Structured data next step is to classify your data and link it to
is easy to search, analyze, and manipulate, as it the metadata associated with it. This involves
follows a consistent format. Semi-structured assigning a level of sensitivity to your data,
data refers to data that has some level of based on its importance and the potential
organization but does not follow a strict impact if it were to be lost or stolen. Once your
format. Examples of semi-structured data data has been classified, you can link it to the
include XML and JSON files, which contain data metadata associated with it, providing
in a hierarchical format, but do not have a fixed additional context and information about the
schema. data [38].
Unstructured data refers to data that has no Step 6: Visualizing and Managing Your Data
inherent structure or organization. Examples The final step in creating a Data Flow
of unstructured data include text documents, Diagram is to create an application that allows
images, and videos. Unstructured data can be you to visualize and manage your data. This
difficult to search, analyze, and manipulate, as application should provide a user-friendly
it does not follow a consistent format [35, 36]. interface for accessing, analyzing, and
Step 2: Understanding the Metadata manipulating your data. It should also include
Associated with Your Data Once you have logic for managing access, requests, and
identified the types of data your company incidents, and should be integrated with your
owns, the next step is to understand the ITSM system to ensure that data is handled
metadata associated with that data. Metadata according to your company’s policies and
refers to data that provides information about procedures [39, 40].
other data. For example, the metadata This solution presents a host of advantages
associated with a text document might include over traditional product-based offerings from
the author, date of creation, and file size. various companies. One of the key benefits is
Understanding the metadata associated with the flexibility to choose the hosting
environment that best fits your needs, be it on-
premise or cloud-based. This allows you to
406
align the solution with your operational protect its data. It’s a clear signal to clients that
requirements and infrastructure capabilities. their data is safe, secure, and handled in a
Furthermore, you have the freedom to manner that meets or exceeds industry
select the technology stack that best suits your standards.
project. This means that you’re not limited to a Another benefit of SOC 2 Type II is that it
predetermined set of technologies, but can can provide a competitive edge. Companies
tailor the solution to leverage the most that have achieved SOC 2 Type II compliance
relevant and efficient tools for your specific can differentiate themselves from competitors
needs. that haven’t. This can be a decisive factor for
In terms of team composition, you can potential customers when choosing between
assemble a team that is uniquely suited to the different service providers.
project at hand. This flexibility ensures that the Furthermore, the SOC 2 Type II report can
right expertise and skills are applied to deliver help companies avoid penalties related to non-
the best possible outcomes. compliance. Various laws and regulations
Another advantage is the budgeting require businesses to take certain steps to
flexibility. Unlike vendor-specific solutions protect customer data. By achieving SOC 2
that may come with fixed licensing costs, the Type II compliance, companies can
budget for this solution can be adjusted demonstrate that they are meeting these
according to your financial capacity and requirements, thus avoiding potential fines
project requirements. This can result in and legal complications.
significant cost savings without compromising The SOC 2 Type II report can also help
on quality or performance. companies identify and address vulnerabilities
Lastly, this solution offers robust change in their information security controls. The
and feature management capabilities. This process of achieving compliance requires a
means that it can easily adapt to evolving comprehensive review of a company’s
business needs, with the ability to incorporate information security policies and procedures.
new features and make necessary changes in a This can help identify any weaknesses or gaps
timely and efficient manner. This flexibility that need to be addressed, thereby
ensures the solution remains relevant and strengthening the company’s overall security
continues to deliver value over time. posture.
Lastly, the SOC 2 Type II report can help
4.6. Value of SOC 2 Type II Compliance improve a company’s internal processes. The
process of achieving compliance requires a
The SOC 2 Type II report has become a company to document and formalize its
standard requirement for businesses looking information security policies and procedures.
to assure clients, partners, and stakeholders This can lead to more efficient and effective
about the security of their data and systems. processes, as well as a greater understanding
This report, issued by an independent auditor, of the company’s information security risks
offers an in-depth review and attestation of the and controls among employees [41, 42].
effectiveness of a company’s information
security controls over some time. 5. Conclusions
The main reason why the SOC 2 Type II
report is valuable to a company is that it According to the document: In conclusion,
provides clear evidence that the company has designing a data classification policy for SOC 2
robust and effective controls in place to protect Type II compliance is a complex but crucial
customer data. In today’s digital age, data task for organizations. SOC 2 Type II is a
security is a top priority for businesses and significant certification that attests to a service
customers alike. A data breach not only leads organization’s ability to meet the Trust
to financial loss but also damages a company’s Services Criteria, which encompass security,
reputation. availability, processing integrity,
The SOC 2 Type II report helps build trust confidentiality, and privacy. Data classification
with customers by demonstrating that a is a critical first step in establishing a robust
company has taken necessary measures to data security strategy, as it helps organizations
407
understand what data they have and assigns a Commun. Technol. Human. Dev. 10(4)
level of sensitivity to that data, which informs (2018)1–18.
the security controls that should be applied. [4] A. Singh, A. Kumar, S. Namasudra,
The main objectives of data classification are to DNACDS: Cloud IoE Big Data Security
organize and manage data in a way that and Accessing Scheme Based on DNA
enhances its protection and aligns with the Cryptography, Frontiers Comput. Sci.
overall data security strategy of an 18(1) (2024) 181801. doi:
organization. Designing a data classification 10.1007/s11704-022-2193-3.
policy for SOC 2 Type II compliance involves [5] O. Harasymchuk, et al., Generator of
several challenges and considerations that Pseudorandom Bit Sequence with
organizations must navigate to effectively Increased Cryptographic Security,
protect sensitive information and maintain the Metallurgical and Mining Industry Sci.
integrity of their service delivery. These Tech. J. 5 (2014) 25–29.
challenges and considerations include [6] V. Lakhno, et al., Management of
understanding the scope of data, aligning with Information Protection Based on the
the Trust Services Criteria, balancing security Integrated Implementation of Decision
with usability, training, and awareness, regular Support Systems, Eastern-European J.
updates, and reviews, defining classification Enterprise Technol. Inf. and Controlling
levels, ensuring consistency, automating Syst. 5(9(89)) (2017) 36–41. doi:
classification, integration with other policies 10.15587/1729-4061.2017.111081.
and controls, dealing with third-party vendors, [7] H. Hulak, et al., Formation of
monitoring and enforcement, and legal and Requirements for the Electronic Record-
regulatory compliance. Addressing these Book in Guaranteed Information
challenges and considerations requires a Systems of Distance Learning,
strategic approach and ongoing commitment Cybersecurity Providing in Information
to maintaining a robust data classification and Telecommunication Systems Vol.
policy. Organizations may seek guidance from 2923 (2021) 137–142.
compliance experts, legal counsel, and SOC 2 [8] V. Maksymovych, et al., Development of
audit professionals to design and implement a Additive Fibonacci Generators with
policy that not only meets SOC 2 Type II Improved Characteristics for
requirements but also supports the Cybersecurity Needs, Appl. Sci. 12(3)
organization’s overall data governance (2022) 1519. doi:
strategy. The proposed solution aims to 10.3390/app12031519.
demonstrate the simplicity of the process that [9] V. Maksymovych, et al., Combined
can be developed using the technologies and Pseudo-Random Sequence Generator for
resources that are acceptable to the company Cybersecurity, Sensors 22(24) (2022)
within an affordable budget. 9700. doi: 10.3390/s22249700.
[10] URL: https://secureframe.com/hub/
References soc-2/compliance-documentation
[11] URL: https://www.iso.org/standard/
27001
[1] B. Matturdi, et al., Big Data Security and
[12] V. Buriachok, et al., Invasion Detection
Privacy: A review, China Communi-
Model using Two-Stage Criterion of
cations, 11(14) (2014) 135–145. doi:
Detection of Network Anomalies, in:
10.1109/CC.2014.7085614.
Workshop on Cybersecurity Providing in
[2] V. Susukailo, I. Opirskyy, S. Vasylyshyn,
Information and Telecommunication
Analysis of the Attack Vectors Used by
Systems, vol. 2746 (2020) 23–32.
Threat Actors During the Pandemic,
[13] P. Anakhov, et al., Evaluation Method of
IEEE 15th International Scientific and
the Physical Compatibility of Equipment
Technical Conference on Computer
in a Hybrid Information Transmission
Sciences and Information Technologies
Network, J. Theor. Appl. Inf. Technol.
(2020) 261–264.
100(22) (2022) 6635–6644.
[3] M. Islam, et al., Security Threats for Big
[14] P. Skladannyi, et al., Improving the
Data: An Empirical Study, Int. J. Inf.
Security Policy of the Distance Learning
408
System based on the Zero Trust Concept, /frc/assuranceadvisoryservices/soc-
in: Cybersecurity Providing in for-service-organizations
Information and Telecommunication [26] E. Gelbstein, IS Audit Basics: The
Systems, vol. 3421 (2023) 97–106. Domains of Data and Information Audits,
[15] V. Maksymovych, et al., Simulation of ISACA J. 6 (2016).
Authentication in Information- [27] U. Mattsson, Practical Data Security and
Processing Electronic Devices Based on Privacy for GDPR and CCPA, ISACA J. 3
Poisson Pulse Sequence Generators. (3) (2020).
Electronics 11(13) (2022) 2039. doi: [28] G. Pearce, Boosting Cyber Security With
10.3390/electronics11132039. Data Governance and Enterprise Data
[16] J. Yi, Y. Wen, An Improved Data Backup Management, ISACA J. 3 (2017).
Scheme Based on Multi-Factor [29] D. Cannon, IT Service Management: A
Authentication, IEEE 9th Intl Conference Guide for ITIL Foundation Exam
on Big Data Security on Cloud Candidates, BCS (2012).
(BigDataSecurity), IEEE Intl Conference [30] A. Harper, et al., Gray Hat Hacking: The
on High Performance and Smart Ethical Hacker’s Handbook, McGraw Hill
Computing (HPSC), IEEE Intl Conference (2015).
on Intelligent Data and Security (IDS) [31] C. Cote, M. Lah, Professional Microsoft
(2023). doi: 10.1109/BigDataSecurity- SQL Server 2014 Integration Services
HPSC-IDS58521.2023.00041. (SSIS), Wrox (2014).
[17] D. Shevchuk, et al., Designing Secured [32] S. Chauhan, Mastering Apache Airflow
Services for Authentication, Authori- (2020).
zation, and Accounting of Users, in: [33] A. Gaikwad, Learning AWS Glue (2021).
Cybersecurity Providing in Information [34] D. Anoshin, R. Avdeev, R. van Vliet, Azure
and Telecommunication Systems II Vol. Data Factory Cookbook (2020).
3550 (2023) 217–225. [35] N. Karumanchi, Data Structures and
[18] A. Calder, S. Watkins, IT Governance: An Algorithms Made Easy: Data Structures
International Guide to Data Security and and Algorithmic Puzzles (2011).
ISO27001/ISO27002, Kogan Page [36] R. Watson, Data Management: Databases
(2019). and Organizations (2017).
[19] ARMA International, “Information [37] S. Hoberman, Data Modeling Made
Classification: Getting It Right”. URL: Simple: A Practical Guide for Business
https://www.arma.org/ and IT Professionals (2005).
[20] Vic (J.R.) Winkler, Securing the Cloud: [38] C. Aggarwa, Data Classification:
Cloud Computer Security Techniques Algorithms and Applications (2014).
and Tactics (2011). doi: 10.1016/C2009- [39] Y. Duhamel, Microsoft Power Platform
0-30544-9. Enterprise Architecture (2020).
[21] D. Alexander, et al., Information Security [40] R. Collie, A. Singh, Power BI: Moving
Management Principles, BCS, The Beyond Power Pivot and Excel (2020).
Chartered Institute for IT, Updated [41] AICPA, Understanding SOC 2 Reports.
edition (2013). URL: https://www.aicpa.org/
[22] M. Rhodes-Ousley, Information Security: interestareas/frc/assuranceadvisoryser
The Complete Reference, Second Edition vices/aicpasoc2report.html
(2012). [42] Why SOC 2 Type II Certification Matters.
[23] M. Harkins, Managing Risk and URL: https://www.alertlogic.com/blog/
Information Security: Protect to Enable why-soc-2-type-ii-certification-matters/
(2016).
[24] T. Peltier, Information Security Policies,
Procedures, and Standards: Guidelines
for Effective Information Security
Management (2016).
[25] AICPA “SOC 2®—SOC for Service
Organizations: Trust Services Criteria”.
URL: https://us.aicpa.org/ interestareas
409