Data Classification: Secure Cloud Adoption
Data Classification: Secure Cloud Adoption
March 2020
Notices
Customers are responsible for making their own independent assessment of the
information in this document. This document: (a) is for informational purposes only, (b)
represents current AWS product offerings and practices, which are subject to change
without notice, and (c) does not create any commitments or assurances from AWS and
its affiliates, suppliers or licensors. AWS products or services are provided “as is”
without warranties, representations, or conditions of any kind, whether express or
implied. The responsibilities and liabilities of AWS to its customers are controlled by
AWS agreements, and this document is not part of, nor does it modify, any agreement
between AWS and its customers.
© 2020 Amazon Web Services, Inc. or its affiliates. All rights reserved.
Contents
Data Classification Overview ..............................................................................................1
Data Classification Value .................................................................................................1
Data Classification Process .............................................................................................2
Existing Data Classification Models ....................................................................................3
U.S. National Security Classification Scheme.................................................................4
U.S. Information Categorization Scheme ........................................................................5
United Kingdom (UK) Data Classification Scheme .........................................................5
Customer Considerations for Implementing Data Classification Schemes .......................6
Data Classification and Privacy Considerations .................................................................7
Newer Considerations in Data Classification......................................................................7
AWS Recommendations .....................................................................................................8
Enterprise Approaches ......................................................................................................10
Leveraging AWS Cloud to Support Data Classification ...................................................12
Document Revisions..........................................................................................................14
Abstract
This paper provides insight into data classification categories for public and private
organizations to consider when moving data to the cloud. It outlines a process through
which customers can build data classification program, shares examples of data and the
corresponding category it may fall into, and outlines practices and models currently
implemented by global first movers and early adopters along with data classification and
privacy considerations. It also examines how implementation of data classification
program can simplify cloud adoption and management, and recommends that
customers leverage internationally recognized standards and frameworks when
developing their own data classification rules.
Amazon Web Services Data Classification
Page 1
Amazon Web Services Data Classification
It is important to note the risks with over classifying data. Sometimes organizations err
by broadly classifying large disparate sets of data at the same sensitivity level. This
over-classification can incur unwarranted expenses by putting into place costly controls
that can additionally impact business operations. This approach can also divert attention
to less critical datasets and limit business use of the data through unnecessary
compliance requirements due to over classification.
1 ISO 27001/27002 is a widely-adopted global security standard that sets out requirements and best practices for a
systematic approach to managing company and customer information that’s based on periodic risk assessments
appropriate to ever-changing threat scenarios
2 https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-60v1r1.pdf
Page 2
Amazon Web Services Data Classification
4. Handling of assets: When data sets are assigned a classification tier, data is
handled according to the handling guidelines appropriate for that level, which
include specific security controls. These handling procedures should be
formalized but also adjust as technology changes. (Refer to “Customer
Considerations for Implementing Data Classification Schemes” below for
additional information on data handling.
5. Continuous monitoring: Continue to monitor the security, usage and access
patterns of systems and data. This can be done through automated (preferred) or
manual processes to identify external threats, maintain normal system
operations, install updates, and track changes to the environment.
The city of Washington, D.C. implemented a new data policy in 2017 focused on
being more transparent, while still protecting sensitive data. While Washington
D.C. implemented a five tier model, these tiers can align with other widely-
adopted three-tier classification schemes used in cloud accreditation regimes.3
Level 0 — Open Data. Data readily available to the public on open government
websites and datasets.
Level 1 — Public Data, Not Proactively Released. Data not protected from
public disclosure or subject to withholding under any law, regulation, or contract.
Publication of the data on the public Internet would have the potential to
jeopardize the safety, privacy, or security of anyone identified in the information.
3 https://octo.dc.gov/page/district-columbia-data-policy
Page 3
Amazon Web Services Data Classification
Level 2 — For District Government Use. Data that is not highly sensitive and
may be distributed within the government without restriction by law, regulation, or
contract. It is primarily daily government business operations data.
Within these classification tiers there are also secondary labels that can be applied that
give origination information and can modify the handling instructions. The U.S. also
uses the term “unclassified data” to refer to any data that is not classified under the
three classification levels. Even with unclassified data, there is the potential use of
secondary labels for sensitive information, such as “For Official Use Only” (FOUO) and
“Controlled Unclassified Information” (CUI) that restrict disclosure to the public or
unauthorized personnel.
Page 4
Amazon Web Services Data Classification
According to Fiscal Year 2015 data4, U.S. federal departments and agencies
categorized 88 percent of their systems into the low and moderate categories. AWS has
regions and services that are accredited to support all types of data categories and
classifications.
1. Official — Routine business operations and services, some of which could have
damaging consequences if lost, stolen, or published in the media, but none of
which is subject to a heightened threat profile.
4 https://www.gao.gov/assets/710/700588.pdf
Page 5
Amazon Web Services Data Classification
5 https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/251481/Government -
Security-Classifications-Supplier-Briefing-Oct-2013.pdf
6 https://www.ncsc.gov.uk/collection/cloud-security?curPage=/collection/cloud-security/implementing-the-cloud-security-
principles
Page 6
Amazon Web Services Data Classification
owner and are responsible for classifying their data and determining the security
accreditation that they expect their CSP to meet.
It is important to note that organizations applying a blanket high classification level to all
data (despite its true risk posture) do not reflect a risk-based, outcome-focused
approach to security. Protecting data classified at higher levels requires a higher
standard of care, which translates into the customer spending increased resources on
securing, monitoring, measuring, remediating, and reporting risks. It is impractical to
commit the significant resources required to securely manage higher impact data for
data that does not meet the requisite thresholds. Also, the additional controls placed on
data at the lower classification levels can negatively affect the availability, completeness
or timeliness of that data to the general workforce, customers, and/or constituents.
Where risks can be managed so that data is handled at a lower classification level,
organizations will experience the most flexibility around how they use that data.
Page 7
Amazon Web Services Data Classification
AWS Recommendations
In most cases, AWS recommends starting with a three-tiered data classification
approach (Table 1), which has shown to sufficiently meet both public and commercial
customer needs and requirements. As an example, the table below includes three tiers
and a naming convention for each tier. For organizations that have more complex data
environments or varied data types, secondary labeling is helpful without adding
complexity with more tiers. We recommend using the minimal number of tiers that
makes sense for the organization.
Page 8
Amazon Web Services Data Classification
System Security
Data Classification Categorization Cloud Deployment Model Options
Organizations should select the appropriate cloud deployment model according to their
specific needs, the type of data they handle, and assessed risk (refer to table below).
Depending on the classification of the data, they will need to apply the relevant security
controls (e.g., encryption) within their cloud environment.
Page 9
Amazon Web Services Data Classification
When organizations have fully evaluated the commercial cloud with its numerous
security benefits, they may find that the vast majority of their workloads can be
deployed in the cloud with due regard to a data classification scheme, similar to
what the US and UK governments have done.
Enterprise Approaches
This section identifies industry-specific examples for data classification, which may
include sector-specific requirements. As mentioned earlier, different data types (e.g.,
government, financial, and healthcare data) may require additional considerations for
tiers and secondary labels to address different handling procedures. Regardless of data
belonging to public or commercial entities, customers must conduct the due diligence of
adhering to local compliance and regulatory requirements.
The following chart contains examples of data classification schemes in practice today,
descriptions of what can be included in that category based on tier, and examples of
workload types for a particular tier.
Example 1
Data Classification Examples of Workloads
Page 10
Amazon Web Services Data Classification
Example 2
Data
Classification Examples
Tier 3 – Highly Highly sensitive trade secret and material confidential business
Strategic information (e.g., certain pricing, merger/acquisition information,
marketing plan, proprietary processes, marketing plans, new
product designs, inventions prior to a patent application or held
as trade secret) the public disclosure of which could be
expected to cause severe or catastrophic legal, financial or
reputational damage.
Tier 2 – Restricted Most material and non-material business data (e.g., email, sales
and marketing account data, executed contracts, receipts)
Information required by law to be protected from unauthorized
disclosure
Employee HR records (including employee disciplinary reports)
Page 11
Amazon Web Services Data Classification
AWS services offer the same high level of security to all customers, regardless of the
type of content being stored. AWS adopts a high security bar across all services. These
services are then queued for certification against international security and compliance
“gold” standards, which translates to customers benefiting from elevated levels of
protection for customer data processed and stored in the cloud. The risk events and
threat vectors of greatest concern are largely accounted for through foundational cyber
hygiene disciplines (e.g., patching and configuring systems), which CSPs can
demonstrate through widely adopted, internationally-recognized security certifications
such as ISO 270017, Payment Card Industry Data Security Standard (PCI DSS)8, and
Service Organization Controls (SOC)9. In evaluating CSPs, customers should leverage
these existing CSP certifications so that the customer can appropriately determine
whether a CSP (and services within the CSP’s offerings) can support their data
classification requirements. We encourage organizations to implement a policy
identifying which existing national, international, or sector-specific cloud certifications
7 ISO 27001/27002 is a widely-adopted global security standard that sets out requirements and best practices for a
systematic approach to managing company and customer information tha t’s based on periodic risk assessments
appropriate to ever-changing threat scenarios
8 The Payment Card Industry Data Security Standard (also known as PCI DSS) is a proprietary information security standard
administered by the PCI Security Standards Council (https://www.pcisecuritystandards.org/), which was founded by
American Express, Discover Financial Services, JCB International, MasterCard Worldwide and Visa Inc. PCI DSS applies to
all entities that store, process or transmit card
9 Service Organization Controls reports (SOC 1, 2, 3) are intended to meet a broad range of financial auditing requirements
for U.S. and international auditing bodies. The audit for this report is conducted in accordance with the International
Standards for Assurance Engagements No. 3402 (ISAE 3402) and the American Institute of Certified Public Accountants
(AICPA): AT 801 (formerly SSAE 16).
Page 12
Amazon Web Services Data Classification
and attestations are acceptable for each level in the data classification scheme to
streamline accreditation and accelerate migrating workloads to the cloud.
AWS offers several services and features that can facilitate an organization’s
implementation of a data classification scheme. For example, Amazon Macie can help
customers inventory and classify sensitive and business-critical data stored in AWS.
Amazon Macie uses machine learning to automate the process of discovering,
classifying, labeling, and applying protection rules to data. This helps customers better
understand where sensitive information is stored and how it’s being accessed, including
user authentications and access patterns.
Other AWS services and features that can support data classification include, but are
not limited to:
• AWS Identity and Access Management (IAM) for managing user credentials,
setting permissions, and authorizing access.
• AWS Organizations helps you centrally govern your environment with automated
account creation, accounts grouping to reflect your business needs, and policies
to enforce governance. Policies can include required actions such as tagging of
resources
• AWS Glue to store data and discover associated metadata like table definition
and schema, in the AWS Glue Data Catalog. Once cataloged, your data is
immediately searchable and available for ETL.
• Amazon Neptune, fully managed graph database, can give customers insights
into the relationships between different data sets. This can include identification
and traceability of sensitive data through metadata analysis.
• AWS KMS or AWS CloudHSM for encryption key Management with AWS-
generated keys or bring your own key (BYOK) with FIPS 140-2 validation.
• AWS CloudTrail for extensive logging to track who, what, and when data was
created, accessed, copied/ moved, modified, and deleted.
• AWS Systems Manager to view and manage service operations like patching
along with AWS Inspector to conduct vulnerability scans.
Page 13
Amazon Web Services Data Classification
• AWS Web Application Firewall (WAF) and AWS Shield to protect web
applications from common attack vectors (e.g., SQL Injection, Cross-Site
Scripting, and DDoS).
To review the entire list of AWS security services, see Security, Identity, and
Compliance on AWS.
Document Revisions
Date Description
March 2020 Updated to reflect latest services and technologies.
Page 14