Data Security Checklist
Data Security Checklist
Checklist
Protecting data in all its states—at rest, in use, and in
motion—requires administrators to implement
security measures specific to their organization's
needs. These include multiple processes ranging
from detecting critical data to enabling post-breach
root cause analysis. Not implementing these
processes can have devastating consequences for
organizations, including damaging data breaches
and massive non-compliance penalties.
www.datasecurityplus.com
Data security checklist template
What to do How to do it
Define data discovery rules Know what type of sensitive data you collect
and store. Create a combination of regular
expression and keyword match data discovery
rules specific to your organization.
Scan data stores for sensitive data Scan data stores (including images and audio
files) for sensitive data instances that match the
configured rules.
Map out the discovered sensitive data Know where your most critical data is stored.
Maintain an inventory of sensitive data instances
and keep it up to date by scanning files once
they are created and modified.
Categorize and classify sensitive data Use both automated and manual classification
methods to tag files based on their sensitivity.
This will help you define data protection
policies based on these tags.
Build file-based and user-based risk profiles Find out which storage location is most densely
comprised of sensitive data and which
employees store the most personal information.
Analyze data discovery results and create
detailed risk profiles for your storage
repository and users.
1 www.datasecurityplus.com
Step 2� Evaluate data security risks
What to do How to do it
Locate sensitive data stored outside Ensure that critical data is stored only where it
designated repositories should be. Establish workflows to move it from
open shares and other unsecure folders to
more protected locations.
Remove sensitive files stored beyond their Avoid non-compliance penalties by listing old,
retention periods stale, unmodified files and removing or archiving
them if they are obsolete.
Detect and discard duplicate copies of critical Improve data storage practices by listing and
files to maintain the integrity of master files removing duplicate copies of files.
Verify role-based access control and Scrutinize NTFS and share permissions to verify
least privilege that critical data is only accessible by those who
require access to it for their work
Perform periodic access rights reviews Prevent privilege creep and excessive access
rights by periodically reviewing permissions.
Spot and fix instances of broken inheritance Fix security vulnerabilities like broken
inheritances and openly accessible folders.
What to do How to do it
Track changes made to critical files Track file read, create, modify, overwrite, move,
rename, delete, and permission change events
in real time.
Set alerts for high-risk file modification, Set up triggers to receive instant notifications
move, delete, and permission change actions about potential data security threats and
anomalous file activities.
2 www.datasecurityplus.com
Implement comprehensive antivirus and Watch out for infected files, indicators of
anti-malware systems ongoing malware attacks, and other critical
signs of impending data breaches with
up-to-date malware detection tools.
Automate access reporting for Generate audit-ready reports to comply with the
compliance regulations GDPR, PCI DSS, HIPAA, and other regulations.
Store historical audit data for legal and
forensic requirements.
What to do How to do it
Monitor the use of removable storage media Track and analyze the use of removable
devices—including removable media devices
such as USBs or mobile phones—in your network.
Control the use of USB drives with allow Restrict the use of USB devices by selectively
lists and block lists blocking read, write, or execute actions in
USBs, and prevent unauthorized use by using
allow and block lists.
Manage the use of endpoints Block employees from using Wi-Fi, Bluetooth
devices, CD or DVD drives, and other endpoints
to limit the potential attack surface for
data security threats.
Prevent data leaks with policies for data Customize data leak prevention (DLP) policies
exfiltration attempts via endpoints for organization-specific use cases.
Prevent classified files from being removed Map DLP policies to file classification tags to
from the network granularly prevent restricted-use files from being
removed from the organizational network via
email, USB drives, etc.
Scan for vulnerabilities periodically Assess applications and endpoint devices for
vulnerabilities and remediate issues before they
can be used to carry out data theft.
3 www.datasecurityplus.com
Improve user awareness Train your end users about social engineering
attacks to prevent accidental data leaks from
endpoints.
Review and improve DLP processes Leak prevention is a process that should be
kept in line with changing business conditions
and needs. Continuously monitor the DLP
strategy you've implemented and improve it
wherever necessary.
What to do How to do it
Audit cloud application usage Use deep packet inspection to audit how actors
access cloud applications. Analyze upload,
download, and other activity details across
cloud storage and platforms such as Box,
Dropbox, and Microsoft 365.
Evaluate the risk associated with Score websites based on their reputation,
accessing web applications and take measures to limit the use of
low-reputed websites.
Control file uploads and downloads Prevent users from uploading sensitive files
to cloud repositories and from downloading
potentially malicious files.
Disclaimer: Data security requires a variety of solutions, processes, people, and technologies. This checklist is provided for
informational purposes only and should not be considered as legal advice. ManageEngine makes no warranties, express, implied,
or statutory, as to the efficacy of the information in this material.
4 www.datasecurityplus.com
How ManageEngine can help you streamline data security processes
Reinforce your measures to secure organizational data in all its states—at rest, in use, and in motion—with
ManageEngine DataSecurity Plus. DataSecurity Plus is a unified data visibility and security platform that:
Audits file changes in real time, triggers instant responses to critical events, shuts down ransomware intrusions,
and helps organizations comply with numerous IT regulations.
Analyzes file storage and security permissions, deletes junk files, and detects file security vulnerabilities.
Helps users assess the risks associated with sensitive data storage by locating and classifying files
containing PII, PCI, and ePHI.
Prevents data leaks via USBs, email, printers, and web applications; monitors file integrity; and audits
cloud application usage.
Next steps
Schedule a demo
manageengine.com/data-security/demo-form.html
Contact us
[email protected]
5 www.datasecurityplus.com