Data Classification & Asset Inventory
Phân loại Dữ liệu & Kiểm kê Tài sản
Theory
Asset Types
An asset is anything of value to an organization. The six primary asset types are: information (data), software (applications, OS), hardware (servers, laptops), physical (facilities, cables), services (cloud, utilities), and people (skills, knowledge). All require classification and protection.
Government Classification Levels
Used in military and government contexts — from highest to lowest sensitivity:
| Level | Description |
|---|---|
| Top Secret | Unauthorized disclosure could cause exceptionally grave damage to national security |
| Secret | Serious damage to national security |
| Confidential | Damage to national security |
| SBU (Sensitive but Unclassified) | Sensitive but not classified (e.g., For Official Use Only) |
| Unclassified | No expected damage; can be released publicly |
Commercial Classification (FinTech Company X Context)
| Level | Tiếng Việt | FinTech Company X Examples |
|---|---|---|
| Restricted | Tuyệt mật | Customer PII (CCCD, biometrics, credit scores), AML results |
| Confidential | Bí mật | Loan application data, credit decisions, partner API keys, signed PDFs |
| Internal | Nội bộ | Architecture docs, runbooks, internal APIs, deployment configs |
| Public | Công khai | Marketing content, public API docs, job postings |
Classification Criteria
- Sensitivity: What harm results if this data is disclosed without authorization?
- Criticality: How important is this data to operational continuity?
- Regulatory requirement: What law or standard governs this data? (Decree 13/2023, DPA 2012, PCI-DSS)
Asset Inventory & CMDB
"You can't protect what you haven't inventoried." A CMDB (Configuration Management Database) tracks all assets, their relationships, owners, and classifications. Asset inventory must be completed before classification can occur.
Classification process: Identify asset → Determine classification → Label → Apply controls → Review periodically
Over- vs Under-Classification
- Over-classification: Wastes money — applies expensive controls to data that doesn't need them
- Under-classification: Creates compliance risk and data breach exposure — insufficient controls for sensitive data
Key Terms
Exam Tips
Work Application — FinTech Company X
| Data Type | Classification | Key Control |
|---|---|---|
| Customer PII (CCCD, phone, address) | Restricted | AES-256-CTR (Platform C), Decree 13/2023 consent |
| Biometric data (eKYC Vendor) | Restricted | DPA with eKYC Vendor, separate encrypted store |
| Credit scores & AML results | Restricted | Need-to-know RBAC, audit trail |
| Loan application data | Confidential | Encrypted at rest & in transit, DPA/NDA with partners |
| Signed PDFs (GCS) | Confidential | GCS encryption, access-controlled bucket |
| Card tokens (no PAN) | Confidential | PCI-DSS tokenization; PAN never stored |
| Architecture docs & runbooks | Internal | Internal access only, Git repo controls |
| Audit logs | Confidential | Immutable log store, SIEM access controlled |
| Public API docs & marketing | Public | Standard web controls, no sensitive data |
Practice Questions
Q1. In the Platform C platform, customer biometric data (facial recognition via eKYC Vendor) should be classified at which commercial level?
A) Public B) Internal C) Confidential D) Restricted
✓ D) RestrictedQ2. Which classification error creates the greatest compliance and breach risk?
A) Over-classification B) Under-classification C) Mis-labeling D) Late classification
✓ B) Under-classificationQ3. A government employee asks: which classification level sits BETWEEN Secret and SBU? (Government schema)
A) Top Secret B) Confidential C) Internal D) Restricted
✓ B) ConfidentialQ4. What is the primary purpose of a Configuration Management Database (CMDB) in the context of data classification?
A) Store encrypted data B) Track assets, owners, and classification C) Monitor network traffic D) Automate patch management
✓ B) Track assets, owners, and classificationQ5. Before classifying data, what must an organization complete first?
A) Implement encryption B) Define access control policies C) Complete asset inventory D) Train all employees
✓ C) Complete asset inventory