Internet DRAFT - draft-li-saag-data-security-maturity-model
draft-li-saag-data-security-maturity-model
SAAG Working Group K. Li
Internet-Draft Alibaba Group
Intended status: Standards Track Mar 20, 2016
Expires: September 21, 2016
Data Security Maturity Model
draft-li-saag-data-security-maturity-model-00
Abstract
Data Security Maturity Model (DSMM) provides a multi-level maturity
model to help organizations to measure their data security capability
maturity level, identify issues related to data security capability,
and improve their data security capability.
Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on September 21, 2016.
Copyright Notice
Copyright (c) 2016 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
Li Expires September 21, 2016 [Page 1]
Internet-Draft scjwt Mar 2016
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Notational Conventions . . . . . . . . . . . . . . . . . . 3
2. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Maturity Level . . . . . . . . . . . . . . . . . . . . . . . . 4
4. Model Framework . . . . . . . . . . . . . . . . . . . . . . . . 4
5. Data Lifecycle . . . . . . . . . . . . . . . . . . . . . . . . 4
6. Capability Dimension . . . . . . . . . . . . . . . . . . . . . 5
7. Assessment Method . . . . . . . . . . . . . . . . . . . . . . . 6
8. Model Domains . . . . . . . . . . . . . . . . . . . . . . . . . 6
9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 6
10. Security Considerations . . . . . . . . . . . . . . . . . . . . 6
11. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 6
12. Normative References . . . . . . . . . . . . . . . . . . . . . 6
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 7
Li Expires September 21, 2016 [Page 2]
Internet-Draft scjwt Mar 2016
1. Introduction
The overall goal of Data Security Maturity Model (DSMM) is to provide
a multi-level maturity model to help organizations solving the
problems of data security management in big data era, including:
o How to build organizations data security capability
o How to measure the data security capability maturity level of an
organization
o How to identify issues about data security capability
o How to improve data security capability for organizations
1.1. Notational Conventions
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in RFC
2119 [RFC2119].
2. Overview
The DSMM is a process management and improvement maturity model for
the development and management of data security services. It
consists of best practices that address the security issues in the
lifecycle of data management from creation to delivery and
maintenance. The practices related to the DSMM model are extensible
and applicable to any organization objectives. The model presents an
organized set of practices and goals necessary for the data security.
The DSMM defines the requirements for organization responsibilities,
institution processes, technology tools, and staff skills, to ensure
data security management in the organizations. It does not describe
how organizations must do something, but rather what they must do in
order to achieve high capabilities or maturity of data security
management. By providing a structured and standard framework of
practices, the DSMM can be used by organizations to build their own
roadmap of data security maturity management. The DSMM has an
accompanying standardized methodology for conducting objective
appraisals of capability and maturity levels within the organizations
data security management practice.
The DSMM applies to all kinds of organizations, including industry
enterprises, governments and research institutes.
Li Expires September 21, 2016 [Page 3]
Internet-Draft scjwt Mar 2016
3. Maturity Level
Data Security Maturity Model can be indicated by 5 levels, as
described below:
o Level 1: Performed Informally
o Level 2: Planned and Tracked
o Level 3: Well Defined
o Level 4: Quantitatively Controlled
o Level 5: Level 5: Continuously Improving
4. Model Framework
/- - - - - - - - - - - - - - - - -/- - -/ - -/- -/ - /- - /|
/ Staff Skil / D / D / D / D / D / |
/- - - - - - - - - - - - - - - - -/ a / a / a / a / a / |
/ Technology Tools / t / t / t / t / t / |
/- - - - - - - - - - - - - - - - -/ a / a / a / a / a / |
/ Institution Process / / / / / / |
/_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _/ / / / / / |
/ Organization Responsibilities / / / / / D / |
/_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ / | | | | e / |
|Level 5: Continuously Improving | | | | | s | /
|_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ | C | | | T | t | /
|Level 4: Quantitatively Controlled| r | S | | r | r | /
|- - - - - - - - - - - - - - - - - | e | t | | a | u | /
|Level 3: Well Defined | a | o | | n | c | /
|- - - - - - - - - - - - - - - - - | t | r | U | s | t | /
|Level 2: Planned and Tracked | i | a | a | m | i | /
|- - - - - - - - - - - - - - - - - | o | g | g | i | o | /
|Level 1: Performed Informally | n | e | e | t | n |/
|_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ |_ _ |_ _ |_ _| _ |_ _/
Figure 1 Model Framework
5. Data Lifecycle
The high-level descriptions for data lifecycle are:
Li Expires September 21, 2016 [Page 4]
Internet-Draft scjwt Mar 2016
o 1) Data Creation: Data creation is the generation of new digital
content, or the significant alteration/updating of existing
content, either structured or unstructured.
o 2) Data Usage: Data usage refers to the combination of a series of
activities towards active data.
o 3) Data Transmission: Data transition refers to the process that
data flows from one entity to another through the network.
o 4) Data Storage: Data storage refers to inactive data, which is
stored physically in any digital form.
o 5) Data Sharing: Data sharing refers to data exchanging between
organizations, customers and partners.
o 6) Data Destruction: Data destruction refers to the process of
permanently or temperately making the data unavailable using
physical or digital means (e.g., crypto-shredding, freezing data
under business context).
6. Capability Dimension
The DSMM model defines the organization capability in four
dimensions, namely:
o 1) Organization Responsibilities: The first and most important
capability the organization should build is its data security
organization, including its function and responsibility, security
consciousness. It addresses the need to drive organizational data
security management from the top down effort, and in this way,
organizations can be open and transparent, break down silos and
get internal teams to collaborate. It is important to get
executive support, to champion data security adoption from the top
down.
o 2)Institution Process: This capability involves the creation of
process. This means that organizations need to put processes and
frameworks in place to operationalize data security management
internally and externally. It enables tight collaboration between
different teams and entities like legal teams, IT, Crisis PR,
various business units and external business parties.
o 3)Technology Tools: Organizations have to invest in security
technology to facilitate the data security controls it employed,
especially under current big data era. Manual controls or
management controls have been verified inefficient. One of the
Li Expires September 21, 2016 [Page 5]
Internet-Draft scjwt Mar 2016
challenges within this capability is that there are various
technologies available to choose thus organizations need to think
strategically with proper assessment before investing. Ensuring
that the technology can scale and integrate with existing
applications that already exist in the enterprise is imperative.
o 4)Staff Skills: Organizations have to educate their staffs, to get
more security awareness training, and improve their security
skills.
7. Assessment Method
The DSMM model uses bottom-up method to assess and determine the data
security maturity level of an organization. Each domain in one data
lifecycle phase should be assessed and be given a single maturity
level as the assessment result of the domain. Then, take the minimum
level of these domains as the assessment result of the data lifecycle
phase. Finally, the minimum maturity level of all 6 data lifecycle
phases is the overall maturity of the organization.
8. Model Domains
TBD
9. IANA Considerations
This draft does not require any IANA registrations.
10. Security Considerations
TBD.
11. Acknowledgements
TBD
12. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/
RFC2119, March 1997,
<http://www.rfc-editor.org/info/rfc2119>.
Li Expires September 21, 2016 [Page 6]
Internet-Draft scjwt Mar 2016
Author's Address
Kepeng Li
Alibaba Group
Email: kepeng.lkp@alibaba-inc.com
Li Expires September 21, 2016 [Page 7]