Data classification and labelling
Demonstrate that the organization has implemented a functional data classification scheme with documented categories, that data assets are consistently labelled according to defined criteria, and that labels are enforced through technical and procedural controls.
Description
What this control does
Data classification and labelling is the systematic categorization of organizational data assets based on sensitivity, regulatory requirements, and business impact, combined with the application of persistent metadata labels that travel with the data. Organizations define classification tiers (e.g., Public, Internal, Confidential, Restricted) with handling requirements for each tier, then apply labels manually or automatically using DLP tools, metadata tagging in file systems, or classification software. This control enables appropriate security measures to be applied proportionally, supports regulatory compliance (GDPR, HIPAA, PCI-DSS), and ensures personnel understand handling obligations when accessing information.
Control objective
What auditing this proves
Demonstrate that the organization has implemented a functional data classification scheme with documented categories, that data assets are consistently labelled according to defined criteria, and that labels are enforced through technical and procedural controls.
Associated risks
Risks this control addresses
- Highly sensitive data is transmitted or stored without encryption because personnel cannot distinguish it from lower-sensitivity information
- Insider exfiltrates confidential intellectual property or customer data due to absence of visual or technical indicators restricting access or egress
- Public disclosure of unclassified datasets containing embedded sensitive records that were never identified during collection or aggregation
- Regulatory non-compliance penalties result from failure to identify and protect personally identifiable information or protected health information subject to data protection laws
- Overclassification of mundane data creates unnecessary operational friction, excessive costs for storage and encryption, and user workarounds that bypass controls
- Incident response teams waste critical time during breach investigations trying to determine which compromised datasets require mandatory notification to authorities or affected individuals
- Third-party vendors receive sensitive data without contractual safeguards because sharing teams cannot identify classification levels requiring enhanced vendor due diligence
Live threat patterns this control mitigates:
Testing procedure
How an auditor verifies this control
- Obtain and review the organization's data classification policy, including definitions of each classification tier, assignment criteria, handling requirements, and roles responsible for classification decisions
- Request an inventory of systems, databases, file repositories, and cloud storage locations that store business data, and identify which asset owners have completed classification assessments
- Select a representative sample of at least 20 data assets spanning structured databases, unstructured file shares, cloud storage buckets, and email repositories across different business units
- Inspect each sampled asset for the presence of classification labels using appropriate tools: metadata properties for files, database schema tags, DLP system reports, or cloud resource tags
- Interview asset owners or data stewards for three sampled assets to verify they understand classification criteria and can articulate the rationale for assigned classification levels
- Review automated classification tool configurations (DLP, CASB, or information protection platforms) to confirm rule sets align with policy definitions and are actively scanning repositories
- Test enforcement by attempting to share or export a sample of classified assets through email, cloud sharing, or removable media to confirm technical controls prevent or flag policy violations
- Examine access logs or DLP reports for the past 90 days to identify instances where users handled classified data, and verify appropriate warnings, justifications, or approvals were captured
Where this control is tested