Experts in innovation strategies
Downloads Contact
English

Why Cetbix IT/OT Inventory

Processing activities internally
hyper-criticality.svg

As a CISO, CIO, or Security Manager, you are to maintain a record of all your organization’s processing activities internally and to make them available to supervisory authorities upon request.

Read More
Traditional Data Inventories
hyper_growth.svg

Cetbix Asset Classification covers both personal data and general data.  Organizations are overwhelmed with a lot of information. Addressing these challenges manually or repository by repository is time-consuming and error-prone. There is a better way – and it starts with a data inventory.

Read More
Advantage of Cetbix Inventory
hyper-sprawl.svg

Cetbix inventory enables organizations to create a data inventory for the prioritization of efforts, resources, and assessing risks.

Read More
vha_volvo.svg

Benefit 1

The process of setting up a data inventory with Cetbix is quite simple. 

  • Repository: The name of the system that contains the information (include details such as description, owner, location, access)
  • Type of data: This includes details such as description and whether or not it contains personal information.
  • Personal Information ID: PI Description (include a description of the personal information, PI Reason, and PI Policy).
  • Information Confidentiality Classification Scheme: Information are classified in terms of legal requirements. value, criticality, and sensitivity to unauthorized disclosure or modification.
  • Handling of Assets: Procedures  drawn up for handling processing, storing and communicating information consistent with its classification.
  • Sensitivity Level: Classifying data as to sensitivity to assure that proper security protection is in place appropriate with the given data set.
  • Retention Period: Consistent with records management practices, ensuring the period in which data is to be retained, to assure that data's availability and integrity for that retention period.
  • Data Utilization: Establishing appropriate procedures for how data is utilized. This includes access restrictions, proper handling, logging, and auditing.
  • Data Back-up: Assessing how back-up copies of data and software are created.
  • Management of Storage Media: Processes to ensure proper management of storage media, including restrictions of types of media, audit trails for movement of media, secure disposal of media no longer in use, and redundant storage.
  • Electronic Data Transfers
  • Disposal of Media
  • Risk Register
  • Confidentiality level
  • Methodolgy of Risk level of acceptance (default of customized)
  • Digital risk acceptance
  • Manual risk acceptance
  • Set Controls
  • Match Assets
  • Asset Mapping
  • Quantitative Risk Assessment
  • Qualitative Risk Assessment
  • Single Asset evaluation
  • Assign single or multiple assets
  • Risk Register
  • .....etc