Establish and Maintain a Data Management Process
Description
Establish and maintain a data management process. In the process, address data sensitivity, data owner, handling of data, data retention limits, and disposal requirements, based on sensitivity and retention standards for the enterprise. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
Implementation Checklist
Tool Recommendations
Data governance and compliance platform with DLP, information protection, sensitivity labels, and insider risk management
Microsoft · Per-user subscription (E5/standalone)
Enterprise data loss prevention covering endpoint, network, storage, and cloud channels with policy-based content inspection
Broadcom · Enterprise license
Cloud-native DLP and CASB platform providing inline data protection for SaaS, IaaS, web, and endpoint
Netskope · Per-user subscription
Threats & Vulnerabilities (CIS RAM)
Threat Scenarios
Uncontrolled Sensitive Data Sprawl
ConfidentialityWithout a data management process, sensitive data proliferates across uncontrolled locations including personal drives, shadow IT services, and unsecured file shares.
Regulatory Violation from Undefined Data Handling
ConfidentialityAbsence of defined data sensitivity levels and handling requirements leads to GDPR, HIPAA, or PCI DSS violations when regulated data is processed without appropriate safeguards.
Data Hoarding Leading to Increased Breach Impact
ConfidentialityWithout data retention and disposal requirements, organizations retain data indefinitely, massively increasing the volume and sensitivity of data exposed during a breach.
Vulnerabilities (When Safeguard Absent)
No Formal Data Management Process
Without established data management procedures, there are no consistent rules for how data is classified, handled, retained, or disposed of across the enterprise.
Undefined Data Ownership and Accountability
The absence of designated data owners means no one is accountable for ensuring sensitive data receives appropriate protection throughout its lifecycle.
Evidence Requirements
| Type | Evidence Item | Collection Frequency |
|---|---|---|
| Document | Current inventory or catalog documentation | Maintained continuously, reviewed quarterly |
| Document | Process/procedure documentation for identification activities | Reviewed annually |
| Document | Governing policy document (current, approved, communicated) | Reviewed annually |