Guides

Information Classification: Protecting the Right Data in the Right Way

Information classification is the foundation for effective security. Learn the process, classification levels and how to implement a working system.

  1. 80%
    of organisations have information they don't know they have
    Gartner
  2. Information
    Information classification is required in ISO 27001 A.5.12-A.5.14
    ISO 27001:2022
  3. GDPR
    GDPR requires appropriate security measures based on risk
    GDPR Art. 32

Why classify information?

Not all information is equally worth protecting. Treating everything the same — either with maximum or minimum protection — is inefficient and expensive. Information classification provides proportionality: the right protection for the right data.

The basic principle: If you don’t know what you have, you can’t protect it properly. Classification is the first step towards conscious information management.

The CIA Model

The three protection values:

ValueQuestionExample impact
ConfidentialityWhat happens if unauthorised people see this?Reputational damage, competitive loss, GDPR fines
IntegrityWhat happens if the information is changed?Wrong decisions, financial loss, dangerous products
AvailabilityWhat happens if we can’t access this?Business disruption, missed deadlines, customer impact

Assess all three separately. Information can have high confidentiality but low availability requirements (archived data), or high availability but low confidentiality (public website).

Classification Levels

Public

Information intended for the general public. No harm if it spreads. Examples: Press releases, marketing, public website.

Internal

Everyday information for internal use. Limited harm if leaked. Examples: Internal communications, procedures, meeting bookings.

Confidential

Sensitive information requiring protection. Significant harm if leaked. Examples: Customer data, business plans, personal data, contracts.

Strictly Confidential

Most valuable information to protect. Serious harm if leaked. Examples: Trade secrets, sensitive personal data, strategic plans.

Protection Measures by Level

LevelAccessStorageTransferDestruction
PublicEveryoneNo requirementsNo requirementsNo requirements
InternalEmployeesBasic protectionNormalNormal
ConfidentialNeed-to-knowEncryptionSecure channelSecure
Strictly ConfidentialStrictly limitedStrong encryptionEnd-to-endVerified destruction

The Classification Process

  1. Identify information assets Inventory what information exists. Systems, databases, documents, email, cloud services. Where is what stored? Who creates and uses it?
  2. Appoint information owners Each information category needs an owner — someone who understands the business value. Often department head or process owner, not IT.
  3. Assess CIA values The information owner assesses: What happens with lack of confidentiality? Integrity? Availability? Use consequence categories for impact.
  4. Assign classification level Based on CIA assessment, choose level. Highest individual value determines. High confidentiality + low integrity = Confidential.
  5. Define handling rules What protection measures apply to each level? Document in policy. Everyone must know how each level should be handled.
  6. Implement marking Mark information with classification. In documents, systems, email. Make it visible what applies.
  7. Train and follow up Employees must understand the system. What do the levels mean? How should they act? Follow up compliance.

Marking in Practice

Document marking:

  • Header/footer with classification level
  • Cover sheet for sensitive documents
  • File naming convention (e.g. CONF_report.docx)

Email marking:

  • Subject line: [CONFIDENTIAL]
  • Signature banner
  • Automatic marking in email client

System marking:

  • Metadata in document management system
  • Labels in SharePoint/Teams
  • DLP integration (Data Loss Prevention)

Physical marking:

  • Labels on binders and folders
  • Signage in rooms with sensitive information
  • Lockable cabinets for confidential material

Connection to GDPR

Personal data requires special attention when classifying:

Personal data typeTypical classificationRationale
Name, email (general)ConfidentialPersonal data, GDPR applies
National ID numbersStrictly confidentialSensitive, risk of misuse
Health dataStrictly confidentialSpecial category under GDPR
Trade union membershipStrictly confidentialSpecial category under GDPR
Public contact detailsPublicIntended for distribution

Connection to NIS2

NIS2 relevance:

NIS2 requires “appropriate technical and organisational measures” based on risk. Information classification is fundamental for:

  • Prioritising protection — Focus resources on critical information
  • Defining incident categories — What is “significant”?
  • Supplier requirements — What information may be shared externally?
  • Continuity planning — What must be restored first?

Article 21 requirements affecting classification:

  • Risk management (requires understanding of what is worth protecting)
  • Access control (based on information sensitivity)
  • Encryption (depending on classification)

Common Pitfalls

Over-classification

Everything becomes "confidential" to be safe. Result: Nobody takes classification seriously, the system is undermined.

IT-driven classification

IT determines classification without business input. They don't understand business value — only technology.

One-time exercise

Classification done once and never updated. New information ends up in limbo.

Complex system

Seven levels with 20 attributes. Nobody understands, nobody follows. Keep it simple.

No connection to protection

Classification exists on paper but nothing happens. Same protection for everything anyway.

Forgetting cloud services

Focus on internal but data in Dropbox, Google Drive, Slack isn't classified.

Automation

Manual classification doesn’t scale well. Modern tools can help:

FunctionDescription
Automatic discoveryScan systems for national ID numbers, credit cards, keywords
Suggest classificationAI-based suggestions based on content
MarkingAutomatic labels in documents and email
DLPPrevent confidential data being sent incorrectly
ReportingOverview of classified data

Implementation Tips

Start simple:

  1. Three-four levels are enough
  2. Focus on new information first
  3. Pilot department before organisation
  4. Iterate based on feedback

Secure buy-in:

  1. Management decision — policy required
  2. Information ownership — appoint responsible parties
  3. Training — everyone must understand
  4. Follow-up — measure compliance

Technical support:

  1. Document templates with marking
  2. Email classification
  3. DLP for monitoring
  4. Integrated tools

How Securapilot Can Help

Securapilot supports information classification:

  • Asset register — Inventory and classify assets
  • CIA assessment — Structured assessment of protection values
  • Classification policy — Templates and guidance
  • Risk connection — See how classification affects risk picture
  • Reporting — Overview of classified information

Book a demo and see how we support your classification work.


Frequently asked questions

How many classification levels are needed?

3-4 levels are sufficient for most organisations. More levels create complexity without corresponding benefit. Common: Public, Internal, Confidential, Strictly Confidential.

Who determines the classification?

The information owner classifies. This is the person or function responsible for the information from a business perspective, not IT. IT implements the protection.

Must we classify everything?

In practice, focus on information that is actively created and handled. Archived data can be classified retrospectively as needed. Start with the most critical.

What happens if you classify incorrectly?

Over-classification leads to unnecessary costs and obstacles. Under-classification involves risk. It's better to start cautiously and adjust than not classify at all.


#information classification#data classification#CIA#information security#GDPR#NIS2

We use anonymous statistics without cookies to improve the website. Read more