Data Governance Policy
This policy defines comprehensive standards for data classification, handling, retention, disposal, and access control within the SOC environment. All SOC personnel must follow these guidelines when handling any data.
1. Data Classification Levels
| Level |
Label |
Description |
Examples |
Access Control |
| L4 |
🔴 Restricted |
Extremely sensitive, loss would cause severe harm |
Credentials, encryption keys, PII (sensitive), payment data |
Named individuals only, MFA required |
| L3 |
🟠 Confidential |
Sensitive operational data |
Investigation details, IoCs, incident reports, threat intel |
SOC team + management, need-to-know |
| L2 |
🟡 Internal |
Internal use, not for external sharing |
SOPs, procedures, operational metrics, architecture docs |
All employees |
| L1 |
🟢 Public |
Safe for public consumption |
Published advisories, open-source tools, public reports |
Anyone |
2. Handling Requirements
2.1 Storage
| Classification |
Storage Location |
Encryption |
Backup |
| Restricted |
Encrypted vault, access-logged |
AES-256 at rest + in transit |
Encrypted backup, separate key |
| Confidential |
Access-controlled storage |
At rest encryption required |
Standard encrypted backup |
| Internal |
Standard enterprise storage |
Disk-level encryption |
Standard backup |
| Public |
Any approved storage |
Optional |
Best effort |
2.2 Transmission
| Classification |
Allowed Channels |
Requirements |
| Restricted |
Encrypted email (S/MIME/PGP), encrypted share |
TLP:RED label, end-to-end encryption |
| Confidential |
Encrypted email, internal chat, VPN |
TLP:AMBER label, encryption preferred |
| Internal |
Internal email, chat, intranet |
TLP:GREEN label |
| Public |
Any channel |
TLP:CLEAR label |
2.3 Retention & Disposal
| Classification |
Retention Period |
Disposal Method |
Verification |
| Restricted |
Per regulation (PDPA: min 1 year) |
Secure delete (DoD 5220.22-M) + log |
Written confirmation |
| Confidential |
1 year after case closure |
Secure delete |
Audit log |
| Internal |
Per policy (typically 3 years) |
Standard delete |
N/A |
| Public |
Indefinite |
Standard delete |
N/A |
3. SOC-Specific Data Guidelines
3.1 Log Data
| Aspect |
Requirement |
| Hot storage |
90 days minimum (SIEM) |
| Warm storage |
90 days–1 year (archive/data lake) |
| Cold storage |
1–7 years (compliance, legal hold) |
| Classification |
L2 (Internal) by default, L3 if contains PII/IoCs |
3.2 Incident Evidence
| Aspect |
Requirement |
| Retention |
1 year after case closure (or per legal hold) |
| Chain of custody |
Documented in incident report |
| Classification |
L3 (Confidential) minimum, L4 if PII involved |
| Storage |
Read-only, hash-verified, access-logged |
3.3 Threat Intelligence
| Aspect |
Requirement |
| IoC feeds |
Refresh per feed schedule (5 min–24 hours) |
| Historical IoCs |
Archive for correlation, review quarterly |
| TLP handling |
Follow TLP protocol strictly |
| Classification |
L3 (Confidential), L2 for published advisories |
3.4 Personal Data (PII)
| Aspect |
Requirement |
| Collection |
Minimize, collect only what's necessary for investigation |
| Processing |
Follow PDPA Compliance |
| Breach notification |
Within 72 hours per PDPA |
| Classification |
L4 (Restricted) for sensitive PII |
3.5 Third-Party Data
| Aspect |
Requirement |
| Handling |
Per vendor agreement / NDA terms |
| Sharing |
Only with authorized parties per contract |
| Retention |
Per contract terms |
| Classification |
At minimum L2, typically L3 |
4. Access Control
| Principle |
Implementation |
| Least privilege |
Grant minimum access needed for role |
| Need-to-know |
L3/L4 data only accessible to those involved in the case |
| Separation of duties |
Evidence handling requires dual sign-off |
| Access review |
Quarterly review of all data access permissions |
| Logging |
All access to L3/L4 data must be logged |
5. Compliance Mapping
| Framework |
Relevant Controls |
| ISO 27001 |
A.8.2 (Classification), A.8.3 (Media handling) |
| NIST 800-53 |
SC-28 (Protection at Rest), MP-6 (Media Sanitization) |
| PDPA |
Section 37 (Security measures), Section 40 (Breach notification) |
| PCI DSS |
Req 3 (Protect stored data), Req 7 (Restrict access) |
Data Classification Examples for SOC
| Data Type |
Classification |
TLP |
Retention |
Access |
| SIEM alert metadata |
Internal |
AMBER |
1 year |
All SOC |
| SIEM raw logs (with PII) |
Confidential |
AMBER |
90 days |
T2+ only |
| Forensic disk images |
Highly Confidential |
RED |
Case duration + 1 year |
Case team only |
| IOC feeds (public) |
Public |
CLEAR |
Indefinite |
All SOC |
| Incident reports (internal) |
Confidential |
AMBER |
3 years |
SOC + Management |
| Vulnerability scan results |
Confidential |
AMBER |
1 year |
SOC + IT |
| Threat intelligence (partner) |
Restricted |
AMBER/GREEN |
2 years |
CTI team |
| Employee PII from investigations |
Highly Confidential |
RED |
Case closure |
Lead analyst + DPO |
Data Lifecycle Management
graph LR
Create["📝 Create/<br/>Collect"] --> Classify["🏷️ Classify"]
Classify --> Store["💾 Store<br/>(encrypted)"]
Store --> Use["🔍 Process/<br/>Analyze"]
Use --> Share["📤 Share<br/>(per TLP)"]
Share --> Archive["📦 Archive"]
Archive --> Destroy["🗑️ Destroy<br/>(per policy)"]
| Phase |
SOC Responsibility |
Control |
| Create |
Log collection, evidence capture |
Automated via agents/SIEM |
| Classify |
Apply TLP label, data category |
Manual at creation |
| Store |
Encrypted storage per classification |
Automated encryption |
| Process |
Access only what's needed (minimization) |
RBAC enforcement |
| Share |
Follow TLP sharing rules |
DLP monitoring |
| Archive |
Move to cold storage per retention |
Automated lifecycle |
| Destroy |
Secure deletion with certificate |
Verified destruction |
Data Quality Standards
| Dimension |
Definition |
SOC Example |
Target |
| Completeness |
All required fields populated |
Every alert has source, dest, timestamp |
> 95% |
| Accuracy |
Data correctly represents reality |
Alert severity matches actual risk |
> 90% |
| Timeliness |
Data available when needed |
Logs arrive in SIEM within 5 min |
> 99% |
| Consistency |
Same data in different systems matches |
Ticket info matches SIEM data |
> 95% |
| Uniqueness |
No unnecessary duplicates |
One ticket per incident (not duplicated) |
100% |
References