Insecurity
carelessness in protecting collected personal data from leaks and improper access due to faulty data storage and data practices
ENTITY
1 - Human
INTENT
2 - Unintentional
TIMING
3 - Other
Risk ID
mit1369
Domain lineage
2. Privacy & Security
2.1 > Compromise of privacy by leaking or correctly inferring sensitive information
Mitigation strategy
1. Mandatory Implementation of the Principle of Least Privilege and Zero Trust Architecture. Institute stringent access management controls, ensuring that all personnel are granted only the minimum data access and system permissions requisite for their specified professional duties, thereby substantially mitigating the scope for unintentional data exposure or improper access due to human error. 2. Establishment of a Robust Data Classification and Encryption Framework. Develop and enforce continuous data inventory and classification policies based on sensitivity and regulatory requirements. All sensitive personal data must be secured through strong, verifiable encryption protocols, both at rest (e.g., system and drive encryption) and in transit, to neutralize the risk associated with faulty data storage mechanisms. 3. Deployment of Continuous, Role-Specific Security Awareness and Training Programs. Proactively address the unintentional human factor by instituting mandatory, ongoing educational initiatives focused on secure data handling practices, the risks of phishing, and organizational policies, thereby cultivating a pervasive security-first culture and reducing instances of carelessness.