Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

3.1.1. Data Classification Schemes and Criteria

💡 First Principle: Classification decisions are risk decisions — the classification level assigned to data should reflect the actual harm that would result from unauthorized access, not the data's age, volume, or the effort required to collect it. Sensitivity drives classification; everything else is a consequence.

Government classification model (US):
LevelWho Can AccessHarm if DisclosedExample
Top SecretNeed-to-know + TS clearanceExceptionally grave damage to national securityIntelligence sources and methods, war plans
SecretNeed-to-know + Secret clearanceSerious damage to national securityMilitary deployment schedules
ConfidentialNeed-to-know + Confidential clearanceDamage to national securityPersonnel files, some weapons specifications
Controlled Unclassified Information (CUI)Defined by regulationVaries by CUI categoryLaw enforcement sensitive, export controlled
UnclassifiedGeneral accessNo national security harmPublic affairs materials
Common commercial classification model:
LevelTypical DefinitionHandling Implication
PublicIntended for public releaseNo special handling; can be freely shared
Internal UseInternal business information, not for external sharingDo not share outside organization; no special storage
ConfidentialSensitive business or customer dataEncrypt in transit and at rest; need-to-know access
Restricted / Highly ConfidentialMost sensitive data — PII, financial, trade secrets, health recordsStrongest controls; strict need-to-know; audit logging; enhanced encryption
Classification criteria — what determines the level:
  1. Regulatory requirement — HIPAA-covered PHI must be classified at least Confidential regardless of perceived sensitivity
  2. Harm from disclosure — Would disclosure embarrass the organization, create liability, harm individuals, or damage national security?
  3. Harm from modification — Would integrity breach cause financial harm, safety risk, or legal liability?
  4. Harm from unavailability — Would loss of access to this data halt critical business operations?
  5. Competitive sensitivity — Would disclosure give competitors material advantage?

Reclassification occurs when the sensitivity changes over time. Merger discussions (Restricted) that become public knowledge (Public) should be reclassified downward. New regulatory requirements may require upward reclassification of previously under-classified data. Data owners are responsible for triggering reclassification reviews; security teams and legal counsel advise.

⚠️ Exam Trap: Data classification level determines minimum security controls — not maximum. An organization may choose to apply stronger controls than classification requires. However, applying weaker controls than classification demands is a compliance failure. Classification sets the floor.

Reflection Question: A healthcare organization classifies patient treatment records as "Confidential" and lab test results as "Internal Use." A security architect argues this is wrong. Who is right, and what regulatory framework determines the correct answer?

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications