Skip to main content

Data Classification in NoCode-X

Understanding Data Classification

Data classification is embedded throughout the NoCode-X platform to ensure effective management of sensitive information. It aims to unburden creators while providing state-of-the-art assurance on regulatory compliance to information owners. This classification acts as a transparent safeguard for sensitive information, applied on top of the already high security standards and practices of the NoCode-X platform.


Available Classification Labels

Classification LabelDescription
SecretOnly to be accessed by a very limited set of people in the organization. Disclosing this information could lead to very high or existential impact.
Sensitive Personal InformationInformation relating to data protection that is highly sensitive, such as medical, financial, and criminal records. This requires fine-grained control to avoid compliance issues.
ConfidentialAccessible only to specific groups and should not be exposed in an unauthorized manner. Disclosing this information could lead to high impact.
RestrictedAccessible only to specific groups and should not be exposed in an unauthorized manner. Disclosing this information could lead to medium impact.
UnrestrictedNot intended to be made public, but there is no high risk of disclosure.
PublicIntended to be made public, with no risk when this information is disclosed.

Additional Measures Enabled

MeasureDescription
IdentifyClearly identify your data processing in the scope of resilience, compliance, and data protection.
ProtectEnable application-level encryption to protect sensitive information from unauthorized access.
DetectAlerts the creator if information is exposed in an unauthorized manner when deployed to production.
RespondEnable full auditability for create, change, delete, and read access, ensuring accountability without affecting performance.

How to Enable Data Classification

  1. Go to Data Format by pressing Alt + F.
  2. Open the data format.
  3. Go to Properties.
  4. Select the attribute of the format.
  5. From the dropdown box, select a data classification label (e.g., Secret, Medical, Confidential).

By default, information is considered to be Restricted and has unauthorized access blocked.


Mapping Data Classification to ISO Standards

Data classification makes a critical contribution toward meeting the control objectives set by various ISO standards. Below is a mapping table outlining the relationship between data classification measures and the corresponding ISO controls:

ISO StandardRelevant Control/ClauseDescription/Contribution
ISO/IEC 27001A.8.2 – Information Classification and HandlingEnsures assets are classified appropriately so that subsequent handling, access control, and protection measures are in accordance with sensitivity.
ISO/IEC 27001A.9 – Access ControlData classification informs access restrictions so that only authorized users can access sensitive and confidential data as defined by internal policies.
ISO/IEC 27001A.10 – CryptographyClassification dictates the level of encryption required – particularly for "Secret" and "Sensitive Personal Information" categories.
ISO/IEC 27001A.18 – ComplianceSupports the identification and fulfillment of legal, regulatory, and contractual requirements relating to data protection and secure handling of information.
ISO/IEC 27017Cloud Security GuidelinesHelps in defining security controls for cloud data by ensuring that data classification is applied to data stored and processed in cloud environments.
ISO/IEC 27018PII Protection ControlsGuides measures to protect personally identifiable information (PII) by applying fine-grained classification and ensuring rigorous controls over sensitive data.

Conclusion

The data classification mechanism on the NoCode-X platform is a comprehensive solution designed to protect sensitive information by categorizing data according to defined security levels. Through the implementation of additional security measures (Identify, Protect, Detect, and Respond) and integration with existing high security standards, the platform not only meets but exceeds regulatory requirements.