FAQ

   


FAQs by Category 

Installation Guide



 
 
FAQ No.:00348 
Category:Advanced Settings; Curtain Admin; Definitions 

 
Question:How to formulate a security strategy for Curtain e-locker?
 
Answer:We can approach this by using the 3W1H (What, Where, Who, How) framework to address the following four basic questions:

1. What sensitive data or systems need to be protected?
2. Where is the data stored?
3. Who will be using the data?
4. How will they be using it?

The first two questions help us understand what data and systems need protection in e-locker.

The third and fourth questions help us understand which users will be accessing the data and how they will be using it, which will enable us to formulate a security strategy that is tailored to their needs.

Once we have a clear understanding of the above, we can proceed to formulate an appropriate security strategy.
For example, if there are three different user groups who will be using the data, and the first group primarily needs to access and share the data within the company, a possible security strategy would be to allow them to access controlled documents within protected zone, permit internal sharing of controlled documents, and require them to submit requests for external document distribution.

The second user group is similar to the first group but also requires the ability to print controlled documents for their work. In this case, the security strategy would be the same as the first group, with the addition of allowing them to print documents with watermarks.

The third user group frequently needs to send controlled documents to partners. In this case, the approval process may not be suitable due to the high volume of requests. It might be more appropriate to grant these users sufficient permissions to distribute documents externally. This could be accomplished by enabling Copy-out form that requires users to provide reason for external distribution. Once the form is completed, the document can be distributed externally without requiring approval. The form's contents can be uploaded to log database and, in conjunction with log distribution functionality, the system can automatically send logs to relevant department supervisors for review on a regular basis.

Curtain e-locker offers various functionalities, and enterprises can prioritize the use of specific features based on their actual needs.
For example, if the goal is to prioritize user convenience and minimize document control, permissions related to document control can be relaxed, while still maintaining records of document operations. This would allow management to review how users are using company documents.

If the aim is to protect documents and prevent data leaks, it is recommended to align the security strategy with users' actual workflow and incorporate document operation logging. This approach ensures comprehensive security without impeding users' daily work.

Regarding the protection of shared folders, there are two main scenarios to consider:
Scenario 1: In an existing shared folder structure within the organization, if there are specific folders that require protection, you can add those folders to the protected network drives.
* Curtain e-locker supports to protect subfolders within the shared folder structure.

Scenario 2: If there is uncertainty about which folders in different departments need protection during implementation, you can create a new folder within each department's folder structure and apply e-locker protection. Each department can then decide which sensitive data should be moved to the protected folder for safeguarding.