Overview
The Unified Scoping Guide (USG) is a free resource intended to help organizations define the scope of sensitive data where it is stored, transmitted, and/or processed. The guide refers to both sensitive and regulated data as “sensitive data” to simplify the concept.
This scoping guide categorizes system components according to several factors:
✓
Whether sensitive data is being stored, processed, or transmitted
✓
The functionality that the system component provides (e.g., access control, logging, antimalware, etc.)
✓
The connectivity between the system and the sensitive data environment
9
Zones for Sensitive Data Compliance
Data-Centric Security
The USG’s data-centric security approach is applicable to the following sensitive data types — any type of data that requires protection due to regulatory, contractual, or organizational requirements.
CUI
Controlled Unclassified Information
PII
Personally Identifiable Information
CHD
Cardholder Data
ACPI
Attorney-Client Privilege Info
ITAR
Export-Controlled Data (ITAR / EAR)
FCI
Federal Contract Information
PHI
Protected Health Information
IP
Intellectual Property
FERPA
Student Educational Records
CII
Critical Infrastructure Information
Scope & Limitations
What the USG Does Address
✓
Assists in determining which system components fall in and out of scope
✓
Facilitates constructive communication between your organization and an assessor/regulator by providing a reasonable methodology to describe your technology infrastructure
✓
Provides a means to categorize different types of assets, each with a different risk profile
✓
Provides a starting point to potentially reduce the scope of sensitive data by re-architecting technologies to isolate and control access
What the USG Does Not Address
✕
Does not define which statutory, regulatory, and/or contractual controls are required for each category
✕
Since every organization is different, it is up to each organization and its assessor to determine the nature, extent, and effectiveness of each control
✕
For defining control applicability, see the Integrated Controls Management (ICM) model
Key Capabilities
🎯
Determine In-Scope vs Out-of-Scope Components
The USG provides clear criteria for identifying which system components are within the boundary of your sensitive data environment and which fall outside of it.
🗣️
Facilitate Communication with Assessors
Provides a common, reasonable methodology for describing your technology infrastructure and sensitive data environment to assessors and regulators.
📊
Categorize Assets by Risk Profile
Offers a structured approach to categorize different types of assets, where each type has a different risk profile associated with it.
🔒
Reduce Scope Through Re-Architecture
Provides a starting point for potentially reducing your sensitive data scope by re-architecting technologies to isolate and control access to the sensitive data environment.
🧩
Zone-Based Compliance Model
Uses a nine-zone model for sensitive data compliance purposes, helping organizations visualize and manage the boundaries and connections within their data environment.
Get Started
The USG is a free resource available as part of the SCF download. No registration required.
Licensed under Creative Commons. Volunteer-driven by the SCF Council. No registration required.