Data encryption diagram
The table below provides a structured overview of various data types, offering examples, sensitivity levels, encryption strategies, and additional comments to guide the appropriate handling and protection of each type of information.
Data Type | Examples | Sensitivity | Encryption strategy | Comments |
---|---|---|---|---|
User | Full name, E-mail, Login ID | High | Can be encrypted with CMEK |
|
Floorplan drawing | SVG files | Medium | Can be encrypted with CMEK |
|
Locations | Location hierarchy, names of: rooms/floors/buildings, room capacities | Medium | Can be encrypted with CMEK
|
|
Data export | Names of locations, zones & departments | Medium | Can be encrypted with CMEK |
|
Reservation data | Meeting subject, start/stop time, organiser, linked room | High | Can be encrypted with CMEK |
|
Back-ups | Daily snapshots of all above objects | High | Can be encrypted with CMEK |
|
Picture Cache | Location pictures and user avatars | Medium | Disable cache | The application’s cache can be disabled. Will impact the system’s performance significantly |
Configuration | Regional settings, colouring thresholds, sensor device configuration | Low | GCP default encryption |
|
Sensor data | Aggregated timeslots, raw sensor data | Low | GCP default encryption
|
|
In-memory cache | Temporary in-memory cache of session tokens, and FMIS objects | Low | GCP default encryption
|
|