All Products
Search
Document Center

Well-Architected Framework:Data classification, grading, and identification

Last Updated:Nov 18, 2025

Data classification and grading is a foundational practice for tiered data protection and a long-term technical and management commitment for any organization. Defining a data classification and grading strategy, templates, and management standards helps you catalog your data assets. This approach helps you achieve regulatory compliance and strengthen internal data security controls.

Additionally, laws in the Chinese mainland mandate a data classification and grading system for tiered protection. All regions and departments must use this system to define a catalog of important data for their jurisdictions, departments, and industries. Data in these catalogs requires heightened protection.

Relevant laws and regulations concerning data classification and grading include:

  • Data Security Law

  • Personal Information Protection Law

  • Cybersecurity Law

Standard guidelines for classification and grading in various industries include:

  • Financial industry: JR/T 0197-2020 Guidelines for Data Security Classification and Grading in the Financial Sector

  • Securities and futures industry: JR/T 0158-2018 Guidelines for Data Classification and Grading in the Securities and Futures Industry

  • Telecommunications and carrier industry: YD/T 3813-2020 Data Classification and Grading Methods for Basic Telecommunication Enterprises

  • Financial industry (personal information): JR/T 0171-2020 Technical Specification for Personal Financial Information Protection

Define data classification and grading methods

Organizations can reference the following methods to define their data classification and grading strategy:

  • Define a framework based on existing industry classification and grading standards.

    • Adopt and adapt industry standards, such as those for the finance, securities, or telecommunications sectors, to fit your specific business needs.

    • Alternatively, classify data using a data asset catalog or a custom framework based on categories like customer, company, or business information.

    • Work with professional data security consultants to establish classification and grading standards based on your business data and legal requirements.

  • Develop a classification and grading framework by consulting with data security experts.

    • Work with data security consultants to build a framework based on national, industry, and regional laws and regulations, based on a thorough analysis of your organizational structure and business data.

    • Coordinate with your organization's business, legal, and IT departments to finalize the classification and grading framework and standards.

Data identification in a cloud environment

Regulations divide data into personal data and important data. Personal data is then categorized as either sensitive or non-sensitive.

  1. For the criteria for identifying sensitive personal data, refer to the definitions in the Chinese national standard GB/T 35273-2020 Information Security Technology-Personal Information Security Specification.

  2. For the identification criteria of non-sensitive personal data, also refer to the definitions in the same standard.

  3. Organizations typically define important data based on their operational, business, and employee data.

In a cloud environment, organizations store data in services like Object Storage Service (OSS), Relational Database Service (RDS), Elastic Compute Service (ECS) disks, and big data platforms. The main challenges in data identification are data decentralization and its storage in various formats. Another challenge is the lack of uniform standards and specifications for data identification.

We recommend the following steps for data identification in a cloud environment:

  1. Map your organization's data storage methods and paths. Consolidate or centralize data storage paths where possible.

  2. Prioritize identifying personal and sensitive personal information. These categories have standardized definitions and are closely tied to data security regulations.

  3. Define what constitutes your organization's important data and create data identification templates for it.

  4. Implement automated identification methods, such as establishing automated classification templates, scanning tools, and reports.

Establish protection measures for graded data

Establishing protection measures for graded data helps you systematically build data security capabilities. Data security is a discipline that requires continuous improvement and evolution. A tiered protection framework lets you flexibly adjust security controls based on your organization's data protection management requirements.

Information is often divided into the following three types:

  • Customer Information (C): customer name, phone number, hobbies, address.

  • Business Information (S): new product designs, material information, supply chain data, brand packaging, pricing strategies, SKU planning, and internal or external promotional information.

  • Company Information (B): orders, HR data, revenue, and accounts receivable.

Use the following four levels of classification for information protection:

L1

L2

L3

L4

Public

Internal

Confidential

Secret

By combining these information types and protection levels, we recommend the following classification for your internal data:

Information type

Classification

Public Information (L1)

Customer Information (C)

Customer Public Information (C1)

Business Information (S)

Business Public Information (S1)

Company Information (B)

Company Public Information (B1)

The following table shows the protection measures for each data classification level:

Data security level

L1

L2

L3

L4

Description

Public

Internal

Confidential

Secret

Classification control measures

• Basic access control

• Plain text display

• Access channel encryption

• Access control

• Data download permission

• Data download distribution

• Data encryption

• Access channel encryption

• Data storage encryption

• Strict access control approval process

• Data download permission control

• Data outbound audit monitoring

• Endpoint protection

• Security detection

• Privileged access channel encryption

• Data storage encryption

• Permission approval

• VDI checking

• Download prohibited

• Endpoint protection

Data security is a systematic effort that dynamically changes based on business needs and customer attributes. When creating a tiered protection framework, you must also consider the impact on business operations. Therefore, building data security capabilities is not a one-time task but a long-term process that requires careful design, planning, and continuous implementation tailored to your business.