Need to Know

6th January 2020 | Cybrary Need to Know


Need to Know is a term that applies to sensitive and often classified information. It is a methodology used by government and defense contractor organizations dealing with highly sensitive and sometimes classified information. Under “Need to Know” restrictions, a user must have official approval (security clearance, admin credentials) to access confidential or classified information. No-one is to be given knowledge of, possession, or access to sensitive “Need-to-Know” information based upon their position, clearance level, or the office they represent.

What does “Need to Know” mean for SMB’s?

While it may seem that “Need to Know” applies only to government entities, SMB’s can use these their principles to protect the data.  When setting up file permissions on your Human Resources directory, apply “Need to Know” permissions and grant access based upon the individuals in HR that need such access and no-one else.

Train your employees on the principle of Need to Know and insider threats. Perhaps vigilant employees may be able to spot someone in your company behaving suspiciously who may ultimately turn out to be a malicious insider.

When having cell phone conversations, consider the topic you’re discussing and the location of your phone call.  Ask yourself, do the people on this train, in line at this coffee shop, or at the local Walmart, need to know what I’m taking about?  Discretion may be appropriate.

Related Terms: Availability, Confidentiality, Integrity, Least Privilege

Source:  Feynman, Richard (1997)

Need to Know explained in 5 minutes

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Welcome to our two-part blog series on Microsoft’s new email security enhancement now included in Office 365 P1...

Read more
Why Hackers Love MSPs and What We’re Gonna Do About It

Why Hackers Love MSPs and What We’re Gonna Do About It

"Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100...

Read more
Stop the Swap: How to Protect Yourself from SIM Swapping Attacks

Stop the Swap: How to Protect Yourself from SIM Swapping Attacks

Ever had your phone suddenly lose service for no reason, followed by a flood of “reset your password”...

Read more