{"id":64668,"date":"2024-10-17T07:57:20","date_gmt":"2024-10-17T05:57:20","guid":{"rendered":"https:\/\/www.complior.se\/?p=64668"},"modified":"2026-03-15T13:07:22","modified_gmt":"2026-03-15T12:07:22","slug":"saker-lagring-del-2","status":"publish","type":"post","link":"https:\/\/complior.se\/en\/saker-lagring-del-2\/","title":{"rendered":"Safe Storage: Part 2"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-1c95cc62 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-627ud4 is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns64668_bdd7c0-09\"><a class=\"kb-button kt-button button kb-btn64668_302982-4e kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-fill  kt-btn-has-text-true kt-btn-has-svg-true  wp-block-kadence-singlebtn\" href=\"https:\/\/complior.se\/en\/resources\/\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowLeft kt-btn-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"19\" y1=\"12\" x2=\"5\" y2=\"12\"\/><polyline points=\"12 19 5 12 12 5\"\/><\/svg><\/span><span class=\"kt-btn-inner-text\">Tillbaka till resurser<\/span><\/a><\/div>\n\n\n\n<span class=\"kt-adv-heading64668_a8c3f6-a4 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_a8c3f6-a4\">Blog<\/span>\n\n\n\n<h1 class=\"kt-adv-heading64668_af15d5-51 animated fadeIn wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_af15d5-51\">Safe Storage: Part 2<\/h1>\n\n\n\n<div class=\"wp-block-group animated fadeIn is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\"><div class=\"publish-date-container\">\r\n\t<svg\r\n\t\twidth=\"16\"\r\n\t\theight=\"16\"\r\n\t\tviewbox=\"0 0 24 24\"\r\n\t\tfill=\"none\"\r\n\t\tstroke=\"#4b4b4b\"\r\n\t\tstroke-width=\"2\"\r\n\t\tstroke-linecap=\"round\"\r\n\t\tstroke-linejoin=\"round\"\r\n\t\txmlns=\"http:\/\/www.w3.org\/2000\/svg\"\r\n\t\taria-hidden=\"true\"\r\n\t>\r\n\t\t<rect x=\"3\" y=\"4\" width=\"18\" height=\"18\" rx=\"2\" ry=\"2\"><\/rect>\r\n\t\t<line x1=\"16\" y1=\"2\" x2=\"16\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"8\" y1=\"2\" x2=\"8\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"3\" y1=\"10\" x2=\"21\" y2=\"10\"><\/line>\r\n\t<\/svg>\r\n\t<span class=\"date-text\">\r\n\t\tOct 17, 2024\t<\/span>\r\n<\/div>\n\n\n<h1 class=\"kt-adv-heading64668_8ebb4f-7f wp-block-kadence-advancedheading kt-adv-heading-has-icon animated fadeIn delay-100ms\" data-kb-block=\"kb-adv-heading64668_8ebb4f-7f\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_clock kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 6 12 12 16 14\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\">10 min <\/span><\/h1><\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-kadence-image kb-image64668_fc497f-ad\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"563\" src=\"https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/Secure-online-sharing-edited.jpg\" alt=\"Woman typing on laptop with safety icons\" class=\"kb-img wp-image-79892\" srcset=\"https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/Secure-online-sharing-edited.jpg 1000w, https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/Secure-online-sharing-edited-300x169.jpg 300w, https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/Secure-online-sharing-edited-768x432.jpg 768w, https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/Secure-online-sharing-edited-18x10.jpg 18w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-cb215d21 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-c91ksj is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading64668_02ed23-a6 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_02ed23-a6\">Classification of Information &amp;<br>Strong access controls<\/h2>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-15u3eue is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading64668_e2f656-3e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_e2f656-3e\">In this series:<\/h3>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-1g1lvd4 has-manrope-font-family\">\n<li>Secure Storage: Introduction<\/li>\n\n\n\n<li>Klassificering av information &amp; Starka \u00e5tkomstkontroller<\/li>\n\n\n\n<li>Secure information sharing &amp; Prevent data theft and dissemination<\/li>\n\n\n\n<li>Traceability and logging &amp; Encryption<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-c91ksj is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading64668_5d5aec-a2 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_5d5aec-a2\">Classification of information<\/h2>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-uyf2zf is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<p class=\"kt-adv-heading64668_ff1575-ee wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_ff1575-ee\">Classifying information based on its sensitivity is a fundamental step in applying the right security\nstrategies. By classifying information into categories such as \"public\", \"internal\", \"confidential\" or\n\"critical\", organizations can ensure that the right security measures are applied depending on the\nsensitivity of the data. Classification also helps determine which access controls should be applied and\nhow the information may be shared both inside and outside the organization.<\/p>\n\n\n\n<h3 class=\"kt-adv-heading64668_f79bbc-c9 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_f79bbc-c9\">Classification with safety labels<\/h3>\n\n\n\n<p class=\"kt-adv-heading64668_5d1a93-70 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_5d1a93-70\">To facilitate the handling of classified information, security labels can be used. A security label is a\nlabel assigned to data based on its classification. These labels make the data's sensitivity visible to\nusers and systems, making it easier to follow guidelines for how the information should be handled.\nSecurity labels can be applied manually by users or administrators, but also automated based on\npredefined rules and patterns.<\/p>\n\n\n\n<p class=\"kt-adv-heading64668_5d72d6-1e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_5d72d6-1e\">For example, a document containing personal data can automatically be labelled \"confidential\", which\nrestricts access and enables additional security measures, such as encryption and access logging. By\nusing security labels, organizations can ensure that data is handled correctly throughout its lifecycle \u2013\nfrom creation to archiving or deletion.<\/p>\n\n\n\n<h3 class=\"kt-adv-heading64668_d588ad-f1 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_d588ad-f1\">Automatic classification<\/h3>\n\n\n\n<p class=\"kt-adv-heading64668_009aec-c9 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_009aec-c9\">F\u00f6r att f\u00f6renkla och effektivisera klassificeringsprocessen finns det idag avancerade verktyg som kan automatisera klassificeringen av data. Dessa system kan skanna inneh\u00e5llet i dokument, e-postmeddelanden och filer f\u00f6r att identifiera k\u00e4nslig information baserat p\u00e5 inneh\u00e5ll, metadata eller m\u00f6nster.<\/p>\n\n\n\n<p class=\"kt-adv-heading64668_1a1dd6-db wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_1a1dd6-db\">Till exempel kan systemet k\u00e4nna igen personnummer, kreditkortsnummer eller andra k\u00e4nsliga nyckelord, och automatiskt tilldela en l\u00e4mplig s\u00e4kerhetsetikett.<\/p>\n\n\n\n<p class=\"kt-adv-heading64668_d55b0c-ff wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_d55b0c-ff\">Automatic classification reduces the risk of human error, where important information can potentially\nbe forgotten or misclassified. It also ensures that large amounts of data can be managed consistently\nand with minimal administrative effort.<\/p>\n\n\n\n<h3 class=\"kt-adv-heading64668_b68658-ff wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_b68658-ff\">Watermarking<\/h3>\n\n\n\n<p class=\"kt-adv-heading64668_84f7f1-46 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_84f7f1-46\">F\u00f6r att ytterligare skydda k\u00e4nslig information kan vattenm\u00e4rkning anv\u00e4ndas som ett komplement till klassificering och s\u00e4kerhetsetiketter. Vattenm\u00e4rken kan appliceras p\u00e5 dokument f\u00f6r att synligt indikera deras k\u00e4nslighetsniv\u00e5, vilket g\u00f6r det sv\u00e5rare att oavsiktligt dela eller missbruka informationen.<\/p>\n\n\n\n<p class=\"kt-adv-heading64668_b01c6f-39 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_b01c6f-39\">Vattenm\u00e4rken kan exempelvis inkludera etiketter som &#8221;Konfidentiellt&#8221; eller &#8221;Endast f\u00f6r internt bruk&#8221; direkt p\u00e5 dokumentets inneh\u00e5ll, b\u00e5de i digital och utskriven form.<\/p>\n\n\n\n<p class=\"kt-adv-heading64668_a7c4e3-ca wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_a7c4e3-ca\">Vattenm\u00e4rken fungerar \u00e4ven som en avskr\u00e4ckande faktor f\u00f6r obeh\u00f6riga som f\u00f6rs\u00f6ker sprida k\u00e4nsliga dokument, d\u00e5 de g\u00f6r det tydligt att materialet \u00e4r sp\u00e5rbart och m\u00e4rkt som k\u00e4nsligt.<\/p>\n\n\n\n<p class=\"kt-adv-heading64668_072581-a7 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_072581-a7\">I vissa fall kan vattenm\u00e4rken \u00e4ven inneh\u00e5lla information om dokumentets \u00e4gare eller skapare, vilket g\u00f6r att eventuella datal\u00e4ckor kan sp\u00e5ras tillbaka till k\u00e4llan.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-c91ksj is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading64668_f05606-41 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_f05606-41\">Strong access controls<\/h2>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1owz2g2 is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<p class=\"kt-adv-heading64668_cbe297-3b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_cbe297-3b\">\u00c5tkomstkontroller \u00e4r en av h\u00f6rnstenarna i s\u00e4ker lagring och en kritisk komponent f\u00f6r att s\u00e4kerst\u00e4lla att endast beh\u00f6riga personer f\u00e5r tillg\u00e5ng till r\u00e4tt information.<\/p>\n\n\n\n<p class=\"kt-adv-heading64668_3c224f-a6 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_3c224f-a6\">Genom att till\u00e4mpa granul\u00e4ra och flexibla \u00e5tkomstkontroller kan organisationer definiera exakt vem som har tillg\u00e5ng till vilken data, under vilka omst\u00e4ndigheter och med vilka r\u00e4ttigheter.<\/p>\n\n\n\n<p class=\"kt-adv-heading64668_dd5fe5-68 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_dd5fe5-68\">Detta hj\u00e4lper till att minska risken f\u00f6r obeh\u00f6rig \u00e5tkomst och skyddar k\u00e4nslig information fr\u00e5n att hamna i fel h\u00e4nder.<\/p>\n\n\n\n<h3 class=\"kt-adv-heading64668_e1136b-f4 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_e1136b-f4\">Role-Based Access (RBAC) and Attribute-Based Access (ABAC)<\/h3>\n\n\n\n<p class=\"kt-adv-heading64668_cb977d-87 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_cb977d-87\">Traditionellt har rollbaserad \u00e5tkomstkontroll (RBAC) varit en vanlig metod f\u00f6r att hantera \u00e5tkomst inom organisationer. Denna modell tilldelar \u00e5tkomst baserat p\u00e5 anv\u00e4ndarens roll inom organisationen.<\/p>\n\n\n\n<p class=\"kt-adv-heading64668_09c98f-c8 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_09c98f-c8\">Till exempel kan en anv\u00e4ndare med rollen &#8221;administrat\u00f6r&#8221; ha bredare r\u00e4ttigheter \u00e4n en &#8221;anv\u00e4ndare&#8221;, och dessa roller styr vilken information som kan ses, redigeras eller delas.<\/p>\n\n\n\n<p class=\"kt-adv-heading64668_c92c6d-15 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_c92c6d-15\">RBAC \u00e4r relativt enkel att implementera och f\u00f6rst\u00e5, men kan vara begr\u00e4nsad i situationer d\u00e4r mer flexibla och dynamiska \u00e5tkomstbeslut kr\u00e4vs.<\/p>\n\n\n\n<p class=\"kt-adv-heading64668_d91353-71 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_d91353-71\">Attributbaserad \u00e5tkomstkontroll (ABAC) erbjuder en mer sofistikerad och flexibel metod f\u00f6r att hantera \u00e5tkomst. I st\u00e4llet f\u00f6r att endast basera \u00e5tkomst p\u00e5 en anv\u00e4ndares roll, tar ABAC h\u00e4nsyn till flera attribut.<\/p>\n\n\n\n<p class=\"kt-adv-heading64668_651ef5-06 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_651ef5-06\">Dessa kan inkludera anv\u00e4ndarens identitet, tid, plats, enhetstyp, datans k\u00e4nslighetsniv\u00e5 och andra kontextuella faktorer. Detta ger organisationer m\u00f6jlighet att skapa mer dynamiska \u00e5tkomstkontroller som kan anpassas till specifika situationer och riskniv\u00e5er.<\/p>\n\n\n\n<h3 class=\"kt-adv-heading64668_f0e2cc-86 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_f0e2cc-86\">Granular access controls with ABAC<\/h3>\n\n\n\n<p class=\"kt-adv-heading64668_e0d42f-5a wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_e0d42f-5a\">Med ABAC kan \u00e5tkomstkontroller preciseras p\u00e5 en mycket detaljerad niv\u00e5. N\u00e5gra av de centrala faktorerna som kan anv\u00e4ndas i attributbaserad \u00e5tkomstkontroll inkluderar:<\/p>\n\n\n\n<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\" class=\"wp-block-list blockera-block blockera-block-1gq09qs has-manrope-font-family\">\n<li>Vem som f\u00e5r \u00e5tkomst \u2013 Tillg\u00e5ng baseras inte bara p\u00e5 anv\u00e4ndarens roll utan ocks\u00e5 p\u00e5 deras individuella attribut s\u00e5som s\u00e4kerhetscertifikat, anst\u00e4llningsstatus eller relation till datan.<\/li>\n\n\n\n<li>N\u00e4r och varifr\u00e5n \u00e5tkomst kan ske \u2013 \u00c5tkomst kan bero p\u00e5 tid och plats. En anv\u00e4ndare kan till exempel endast f\u00e5 tillg\u00e5ng under kontorstid eller fr\u00e5n f\u00f6retagets n\u00e4tverk.<\/li>\n\n\n\n<li>Vilken typ av \u00e5tkomst som ges \u2013 ABAC g\u00f6r det m\u00f6jligt att styra vad en anv\u00e4ndare f\u00e5r g\u00f6ra med informationen, exempelvis l\u00e4sa, redigera eller dela data.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"kt-adv-heading64668_d45b98-7d wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_d45b98-7d\">Advantages of ABAC in Safe storage<\/h3>\n\n\n\n<p class=\"kt-adv-heading64668_05594b-d5 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_05594b-d5\">Dynamisk och flexibel \u00e5tkomsthantering \u2013 Genom att anv\u00e4nda flera attribut kan organisationer skapa mer avancerade \u00e5tkomstregler.<\/p>\n\n\n\n<p class=\"kt-adv-heading64668_85b7a5-0b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_85b7a5-0b\">F\u00f6rb\u00e4ttrad s\u00e4kerhet \u2013 Faktorer som plats och tid kan anv\u00e4ndas f\u00f6r att minska risken f\u00f6r obeh\u00f6rig \u00e5tkomst.<\/p>\n\n\n\n<p class=\"kt-adv-heading64668_683237-53 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_683237-53\">B\u00e4ttre efterlevnad \u2013 Organisationer kan l\u00e4ttare uppfylla lagar och regulatoriska krav genom automatiserade \u00e5tkomstregler.<\/p>\n\n\n\n<h3 class=\"kt-adv-heading64668_463310-1f wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_463310-1f\">Examples of using ABAC<\/h3>\n\n\n\n<p class=\"kt-adv-heading64668_e1d684-61 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_e1d684-61\">An employee may be able to access an internal report when they are on the company network during\nwork hours but be denied access when they try to log in from a personal device outside of work hours.<\/p>\n\n\n\n<p class=\"kt-adv-heading64668_b26a3f-cd wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64668_b26a3f-cd\">K\u00e4nslig data, s\u00e5som aff\u00e4rshemligheter eller personuppgifter, kan automatiskt skyddas beroende p\u00e5 vilken enhet som anv\u00e4nds, s\u00e5 att endast enheter som uppfyller s\u00e4kerhetskraven f\u00e5r full \u00e5tkomst.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-3675499d\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-62c22fca wp-block-button scale-hover\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/complior.se\/en\/saker-lagring-del-3\/\" rel=\"follow noopener\" target=\"_blank\" role=\"button\"><div class=\"uagb-button__link\">Learn more<\/div><span class=\"uagb-button__icon uagb-button__icon-position-after\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\" aria-hidden=\"true\" focussable=\"false\"><path d=\"M438.6 278.6l-160 160C272.4 444.9 264.2 448 256 448s-16.38-3.125-22.62-9.375c-12.5-12.5-12.5-32.75 0-45.25L338.8 288H32C14.33 288 .0016 273.7 .0016 256S14.33 224 32 224h306.8l-105.4-105.4c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l160 160C451.1 245.9 451.1 266.1 438.6 278.6z\"><\/path><\/svg><\/span><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Classifying data based on its sensitivity is a fundamental step in applying due diligence strategies.<\/p>","protected":false},"author":2,"featured_media":73619,"comment_status":"closed","ping_status":"open","sticky":false,"template":"blogg","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_eb_attr":"","inline_featured_image":false,"_uag_custom_page_level_css":"","wpm_timeformat":"","_wpm_styles":"","footnotes":""},"categories":[118],"tags":[177],"class_list":["post-64668","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogg","tag-saker-lagring"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00e4ker lagring: Del 2 - Complior<\/title>\n<meta name=\"description\" content=\"Att klassificera data baserat p\u00e5 dess k\u00e4nslighet \u00e4r en grundl\u00e4ggande \u00e5tg\u00e4rd f\u00f6r att till\u00e4mpa r\u00e4tts\u00e4kerhetsstrategier.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/complior.se\/en\/saker-lagring-del-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e4ker lagring: Del 2 - Complior\" \/>\n<meta property=\"og:description\" content=\"Att klassificera data baserat p\u00e5 dess k\u00e4nslighet \u00e4r en grundl\u00e4ggande \u00e5tg\u00e4rd f\u00f6r att till\u00e4mpa r\u00e4tts\u00e4kerhetsstrategier.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/complior.se\/en\/saker-lagring-del-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Complior\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-17T05:57:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-15T12:07:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/Secure-online-sharing.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kikki Bostrom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kikki Bostrom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/complior.se\\\/saker-lagring-del-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/saker-lagring-del-2\\\/\"},\"author\":{\"name\":\"Kikki Bostrom\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\"},\"headline\":\"S\u00e4ker lagring: Del 2\",\"datePublished\":\"2024-10-17T05:57:20+00:00\",\"dateModified\":\"2026-03-15T12:07:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/saker-lagring-del-2\\\/\"},\"wordCount\":1036,\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/saker-lagring-del-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Secure-online-sharing.jpg\",\"keywords\":[\"saker lagring\"],\"articleSection\":[\"Blogg\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/complior.se\\\/saker-lagring-del-2\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/saker-lagring-del-2\\\/\",\"name\":\"S\u00e4ker lagring: Del 2 - Complior\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/saker-lagring-del-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/saker-lagring-del-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Secure-online-sharing.jpg\",\"datePublished\":\"2024-10-17T05:57:20+00:00\",\"dateModified\":\"2026-03-15T12:07:22+00:00\",\"description\":\"Att klassificera data baserat p\u00e5 dess k\u00e4nslighet \u00e4r en grundl\u00e4ggande \u00e5tg\u00e4rd f\u00f6r att till\u00e4mpa r\u00e4tts\u00e4kerhetsstrategier.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/complior.se\\\/saker-lagring-del-2\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/complior.se\\\/saker-lagring-del-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/saker-lagring-del-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Secure-online-sharing.jpg\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Secure-online-sharing.jpg\",\"width\":1000,\"height\":667,\"caption\":\"Woman typing on laptop with safety icons\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/complior.se\\\/saker-lagring-del-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/complior.se\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e4ker lagring: Del 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/complior.se\\\/#website\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"name\":\"Complior\",\"description\":\"Security beyond compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/complior.se\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\",\"name\":\"Complior\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"width\":2560,\"height\":960,\"caption\":\"Complior\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\",\"name\":\"Kikki Bostrom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"caption\":\"Kikki Bostrom\"},\"url\":\"https:\\\/\\\/complior.se\\\/en\\\/author\\\/kikki\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e4ker lagring: Del 2 - Complior","description":"Classifying data based on its sensitivity is a fundamental step in applying due diligence strategies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/complior.se\/en\/saker-lagring-del-2\/","og_locale":"en_GB","og_type":"article","og_title":"S\u00e4ker lagring: Del 2 - Complior","og_description":"Att klassificera data baserat p\u00e5 dess k\u00e4nslighet \u00e4r en grundl\u00e4ggande \u00e5tg\u00e4rd f\u00f6r att till\u00e4mpa r\u00e4tts\u00e4kerhetsstrategier.","og_url":"https:\/\/complior.se\/en\/saker-lagring-del-2\/","og_site_name":"Complior","article_published_time":"2024-10-17T05:57:20+00:00","article_modified_time":"2026-03-15T12:07:22+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/Secure-online-sharing.jpg","type":"image\/jpeg"}],"author":"Kikki Bostrom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kikki Bostrom","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/complior.se\/saker-lagring-del-2\/#article","isPartOf":{"@id":"https:\/\/complior.se\/saker-lagring-del-2\/"},"author":{"name":"Kikki Bostrom","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016"},"headline":"S\u00e4ker lagring: Del 2","datePublished":"2024-10-17T05:57:20+00:00","dateModified":"2026-03-15T12:07:22+00:00","mainEntityOfPage":{"@id":"https:\/\/complior.se\/saker-lagring-del-2\/"},"wordCount":1036,"publisher":{"@id":"https:\/\/complior.se\/#organization"},"image":{"@id":"https:\/\/complior.se\/saker-lagring-del-2\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/Secure-online-sharing.jpg","keywords":["saker lagring"],"articleSection":["Blogg"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/complior.se\/saker-lagring-del-2\/","url":"https:\/\/complior.se\/saker-lagring-del-2\/","name":"S\u00e4ker lagring: Del 2 - Complior","isPartOf":{"@id":"https:\/\/complior.se\/#website"},"primaryImageOfPage":{"@id":"https:\/\/complior.se\/saker-lagring-del-2\/#primaryimage"},"image":{"@id":"https:\/\/complior.se\/saker-lagring-del-2\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/Secure-online-sharing.jpg","datePublished":"2024-10-17T05:57:20+00:00","dateModified":"2026-03-15T12:07:22+00:00","description":"Classifying data based on its sensitivity is a fundamental step in applying due diligence strategies.","breadcrumb":{"@id":"https:\/\/complior.se\/saker-lagring-del-2\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/complior.se\/saker-lagring-del-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/saker-lagring-del-2\/#primaryimage","url":"https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/Secure-online-sharing.jpg","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/Secure-online-sharing.jpg","width":1000,"height":667,"caption":"Woman typing on laptop with safety icons"},{"@type":"BreadcrumbList","@id":"https:\/\/complior.se\/saker-lagring-del-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/complior.se\/"},{"@type":"ListItem","position":2,"name":"S\u00e4ker lagring: Del 2"}]},{"@type":"WebSite","@id":"https:\/\/complior.se\/#website","url":"https:\/\/complior.se\/","name":"Complior","description":"Security beyond compliance","publisher":{"@id":"https:\/\/complior.se\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/complior.se\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/complior.se\/#organization","name":"Complior","url":"https:\/\/complior.se\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/","url":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","width":2560,"height":960,"caption":"Complior"},"image":{"@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016","name":"Kikki Bostrom","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","caption":"Kikki Bostrom"},"url":"https:\/\/complior.se\/en\/author\/kikki\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/Secure-online-sharing.jpg",1000,667,false],"thumbnail":["https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/Secure-online-sharing-150x150.jpg",150,150,true],"medium":["https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/Secure-online-sharing-300x200.jpg",300,200,true],"medium_large":["https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/Secure-online-sharing-768x512.jpg",768,512,true],"large":["https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/Secure-online-sharing.jpg",1000,667,false],"1536x1536":["https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/Secure-online-sharing.jpg",1000,667,false],"2048x2048":["https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/Secure-online-sharing.jpg",1000,667,false],"trp-custom-language-flag":["https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/Secure-online-sharing-18x12.jpg",18,12,true]},"uagb_author_info":{"display_name":"Kikki Bostrom","author_link":"https:\/\/complior.se\/en\/author\/kikki\/"},"uagb_comment_info":0,"uagb_excerpt":"Att klassificera data baserat p\u00e5 dess k\u00e4nslighet \u00e4r en grundl\u00e4ggande \u00e5tg\u00e4rd f\u00f6r att till\u00e4mpa r\u00e4tts\u00e4kerhetsstrategier.","_links":{"self":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/64668","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/comments?post=64668"}],"version-history":[{"count":21,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/64668\/revisions"}],"predecessor-version":[{"id":79893,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/64668\/revisions\/79893"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media\/73619"}],"wp:attachment":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media?parent=64668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/categories?post=64668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/tags?post=64668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}