Confidential Data Exposure Assessment

1. Project / System Information

2. Data Inventory

Type of Confidential Data Location (System/Database/File) Data Owner Volume Comments

3. Data Flow & Access

4. Exposure Risks

Risk Description Likelihood (Low/Med/High) Impact (Low/Med/High) Existing Controls Additional Mitigations Needed

5. Summary & Recommendations