3. Criticality

In HAWK levels 1 - 5 are supported with 1 being the most critical and 5 being least critical. As resources are added or their function(s) changes the criticality may change as well. The resources criticality should be reviewed often to ensure that resources have the correct criticality set.

3.1. Most Critical (Level 1)

Use this level for all devices that house and support any confidential information, including customer, employee and corporate information.

Examples consist of:

  • Server containing proprietary information

  • Resources tied to organizational success

3.2. Highly Critical (Level 2)

Use this level for all devices that could impact your core business and entry points into your internal network.

Examples consist of:

  • Any device that allows access to your internal network

  • Network elements that are used for your communication infrastructure

  • Systems that support the core business

  • Domain Controllers

  • Systems that may not be backed up on a regular bases

3.3. Critical (Level 3)

Use this level for all devices that support global business functions.

Examples consist of:

  • E-Mail

  • VPN concentrators

  • Internal networking equipment (e.g., switches, firewalls, routers)

3.4. Less Critical (Level 4)

Use this level for all devices that would not impact your core business.

Examples consist of:

  • Devices where scheduled downtime is acceptable

  • Test network equipment

  • Test servers

  • Phone systems

3.5. Least Critical (Level 5)

Use this level for devices that if were negatively impacted would not affect the day to day operations of your business.

Examples consist of:

  • Printers

  • Guest services and all systems associated with allowing guest access to building and IT operations

  • All others that do not fit in the above groups