3. Criticality¶
In HAWK levels 1 - 5 are supported with 1 being the most critical and 5 being least critical. As resources are added or their function(s) changes the criticality may change as well. The resources criticality should be reviewed often to ensure that resources have the correct criticality set.
3.1. Most Critical (Level 1)¶
Use this level for all devices that house and support any confidential information, including customer, employee and corporate information.
Examples consist of:
Server containing proprietary information
Resources tied to organizational success
3.2. Highly Critical (Level 2)¶
Use this level for all devices that could impact your core business and entry points into your internal network.
Examples consist of:
Any device that allows access to your internal network
Network elements that are used for your communication infrastructure
Systems that support the core business
Domain Controllers
Systems that may not be backed up on a regular bases
3.3. Critical (Level 3)¶
Use this level for all devices that support global business functions.
Examples consist of:
VPN concentrators
Internal networking equipment (e.g., switches, firewalls, routers)
3.4. Less Critical (Level 4)¶
Use this level for all devices that would not impact your core business.
Examples consist of:
Devices where scheduled downtime is acceptable
Test network equipment
Test servers
Phone systems
3.5. Least Critical (Level 5)¶
Use this level for devices that if were negatively impacted would not affect the day to day operations of your business.
Examples consist of:
Printers
Guest services and all systems associated with allowing guest access to building and IT operations
All others that do not fit in the above groups