From ipad-kit
Apply 4-tier data classification taxonomy to IPA data assets
npx claudepluginhub tractorjuice/ipad-kit --plugin ipad-kit<project ID, e.g. '001'># IPAD Data Classification
## User Input
## Instructions
> **Note**: The `ipad-context` hook automatically injects project context (project list, existing artifacts, maturity level) into this command's execution. Use that context to identify the target project directory, project ID, and any existing artifacts.
### Step 0: Prerequisite Check
1. Identify the target project from `$ARGUMENTS` (the project ID, e.g., `001`).
2. Verify that an **Entity Model** artifact (`IPAD-{PROJECT_ID}-ENTM-*.md`) exists in the project directory. This is a **mandatory** prerequisite.
3. If the ENTM artif...$ARGUMENTS
Note: The
ipad-contexthook automatically injects project context (project list, existing artifacts, maturity level) into this command's execution. Use that context to identify the target project directory, project ID, and any existing artifacts.
$ARGUMENTS (the project ID, e.g., 001).IPAD-{PROJECT_ID}-ENTM-*.md) exists in the project directory. This is a mandatory prerequisite./ipad-kit:entity-model first.IPAD-{PROJECT_ID}-DCAT-*.md or .csv) — for attribute-level classification hints and PII flagsIPAD-{PROJECT_ID}-ASSESS-*.md) — for organisational context and existing data handling practices.ipad/templates/data-classification-template.md.${CLAUDE_PLUGIN_ROOT}/templates/data-classification-template.md.${CLAUDE_PLUGIN_ROOT}/references/framework/entities/ for entities in scope, paying particular attention to attribute sensitivity indicators and PII presence.${CLAUDE_PLUGIN_ROOT}/references/framework/governance/ica-security.md for the ICA security model and the 4-tier classification taxonomy (PUBLIC, INTERNAL, CONFIDENTIAL, RESTRICTED).${CLAUDE_PLUGIN_ROOT}/references/framework/governance/roles-and-responsibilities.md for classification governance roles and approval authority.${CLAUDE_PLUGIN_ROOT}/references/framework/standards/dama-dmbok-mapping.md for Data Security knowledge area alignment.Produce the following sections in the output artifact:
Auto-populate the following fields at the top of the document:
IPAD-{PROJECT_ID}-DCLS-v1.0Overview of the classification exercise — total entities classified, distribution across tiers, PII exposure percentage, and key findings.
Define the 4 tiers with IPA-specific definitions, examples, and impact if breached:
| Tier | Definition | IPA Examples | Impact if Breached |
|---|---|---|---|
| PUBLIC | Data intended for or already in the public domain | Published FDI statistics, country profiles, public rankings | Minimal — data is already public |
| INTERNAL | IPA operational data not for external release | Campaign plans, internal KPIs, staff allocations, event logistics | Moderate — competitive disadvantage, operational disruption |
| CONFIDENTIAL | Sensitive business, investor, or personal data | Investor details, project pipelines, commercial terms, PII | Significant — regulatory penalty, investor trust loss, reputational damage |
| RESTRICTED | National security or highly sensitive policy data | Undisclosed policy positions, intelligence briefings, ongoing negotiations | Severe — national security risk, diplomatic impact |
Table classifying every in-scope entity:
For entities where different attributes have different classification tiers, provide a detailed breakdown:
sector = PUBLIC but investment_amount = CONFIDENTIAL and contact_email = CONFIDENTIAL (PII)Document the rule that when data from different classification tiers is combined, the resulting dataset inherits the highest classification tier of any contributing data element. Provide concrete IPA examples:
Comprehensive table of all attributes flagged as personally identifiable information:
Summary view per business domain:
For each classification tier, define:
Access Controls: PUBLIC (open access) / INTERNAL (role-based, IPA staff, standard auth) / CONFIDENTIAL (need-to-know, named role authorisation, MFA) / RESTRICTED (named individual authorisation, security clearance, audit trail)
Encryption: PUBLIC (optional for integrity) / INTERNAL (at rest + in transit, TLS 1.2+) / CONFIDENTIAL (mandatory AES-256 at rest, TLS 1.3 in transit, key management) / RESTRICTED (mandatory enhanced encryption, HSM key storage, end-to-end)
Retention and Disposal: Retention periods per tier aligned with IPA data retention policy and local regulations; disposal methods (logical deletion, cryptographic erasure, physical destruction); archival requirements before disposal
Audit Requirements: PUBLIC (none) / INTERNAL (annual access review) / CONFIDENTIAL (semi-annual access review, access logging) / RESTRICTED (quarterly access review, comprehensive audit trail, security incident monitoring)
pie chart showing distribution of in-scope entities across classification tiers. Include a second pie chart showing PII vs non-PII distribution.
projects/{project-dir}/IPAD-{PROJECT_ID}-DCLS-v1.0.md.v1.0 -> v1.1).---
**Generated by**: IPAD Kit `/ipad-kit:data-classification` command
**Generated on**: {DATE}
**IPAD Kit Version**: {IPAD_KIT_VERSION}
**Project**: {PROJECT_ID}-{project-name}
/ipad-kit:security — Define security controls aligned to each classification tier/ipad-kit:governance — Formalise classification governance, review cadence, and dispute resolution