Insecure Design

Public DataData available to everyone, like company blogs
Private DataData available to authenticated users
Restricted DataSensitive data that may be owned by particular users, like profile information
High Risk DataAccess tokens, passwords and credentials for third-party APIs that must never be shared

Denoting your data with different risk categories can help you think through how to secure the most sensitive data.