Professional Documents
Culture Documents
2. PII
5. Roles:
a. clearing
b. purging
c. destruction
d. remanence
8. Data states
a. at rest (storage)
b. in motion (transit / on the wire)
c. in use (application)
a. at rest (storage) -
encryption
obfuscation / tokenization
archive / dispose / destruct
mobile device protection
physical media control
b. in motion (transit) -
encryption
perimeter security
web content filtering
network traffic monitoring
VPN's
c. in use (application) -
encryption
user monitoring
workstation restrictions
application controls (whitelist / blacklist)
data labeling