Zusammenfassung der Ressource
Data-centric Security
- Discovery
- Classification
- Unstructured
- Users
- Non-Public
- Encryption
- Data in Motion
- Data at Rest
- Key Management
- Access Controls
- Identity Management
- Entitlements
- Entitlement Reviews
- Least Privilege
- Need to Know
- Log Management
- Auditing
- Privileged Users
- Data Loss Prevention
- Removable Media
- Personal Email
- Email
- Instant Messaging
- Social Media
- Cloud Storage
- File Transfer Protocols
- Log Management
- Auditing
- Masking
- Data in Use
- Log Management
- Auditing
- Policies & Procedures
- Awareness Training
- Notifications
- Passwords
- Structured
- Applications
- Non-Public
- Encryption
- Data In Motion
- Data In Use
- Key Management
- Data in Transit
- Privileged Users
- Data at Rest
- Data Loss Prevention
- Email
- Personal Email
- Instant Messaging
- Social Media
- Cloud Storage
- File Transfer Protocols
- Log Management
- Auditing
- Policies & Procedures
- Awareness Training
- Provisioning
- Passwords
- Session Recording
- Separation of Duties
- Vulnerability Testing
- Patch Management
- Risk Assessment