From the course: Cloud Data, Platform, and Applications Security by Pearson
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Data classification and policy
From the course: Cloud Data, Platform, and Applications Security by Pearson
Data classification and policy
The initial phases of the information security lifecycle involves identification, assessment or evaluation of assets, and classification of data assets as well. So labeling and tagging may also classify or apply a sensitivity level to the data. This information can be used to level how it's protected, the access rights, the digital rights and other different initiatives. Handling policies will dictate who has access to data and is often driven by labeling and classification. Now you can base classification on the location of the data. It could be the monetary value of the data. It could be its utility or its useful lifetime. For example, previous training that I did for CCSP has less usefulness, less utility than when the ISC2 released an update in 2022. Eventually, ISC2 will release a new update to the CCSP exam and this existing training will lose some of its utility as we have to update for that new iteration of the exam. You can classify based on the age of the data, or by…
Contents
-
-
-
-
(Locked)
Learning objectives29s
-
(Locked)
Concepts of cloud data security6m 12s
-
(Locked)
Data obfuscation4m 4s
-
(Locked)
Information rights management3m 10s
-
(Locked)
Keys, secrets, and certificate management3m 17s
-
(Locked)
Data discovery4m 22s
-
(Locked)
Data classification and policy5m 22s
-
(Locked)
Auditability, traceability, and accountability4m 43s
-
(Locked)
-
-
-
-
-
-
-