|
4.4 Implement the appropriate controls to ensure data security.
- Cloud storage
- SAN
- Handling Big Data
- Data encryption
- Full disk
- Database
- Individual files
- Removable media
- Mobile devices
- Hardware based encryption devices
- TPM
- HSM
- USB encryption
- Hard drive
- Data in transit, data at rest, data in use
- Permissions/ACL
- Data policies
- Wiping
- Disposing
- Retention
- Storage
|
|
|