4.0 Application, Data and Host Security


4.4 Implement the appropriate controls to ensure data security.

  • Cloud storage
  • SAN
  • Handling Big Data
  • Data encryption
    • Full disk
    • Database
    • Individual files
    • Removable media
    • Mobile devices
  • Hardware based encryption devices
    • TPM
    • HSM
    • USB encryption
    • Hard drive
  • Data in transit, data at rest, data in use
  • Permissions/ACL
  • Data policies
    • Wiping
    • Disposing
    • Retention
    • Storage

Recommended

 





Associates