Chapter 12: Designing Security for Data Policies and Standards
Welcome to the next section of the syllabus, Design and Implement Data Security. This section accounts for about 10–15% of the questions in the certification. According to the syllabus, this section is supposed to have two chapters: one focusing on the design aspects, and another focusing on implementation aspects. But, to ensure a better flow of topics and to avoid too many context switches, I've merged both the design and implementation details into this single chapter. Once you have completed this chapter, you should be able to recognize sensitive information and be able to design and implement various sensitive information-handling techniques such as data masking, row and column level security, implementing role-based access and access-controlled lists, enabling encryption and more. You will also be aware of the good practices for handling keys, secrets, and certificates, and understand the low-level implementation...