Designing a Strategy for Securing Data
The previous chapter discussed security requirements for applications, including prioritizing mitigating threats, standards for onboarding new applications, and security strategies for applications and APIs. This chapter will discuss designing a strategy for securing data and mitigating threats, including mitigating threats to data, identifying and protecting sensitive data, and data encryption standards.
In this chapter, we are going to cover the following main topics:
- Specifying priorities for mitigating threats to data
- Designing a strategy to identify and protect sensitive data
- Specifying an encryption standard for data at rest and in motion
- Case study – designing a strategy to secure data