Specifying priorities for mitigating threats to data
Besides people, data is the most important asset of a company. The goal of the cybersecurity architect is to specify and design the requirements that are to be used to protect that data. Throughout this book, we have discussed strategies we can use to implement strategies for defense in depth and zero-trust methodologies. The goal of these methodologies is to protect data at the center. Part 2 – Designing a Zero-Trust Strategy and Architecture can be revisited if you wish to recall these methodologies.
Threats and attacks on data are created when vulnerabilities are exploited. These vulnerabilities could be from user identities being breached, exposed, and increased levels of privileged access, the ability to laterally move across resources, or data that is improperly exposed. These attacks lead to potential data exfiltration or data deletion.
Defending against attacks on data requires due diligence and due care in putting...