The security mechanisms that a security engineer may apply really depend on the threats, criticality of data, and associated risks. If your financial transaction data are in files (papers), then the concentration should be more on the physical security of the room where these financial files are placed.
We have to understand where exactly the data lies, the criticality of this data, and the associated risks. This is one of the reasons why security tools and strategies differ across organizations.
Some organizations that deal or store sensitive data such as credit/debit cards need to follow very stringent security standards that will further be evaluated as a part of a compliance audit by an external auditor.
In this book, we assume that your environment is in the cloud and the data or the process that is being stored is important for the business of the...