Securing data and ensuring compliance
The first step toward efficiently securing your data is classifying it. After all, not all data is created equal, and you don't want to spend the same measure of effort and money on protecting every type of data.
Classifying your data
As discussed in Chapter 5, Architecting Storage and Data Infrastructure, data can be classified according to sensitivity levels. Example levels could be restricted, sensitive, and unrestricted. Alternatively, the levels could be confidential, internal use, and public. A three-tier classification system works well in most cases, but it could be different for your organization. The basis for classification can either be the data's content itself, the context surrounding the data (for example, which application or business function created it?), or a manual classification. A data classification policy could look like the following:
On GCP, the Cloud Data Loss Prevention (Cloud...