Summary
In this chapter, you completed your review of asset security—specifically, how to manage digital assets over the course of their life cycle. You reviewed some of the particulars in the usage and destruction phases of the data life cycle. You learned what information you need to collect and the questions you need to answer to properly oversee digital assets. Additionally, you explored the destruction phase and the criteria for when and how to carry out the destruction of a digital asset. Further, you examined the security controls and compliance requirements that influence how you should manage digital assets during their life cycle. Finally, you reviewed how to control/prevent DLP in traditional environments as well as cloud environments. In the next chapter, you will begin learning about Domain 3, Security Architecture and Engineering. Chapter 7 will focus on secure design principles and controls, being the first of three chapters covering Domain 3.