Encryption, tokenization, masking and quarantining
When deploying a security infrastructure, sensitive data protection must be considered a top priority. You need to make the system understand how to react when sensitive data is accessed or requested (at rest or in transit). Encryption, tokenization, masking, and quarantining protect data itself either at rest or in transit. In the following section, we look at encryption as a defense mechanism.
Encryption as a defense mechanism
Your organization's data might constantly be in motion, moving across the network or the internet for client-facing firms (data in transit); or, the data might just be sitting at one or more places (company filesystems and employees' hard drives—data at rest). You need to ensure that data is protected from the moment it leaves its location to the requester's location or when it is at rest. The level of security you apply to your sensitive data determines the risk profile. Attackers...