Source |
The State of Security |
Identifiant |
8647008 |
Date de publication |
2025-02-05 05:30:08 (vue: 2025-02-05 12:07:57) |
Titre |
CIS Control 03: Data Protection |
Texte |
Key Takeaways for Control 3 At the heart of a strong data management plan is awareness surrounding the \' Five Ws\' of the enterprise\'s data: What data does the enterprise store or handle? Who should have access to it? Where is it stored or accessed? When should it be deleted? Why does it need protection? A comprehensive data management plan incorporates the answers to these questions with policy decisions and incident response procedures. Knowing what data an enterprise produces or consumes, as well as being able to classify it based on sensitivity, are the keystones of such a plan...
Key Takeaways for Control 3 At the heart of a strong data management plan is awareness surrounding the \' Five Ws\' of the enterprise\'s data: What data does the enterprise store or handle? Who should have access to it? Where is it stored or accessed? When should it be deleted? Why does it need protection? A comprehensive data management plan incorporates the answers to these questions with policy decisions and incident response procedures. Knowing what data an enterprise produces or consumes, as well as being able to classify it based on sensitivity, are the keystones of such a plan... |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
03: able access accessed answers are awareness based being cis classify comprehensive consumes control data data: decisions deleted does enterprise five handle have heart incident incorporates key keystones knowing management need plan policy procedures produces protection questions response sensitivity should store stored strong such surrounding takeaways these well what when where who why |
Tags |
|
Stories |
|
Move |
|