April 2024
Intermediate to advanced
238 pages
6h 10m
English
This chapter is about classifying your data and assets. We covered classifying data according to the impact level of its loss in Chapter 10. A fully developed mature advanced information security program has an asset inventory and has classified those assets as critical. If you have a large-scale environment, this task can be daunting.
You should start with the assets that have critical data on them. Think about the critical data your company needs to protect and any device, server, or host on which information is processed, transferred, and stored. No problem, right?
In this chapter, we’re going to cover the following main topics: