16Data Security (PR.DS)

Securing data in all its states isn’t just a technical necessity; it’s a foundational pillar of trust and resilience, ensuring that every byte of information remains under our guardianship, irrespective of its phase in the digital lifecycle.

In cybersecurity, protecting data across different states—whether at rest, in transit, or use—is fundamental to ensuring the overall security of an organization’s informational assets. The confidentiality, integrity, and availability of data at rest are safeguarded through encryption techniques, stringent access control measures, and regular security audits, ensuring that sensitive information stored on devices remains secure from unauthorized access or alterations. Similarly, data-in-transit requires robust protection facilitated by encryption protocols like transport layer security (TLS) and secure sockets layer (SSL), secure authentication mechanisms, and vigilant monitoring systems to prevent interception or breaches during transmission. For data-in-use, applying access controls, employing end-to-end encryption for processing sensitive information, and implementing secure coding practices are critical to safeguarding information in applications and processes. Finally, a comprehensive approach to data backups—characterized by regular, encrypted, and redundant backup processes—ensures that data can be recovered following unexpected incidents, maintaining the continuity and resilience of business operations.

Get A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.