10
Designing a Strategy for Securing Data
The previous chapter discussed security requirements for applications, including prioritizing mitigating threats, standards for onboarding new applications, and security strategies for applications and APIs. This chapter will discuss designing a strategy for securing data and mitigating threats, including mitigating threats to data, identifying and protecting sensitive data, and data encryption standards.
In this chapter, we are going to cover the following main topics:
- Specifying priorities for mitigating threats to data
- Designing a strategy to identify and protect sensitive data
- Specifying an encryption standard for data at rest and in motion
- Case study – designing a strategy to secure data
Specifying ...
Get Microsoft Cybersecurity Architect Exam Ref SC-100 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.