Chapter 3 Flashcards
Three analysis methods used with data discovery techniques
Metadata, labels, and content analysis
Features of IRM
- Sets up a baseline for the default Information Protection Policy
- Adds an extra layer of access controls on top of the data object or document
- Protects sensitive organization content
- Contains ACLs and is embedded into the original file, therefore IRM is agnostic to the location of the data
Which process analyze data to look for certain attributes or patterns
Discovery
Four elements that a data retention policy should define
- Retention Periods
- Data Formats
- Data Security
- Data Retrieval procedures for the enterprise
APIS can be broken into multiple formats, which include
REST: A software architecture style consisting of guidelines and best practices for creating scalable web services
SOAP: A protocol specification for exchanging structured information in the implementation of web services in computer networks
Principles used in the performance of Trust Services Engagements
- Processing Integrity
- Confidentiality
- Availability
- Security
- Privacy
Common capabilities of IRM solutions
- Persistent protection
- Dynamic Policy Control
- Automatic expiration
- Continuous audit trail
- Support for existing authentication security infrastructure
- Mapping for repository ACLs
- Integration with all third-party email filtering engines
- Additional security and protection capabilities
- Support for email applications
- Support for other document types
Data Discovery Issues
- Hidden costs
- Dashboard
- Poor data quality
Categories of personal data that can be processed
- Sensitive Data
- Telephone or Internet Data
- Biometric Data
- Personal Data
- Categories of the processing to be performed
Important Processes of the continuous operation of Audit logging
- Reduction of False positives
- Adding new rules
- New event detection