Phase | Description |
---|---|
Plan | Foundational activities for secure data management include identification of data requirements, data classification, and planning for storage and compliance. |
Create | Creating the data, ensuring integrity using digital signatures or checksums. |
Store | Securely storing the data, including tags, encryption, implementing access control, alignment with data residency laws, and potentially implementing data dispersion (storing data in several locations). |
Use | Accessing and processing the data, including encryption in transit. |
Share | Secure sharing of data between environments, enforcing the principle of least privilege, encryption in transit, and data transfer policies. |
Archive | Establishing long-term storage whilst ensuring data integrity and enforcing retention policies. |
Destroy | Secure data deletion. For example, via cryptographic erasure, which means the encryption key is deleted or secure overwriting for private cloud-hosted data. |
Last active
July 29, 2025 12:23
-
-
Save gezza-b/e7ace0d8d6d2c18bd69f31c009cbd96c to your computer and use it in GitHub Desktop.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment