CHAPTER 5

Information Governance

This chapter covers the following topics from Domain 5 of the CSA Guidance:

•   Governance Domains

•   Six Phases of the Data Security Lifecycle and Their Key Elements

•   Data Security Functions, Actors, and Controls

Data is the new gold.

—Mark Cuban

Over the years, I’ve seen “IT Security” morph from a focus on physical security, to operating system security in the late ’90s, and then network security in the mid 2000s. Now, with a new name—cybersecurity—much of the focus is (finally) turning to the applications and the data processed and stored by these systems. This is, if you will, the next frontier in IT security.

The primary goal of information security is to grant only those permissions required by someone ...

Get CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.