The Information Protection Life Cycle and Framework: Secure
Content of Figures
1 Executive Summary
The Information Protection Life Cycle (IPLC) and Framework describe the phases, methods, and controls associated with the protection of information. T ...
Login Free 30-day Select Access Get full Access2 Analysis
The three stages in the life of information objects are: acquire & assess, active use life, and disposition.
Active Use Life
Active Use Life is a ...
Login Free 30-day Select Access Get full Access3 Recommendations
-
Encrypt your data at rest and in transit
a. Remember that encryption is nearly worthless without secure encryption key management. Consider usi ...
4 Related Research
Leadership Brief: Introduction to the Information Protection Life Cycle and Framework - 80370
Leadership Brief: Information Life Cycle and Framework: Acquire and Assess - 80371
Leadership Brief: Information Life Cycle and Framework: Control Access - 80372
Leadership Brief: Information Life Cycle and Framework: Monitor and Detect – 80374
Leadership Brief: Leveraging Identity Fabrics on Your Way Towards Cloud-Based IAM - 80501
Leadership Compass: Database and Big Data Security – 79015
Market Compass: Enterprise Information Protection - 80217
Advisory Note: Big Data Security, Governance and Stewardship - 72565
Whitepaper: Protecting Your Keys to the Kingdom Against Cyber-attacks and Insider Threat – 72613