Application data security requirements may change at different points in the life cycle of that data. In this video, learn about the data life cycle, and about the stages in that life cycle that may trigger changes in the data security requirements.
- [Instructor] Everything has a beginning, … a middle, and an end, … and your application data is no different. … Data has its own life cycle, … and your security requirements may change … at different points in the life cycle of that data. … As a CSSLP, you'll constantly be challenged … to find an effective balance … between the effectiveness of your security controls … and the cost of those controls. … An underlying theme that often appears … in data security discussions … is that those costs are often proportional … to the sheer volume of data you need to protect. … Reducing your data volume … could reduce costs associated with data protection controls … like encryption, not to mention your data storage, … backup, and disposal cost. … In the age of big data, though, … the benefits of having all that data … could outweigh the cost of protecting it. … That's only one of the reasons … that you should approach your data life cycle discussions … with a clear understanding … of your organization's business model. …
Share this video
Embed this video
Video: Data life cycle