This is known as a data flow diagram when you draw it on a network diagram or something like that to visualize it. Data Flow Diagramsīefore we get to where sensitive data is stored, it’s often helpful to understand where it enters your organization, what parts of your organization it passes through, and then finally identifying where it is stored. So let’s take a look at some considerations to help get you started with creating data flow diagrams and developing a data storage inventory. But as with a lot of things in security, this is easier said than done and many people don’t even know where to start. Understanding how what sensitive data flows throughout your network, who has access to it, and where it eventually winds up is just as important, so adequate security controls can be applied to protect this data. computers, devices, monitors), they are overlooking another critical asset they should be considering: their data. While most companies are pretty good at inventorying their physical assets (e.g. For any organization, the first step in protecting your assets is understanding what you have.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
June 2023
Categories |