Data Protection Parent topic

Before you can monitor digital assets for potential loss, you must be able to answer the following questions:
  • What data needs protection from unauthorized users?
  • Where does the sensitive data reside?
  • How is the sensitive data transmitted?
  • What users are authorized to access or transmit the sensitive data?
  • What action should be taken if a DLP incident occurs?
This important audit typically involves multiple departments and personnel familiar with the digital assets in your organization.
If you already defined your digital assets and security strategy, you can begin to define data identifiers, templates, and policies.