projects:ccsp:chapter2
差别
这里会显示出您选择的修订版和当前版本之间的差别。
projects:ccsp:chapter2 [2025/06/29 20:05] – 创建 jackiez | projects:ccsp:chapter2 [2025/06/29 20:08] (当前版本) – jackiez | ||
---|---|---|---|
行 1: | 行 1: | ||
**Summary ** | **Summary ** | ||
- | This chapter discussed the data lifecycle and data management functions within the data life cycle, including data retention, auditing, and disposal. The various roles, rights, and respon sibilities | + | This chapter discussed the data lifecycle and data management functions within the data life cycle, including data retention, auditing, and disposal. The various roles, rights, and responsibilities |
**Exam Essentials** | **Exam Essentials** | ||
- | **Describe data flows and their use in a cloud environment. ** Data flows are used to describe | + | |
- | **Understand the various roles, rights, and responsibilities related to data ownership. **Know | + | **Describe data flows and their use in a cloud environment.** Data flows are used to describe where and how data moves throughout an environment. Details like ports, protocols, ser vices, and what data fields or types are sent and received are important components of data |
- | **Be familiar with data discovery methods. **Describe the differences between structured, | + | **Understand the various roles, rights, and responsibilities related to data ownership.**Know who the data subject, owner, controller, processor, and custodian are. Understand the rights and responsibilities associated with each. |
- | **Understand the objectives of and tools used to implement information rights | + | **Be familiar with data discovery methods.**Describe the differences between structured, semi- structured, and unstructured data and offer examples of each type of data. Understand why data location matters and what impact it may have on data discovery processes and capabilities. |
- | **Know what should be included in policies for data retention, deletion, and archiving. **Understand essential aspects like the terms retention and disposal. Know reten tion formats, how regulations dictate these things, and how every policy needs to include | + | **Understand the objectives of and tools used to implement information rights management.**IRM tools are designed to protect data rights and require provisioning that gives appropriate users permission based on their roles and responsibilities. Access models are used to determine who will receive rights, and a combination of certificates for identification and licenses that list the permissions or rights of the users or systems are used to make IRM work. |
- | **Understand data and media sanitization. **Most traditional sanitization methods will not work in cloud environments. Cryptographic erasure is one of the few ways to ensure secure | + | **Know what should be included in policies for data retention, deletion, and archiving.**Understand essential aspects like the terms retention and disposal. Know retention |
+ | **Understand data and media sanitization.**Most traditional sanitization methods will not work in cloud environments. Cryptographic erasure is one of the few ways to ensure secure data disposal in environments where you cannot ensure physical destruction of data and devices. Overwriting and other techniques cannot provide assurance of data destruction in cloud environments. |
projects/ccsp/chapter2.1751195121.txt.gz · 最后更改: 由 jackiez