Data Security Lifecycle 2.0

Security research firm Securosis has updated their Data Security Lifecycle to more clearly address specific issues pertaining to cloud computing, which lists controls for data in different phases of the lifecycle: creation (or update/modification), storage, usage, sharing, archiving and destruction. This version takes into account factors such as data location, ownership, access methods and more.  They are rolling out the new and improved lifecycle model in a series of posts to their blog. Here’s the introductory post – follow them all to learn about the more comprehensive lifecycle model that’s applicable to more complex modern computing environments:

http://www.securosis.com/blog/introducing-the-data-security-lifecycle-2.0

Leave a Comment

Your email address will not be published.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top