Data Protocol Docs Logo
0/

checklist

Security & Privacy: Preliminary Checklist

For more on this topic, take the Course: Security & Privacy

1 min read

Share this doc:


Before you take a privacy-centric view of your security infrastructure, use the following attack surfaces checklist.

At my organization, there is or are:

If you checked off any of the above boxes, you have some work to do.

These attack surfaces are all the places where your organization is vulnerable to cyber threats and attacks - and these problem areas are not discrete and disconnected gaps.

Next Steps

Assess your answers and make a plan. Where are the data protection gaps? How can you engage your team of cross-functional stakeholders to move the program forward?

For more on this topic, take the Course:


Data Protocol Course

Security & Privacy

In this course, you will learn how to build a framework that reduces the attack surface for sensitive data and how to implement tools for the management of access control and monitoring, such as Access Control Lists (ACLs) and encryption keys.

Share this doc:


Your privacy matters.

By clicking "Accept All", you are agreeing to Data Protocol's Cookie Policy.