CHAPTER 8: MAPPING DATA IN THE SYSTEM

Chapter Overview

Ask why a system needs to be secure and the answer will almost always be the data that resides on that system. Add in the fact that most services consist of more than one system and we can assume that our data could reside in multiple places and we may have more than one dataset with a different level of value. So if it’s the data we are trying to protect and it may be in more than one place then it makes sense that we need to map where it is. This chapter uses a similar technique to the previous chapter so I recommend reading that first.

Understanding the location of data is important when considering where the threats are. If multiple threats could attack a service with data that is sensitive ...

Get Information Security A Practical Guide: Bridging the Gap between IT and Management now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.