The critical data’s geographic location and the devices servers/storage/network it resides on, and where it has been replicated to.
Security Tool Identification
What and if any security tools are deployed on identified devices and enabled to protect the critical data.
Data Breach Notifications
Indicating what data subject’s data ran on what assets, identification of secondary locations of infrastructure for the safe handling of data transporting across borders.
Discover | Identify what personal data you have and where it resides.
Manage | Govern how personal data is used and accessed.
Protect | Establish security controls to prevent, detect, and respond to vulnerabilities and data breaches.
Report | Act on data requests, report data breaches, and keep required documentation.