!!! Overview
[{$pagename}] is the [Access Control] applied to [Data] which relies on proper [Data Classification]




[{$pagename}] is part of [Data Management] includes:
* [Data Access Governance] ([DAG])
* [Access Control] - which includes considerations for [Digital Rights Management] and [Information Rights Management]
* [Data Loss Prevention] ([DLP])
* [Disclosure-Alteration-Destruction]
* [Disaster Recovery]
* [Data Disposal]

!! Some General Observations
When technology allows anyone with a [mobile Device] the ability to take a snapshot of a piece of paper or a computer screen, it seems it must be assumed if they can view it, they can capture it.


!! [IDSA Integration Framework] 
[IDSA Integration Framework]  describes [{$pagename}] as:
* [Data Access Governance] ([DAG]) - The discovery and [Data Protection] of [data] across the enterprise and manages the process of how users are granted [access] to this [data]
* [Enterprise Mobility Management] ([EMM]) - Allows the registration of [Mobile Devices] to safely leverage [Single Sign-On] ([SSO]) for access to [cloud computing] and [Native applications]. In addition, the chain of [trust] associated with a registered device exposes device attributes and [compliance] rules.
* [Data Loss Prevention] ([DLP]) - [Prevention] of the distribution of sensitive [data] by utilizing sufficient [risk] based definitions to determine the appropriate level of [assurance].
* [Cloud Access Security Broker] ([CASB]) - Utilizes the deep analysis capabilities to provide [Adaptive Risk] analytics to identify compromised [credentials] and potential [risks] that can then be used in [authentication] decisions.

!! [{$pagename}] and [Regulatory compliance]
Consider these extracts from various regulations, demonstrating the central theme of protecting identity-based information exchanges:

* "[unauthorized] [access] to [data] that may result in destruction of [data] or improper changes to data, including the recording of [unauthorized] or nonexistent transactions or inaccurate recording of transactions…" ([SOX], [SAS] 94).
* [GDPR] - "[shall|SHALL] implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk [Personal data]…" ([General Data Protection Regulation] ).
** [Article 32 - Security of processing|https://gdpr-info.eu/art-32-gdpr/|target='_blank'] emphasizing [Encryption] and [Pseudonymization]
* "Provide reasonable assurance regarding prevention or timely detection of [unauthorized] acquisition, use or disposition of the registrant's assets that could have a material effect on the financial statements," ([SOX], Audit Std. No. 2).


!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]