Key Takeaways
- Classify data into four tiers (Public, Internal, Confidential, Restricted) with handling rules for each.
- Apply the principle of least privilege—team members access only what their role requires.
- Revoke departing employee access within 24 hours; use multi-factor authentication on all critical systems.
- A documented breach response plan reduces response time by 50-70%.
This track contains subscriber-only lessons
Explore free tracks in this area of study, or subscribe for full access.
Browse available tracks"Process Failure Modes, Data Security & Disaster Recovery" is a Pro track
Upgrade to access all lessons in this track and the entire curriculum.
Test Your Knowledge
1.What is operational risk?
2.What is a risk register?
3.What is the Recovery Time Objective (RTO)?