About this program
Threat context: Database Leak / Unauthorised Data Exposure
This program audits the controls that mitigate the above threat. Each procedure references one mapped control. Run the program to score your exposure.
Risks addressed
Controls (6)
-
Data loss prevention (DLP)
Data Loss Prevention (DLP) is a set of technologies and processes that detect, monitor, and block sensitive data from being transmitted outside authorized boundaries, whether intentionally or accidentally. DLP solutions inspect data at rest (stored files), in motion (network traffic,…
How to test + evidence
-
Data classification and labelling
Data classification and labelling is the systematic categorization of organizational data assets based on sensitivity, regulatory requirements, and business impact, combined with the application of persistent metadata labels that travel with the data. Organizations define classification tiers (e.g., Public, Internal,…
How to test + evidence
-
Encryption at rest
Encryption at rest protects data stored on persistent media (disk, tape, object storage, databases) by transforming it into ciphertext using cryptographic algorithms, ensuring confidentiality even if physical media is compromised or accessed without authorization. This control typically involves full-disk encryption…
How to test + evidence
-
Encryption in transit
Encryption in transit protects data while it moves between systems, networks, or components by encoding it using cryptographic protocols such as TLS 1.2 or higher, SSH, IPsec, or equivalent. This control mandates that all sensitive or regulated data traversing untrusted…
How to test + evidence
-
Privileged access management (PAM)
Privileged Access Management (PAM) controls the lifecycle of accounts with elevated system, application, or data permissions through dedicated tooling and processes. PAM solutions typically vault privileged credentials, enforce session recording, require just-in-time access requests with approval workflows, and rotate passwords…
How to test + evidence
-
Logging and alerting
Logging and alerting is the systematic collection, retention, and real-time monitoring of security-relevant events across systems, applications, networks, and security controls to detect and respond to incidents. This control requires configuring centralized log aggregation, defining alert thresholds for suspicious activity,…
How to test + evidence