The Information-Centric Security Lifecycle. Adrian Lane Securosis, L.L.C.
|
|
|
- Baldwin Warner
- 10 years ago
- Views:
Transcription
1 The Information-Centric Security Lifecycle Adrian Lane Securosis, L.L.C.
2 Mainframe Internet I Internet II Jail Fortress Zone
3 But what about the information?
4 Network Data Application Information Data Host User Network Host
5 Network Application Information User Host
6 The Information-Centric Security Lifecycle
7 Create Classify Assign Rights Store Access Controls Encryption Rights Management Content Discovery Use Activity Monitoring and Enforcement Rights Management Logical Controls Application Security Share CMP (DLP) Encryption Logical Controls Application Security Archive Encryption Asset Management Destroy Crypto-Shredding Secure Deletion Content Discovery
8 ILM and Security Create Creation and Receipt Store Maintenan ce Use Use Use Share Distribution Archive Disposition Destroy
9 Create Content is classified as it s created through content analysis or based on labeling of data elements. Rights are assigned, based on central policies. Mandatory and discretionary policies.
10 Create Create Create Technologies Control Structured Unstructured Classify None* None* Assign Rights Label Security Enterprise DRM Note- Classification is expected to emerge from DLP/CMP
11 Label Security Column ID Last First SSN 1111 Mogull Richard Smith John Row ID Last First Region Label 1111 Mogull Richard US Public 1112 Smith John EMEA Sensitive
12 Content Analysis Partial Document Matching Database Fingerprinting Statistical Exact File Matching Categories Conceptual ^(?:(?<Visa>4\d{3}) (?<Mastercard>5[1-5]\d{2}) (?<Discover>6011) (?<DinersClub>(?:3[68]\d{2}) (?:30[0-5]\d)) (?<AmericanExpress>3[47]\d{2}))([ - ]?)(?(DinersClub)(?:\d{6}\1\d{4}) (?(AmericanExpress)(?:\d{6}\1\d{5}) (?:\d{4}\1\d{4}\1\d{4})))$ Rules
13 Store We use access controls, encryption, and rights management to protect data in storage. Content Discovery helps find unprotected sensitive data that slipped through the gaps.
14 Store Technologies Control Structured Unstructured Access Controls DBMS Access Controls Administrator Separation of Duties File System Access Controls Document Management System Access Controls Store Encryption Field Level Encryption Application Level Encryption File/Media Encryption* Media Encryption File Encryption Distributed Encryption Rights Management Label/Row Level Security Enterprise DRM Content Discovery Database-Specific Discovery Tools DLP/CMF Content Discovery Storage/Data Classification Tools
15 Access Controls Encryption DRM
16 Encryption Options rmogull Phoenix asdfasdf asdfasdf File/Folder Application/ Database Media
17 Content Discovery
18 Use Monitor and protect information during use. Includes business applications and productivity applications. Heavy use of content-aware technologies.
19 Use Use Use Use Technologies Control Structured Unstructured Activity Monitoring and Enforcement Database Activity Monitoring Application Activity Monitoring Endpoint Activity Monitoring File Activity Monitoring Portable Device Control Endpoint DLP Rights Management Label Security Enterprise DRM Logical Controls Application Security Object (Row) Level Security Structural Controls Application Logic Implemented At Application Layer
20 Two Sides Of Information-Centric Security Data Center Productivity
21 CMP CMP
22 ADMP Adaptive Authentication Application NAC Activity Monitoring Anti-Exploitation Transaction Authentication Session Security Application Virtualization
23 asdf asd asd ads ads ads asd asd asdf asd asd ads ads ads asd asd Cross-Domain Information Protection ID Last First SSN 1111 Mogull Richard Smith John ID Last First SSN 1111 Mogull Richard Smith John Customer Report Customer retention grew 13% YoY. Customer held return value while... Customer Report Customer retention grew 13% YoY. Customer held return value while Last First SSN 11 Last First SSN
24 Share Securely exchange information, inside and outside of the enterprise. A mixture of content-aware technologies and encryption for secure exchange.
25 Share Share Share Share Technologies Control Structured Unstructured CMP/DLP Database Activity Monitoring (With DLP Feature) Network/Endpoint CMP/DLP Encryption *Only When Data Elements Not Otherwise Encrypted Network Encryption Application Level Encryption Encryption File Encryption Network Encryption Logical Controls Object (Row) Level Security Structural Controls Application Security Implemented At Application Layer
26 Inter-Organization Encryption vs. DRM
27 Archive Protect information in archival storage. Encryption and asset management
28 Archive Archive Archive Archive Technologies Control Structured Unstructured Encryption Field-Level Encryption Tape Encryption Storage Encryption (Multiple Options) Asset Management Asset Management Asset Management
29 Tape Encryption Options In-line Drive Software
30 Destroy Ensure data is not recoverable at end of life Content discovery to ensure dangerous data isn t hiding where it shouldn t be.
31 Destroy Destroy Destroy Destroy Technologies Control Structured Unstructured Crypto-Shredding Enterprise Key Management Enterprise Key Management Secure Deletion Disk/Free Space Wiping Disk/Free Space Wiping Physical Destruction Physical Destruction Physical Destruction Content Discovery Database-Specific Discovery Tools DLP/CMF Content Discovery Storage/Data Classification Tools Enterprise Search E-Discovery
32 Create Classify Assign Rights Store Access Controls Encryption Rights Management Content Discovery Use Activity Monitoring and Enforcement Rights Management Logical Controls Application Security Share CMP (DLP) Encryption Logical Controls Application Security Archive Encryption Asset Management Destroy Crypto-Shredding Secure Deletion Content Discovery
33 Adrian Lane Securosis, L.L.C. AIM: whoisadrianlane Skype: whoisadrianlane
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Understanding and Selecting a DLP Solution. Rich Mogull Securosis
Understanding and Selecting a DLP Solution Rich Mogull Securosis No Wonder We re Confused Data Loss Prevention Data Leak Prevention Data Loss Protection Information Leak Prevention Extrusion Prevention
Discovery Technology Group
Discovery Technology Group E-mail Retention: Readiness Survey E-mail now represents the largest source of new documents and records generated within a company, and the most troublesome from a retention
Comprehensive Approach to Database Security
Comprehensive Approach to Database Security [email protected] NYOUG 2008 1 What will I discuss today Identify Threats, Vulnerabilities and Risk to Databases Analyze the drivers for Database Security Identify
Information Governance Manage in Place Use Cases Workshop
Information Governance Manage in Place Use Cases Workshop James Seeley Vice President, Governance Sales threat protection compliance archiving & governance secure communication Information Governance -
IT Roles in Loss Prevention. Presented by: Ann Ostrander, Director of Loss Prevention Kirkland & Ellis LLP
IT Roles in Loss Prevention Presented by: Ann Ostrander, Director of Loss Prevention Kirkland & Ellis LLP What is Loss Prevention (Risk Management)? Mitigate risk Protect the Firm s assets Departments
Best Practices for Long-Term Retention & Preservation. Michael Peterson, Strategic Research Corp. Gary Zasman, Network Appliance
Best Practices for Long-Term Retention & Preservation Michael Peterson, Strategic Research Corp. Gary Zasman, Network Appliance SNIA Legal Notice The material contained in this tutorial is copyrighted
Records Management and SharePoint 2013
Records Management and SharePoint 2013 SHAREPOINT MANAGEMENT, ARCHITECTURE AND DESIGN Bob Mixon Senior SharePoint Architect, Information Architect, Project Manager Copyright Protected by 2013, 2014. Bob
In ediscovery and Litigation Support Repositories MPeterson, June 2009
XAM PRESENTATION (extensible TITLE Access GOES Method) HERE In ediscovery and Litigation Support Repositories MPeterson, June 2009 Contents XAM Introduction XAM Value Propositions XAM Use Cases Digital
ILM, classification and the Information-Centric Enterprise. Per Sedihn, Vice Chair Nordics Comitte SNIA Europe CTO Proact IT Group
ILM, classification and the Information-Centric Enterprise Per Sedihn, Vice Chair Nordics Comitte SNIA Europe CTO Proact IT Group SN IA Legal N otice The material contained in this tutorial is copyrighted
E-mail Management: A Guide For Harvard Administrators
E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered
DLP Content Discovery: Best Practices for Stored Data Discovery and Protection
DLP Content Discovery: Best Practices for Stored Data Discovery and Protection by Rich Mogull This Report Sponsored by: Securosis, L.L.C. http://securosis.com Author s Note The content in this report was
Data Protection McAfee s Endpoint and Network Data Loss Prevention
Data Protection McAfee s Endpoint and Network Data Loss Prevention Dipl.-Inform. Rolf Haas Principal Security Engineer, S+, CISSP [email protected] January 22, 2013 for ANSWER SA Event, Geneva Position Features
EMC SourceOne Email Management and ediscovery Overview
EMC SourceOne Email Management and ediscovery Overview Deanna Hoover EMC SourceOne Systems Engineer 1 Agenda Value of Good Information Governance Introduction to EMC SourceOne Information Governance Email
ILM: Tiered Services & The Need For Classification
ILM: Tiered Services & The Need For Classification Edgar StPierre, EMC 2 SNW San Diego April 2007 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
Better Together: Microsoft Office 365 & Symantec Office 365
#SymVisionEmea #SymVisionEmea Better Together: Microsoft Office 365 & Symantec Office 365 & Symantec Mike Smart Product Marketing Information SECURITY David Moseley Product Marketing Information MANAGEMENT
THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION. Technology Overview, Business Justification, and Resource Requirements
THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION Technology Overview, Business Justification, and Resource Requirements Introduction to Data Loss Prevention Intelligent Protection for Digital Assets Although
Critical Data Guide. A guide to handling critical information at Indiana University
Critical Data Guide A guide to handling critical information at Indiana University What is critical information? IU defines critical information as sensitive data requiring the highest level of protection.
with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
Practical tips for managing e mail
E MAIL MANAGEMENT E mail messages both sent and received that provide evidence of a government transaction are considered public records. Agencies and locality Records Officers must ensure that e mail
Electronic Discovery How can I be prepared? September 2010
Electronic Discovery How can I be prepared? September 2010 Presented by Brian Wilkinson, Director of ediscovery & Computer Forensics [email protected] 410-659-3473 Table of Contents Page 1 Electronic
Protecting Data-at-Rest with SecureZIP for DLP
Protecting Data-at-Rest with SecureZIP for DLP TABLE OF CONTENTS INTRODUCTION 3 PROTECTING DATA WITH DLP 3 FINDING INDIVIDUAL AND SHARED INFORMATION-AT-REST 4 METHODS FOR REMEDIATION 4 ENCRYPTING UNPROTECTED
ISO 27000 Information Security Management Systems Professional
ISO 27000 Information Security Management Systems Professional Professional Certifications Sample Questions Sample Questions 1. A single framework of business continuity plans should be maintained to ensure
Email Management Trends, Troubles, and Solutions
Email Management Trends, Troubles, and Solutions Kevin O Connor General Manager, Content Management & Archiving 1 Information Challenges Lead to Archiving Data Growth Digital Proliferation Cost Escalating
Records Management 101
Records Management 101 Tiffany Songvilay #SPSBurgh @officeovereasy 1 Agenda What is Records Management? Out-of-the-box solutions Centralized vs. in-place debate What s new in 2013 2 Who is Tiffany Songvilay?
IBM Policy Assessment and Compliance
IBM Policy Assessment and Compliance Powerful data governance based on deep data intelligence Highlights Manage data in-place according to information governance policy. Data topology map provides a clear
Record Retention and Digital Asset Management Tim Shinkle Perpetual Logic, LLC
Record Retention and Digital Asset Management Tim Shinkle Perpetual Logic, LLC 1 Agenda Definitions Electronic Records Management EDMS and ERM ECM Objectives Benefits Legal and Regulatory Requirements
State of Michigan Records Management Services. Frequently Asked Questions About E mail Retention
State of Michigan Records Management Services Frequently Asked Questions About E mail Retention It is essential that government agencies manage their electronic mail (e mail) appropriately. Like all other
CA Technologies Data Protection
CA Technologies Data Protection can you protect and control information? Johan Van Hove Senior Solutions Strategist Security [email protected] CA Technologies Content-Aware IAM strategy CA Technologies
GUIDELINE RECORDS AND INFORMATION INVENTORY
Government of Newfoundland and Labrador Office of the Chief Information Officer Information Management Branch GUIDELINE RECORDS AND INFORMATION INVENTORY Guideline (Definition): OCIO Guidelines derive
NCHICA HITECH Act Breach Notification Risk Assessment Tool. Prepared by the NCHICA Privacy, Security & Legal Officials Workgroup
NCHICA HITECH Act Breach Notification Risk Assessment Tool Prepared by the NCHICA Privacy, Security & Legal Officials Workgroup NORTH CAROLINA HEALTHCARE INFORMATION AND COMMUNICATIONS ALLIANCE, INC August
Data Classification Technical Assessment
Data Classification Update: February 13th, 2015 Statement of Confidentiality This Confidential Information is being provided to Customer ABC as a deliverable of this consulting engagement. The sole purpose
Document Management and Records Management in SharePoint 2013. Scott Jamison
Document Management and Records Management in SharePoint 2013 Scott Jamison Chief Architect & CEO Digital Asset Management Document Imaging Workflow Document Management Records Management
Records Retention & E-Discovery. Preserving Electronically Stored Information for Litigation
Records Retention & E-Discovery Preserving Electronically Stored Information for Litigation Introduction Increasingly, data is created, sent, received, and stored electronically. In fact, 89 billion business
White Paper. Archiving Best Practices: 9 Steps to Successful Information Lifecycle Management. Contents
White Paper Archiving Best Practices: 9 Steps to Successful Information Lifecycle Management Contents Executive Summary...2 Exponentially Increasing Data Volumes...2 Inadequate Solutions...3 The Solution:
Records and Information Management. General Manager Corporate Services
Title: Records and Information Management Policy No: 057 Adopted By: Chief Officers Group Next Review Date: 08/06/2014 Responsibility: General Manager Corporate Services Document Number: 2120044 Version
Information Security Policy
Information Security Policy Contents Version: 1 Contents... 1 Introduction... 2 Anti-Virus Software... 3 Media Classification... 4 Media Handling... 5 Media Retention... 6 Media Disposal... 7 Service Providers...
Why can you trust Google?
Why can you trust Google? Przemek Sienkiewicz Head of Enterprise CEE, Russia & CIS Why is Security So Tough? Data Problem: Users want to access their data anytime, from anywhere 60% 1-out-of-10 66% of
Economic Realities in the Management of Public Records. George Bakolia Senior Deputy State Chief Information Officer November 4, 2011
Economic Realities in the Management of Public Records George Bakolia Senior Deputy State Chief Information Officer November 4, 2011 Outline Statutory and other requirements Hidden vs. direct costs Records
DOCUMENT RETENTION STRATEGIES FOR HEALTHCARE ORGANIZATIONS
Overview. DOCUMENT RETENTION STRATEGIES FOR HEALTHCARE ORGANIZATIONS A comprehensive and consistently applied document retention policy is necessary to reduce the risk of being charged with spoliation
Solutions for admission control and data loss prevention in a modern corporate network
Solutions for admission control and data loss prevention in a modern corporate network 15 th Finance Tech Forum Yasen Spasov Sales & Pre-sales Manager Executive Summary Founded in 1995 Subsidiary of INTRACOM
10 Building Blocks for Securing File Data
hite Paper 10 Building Blocks for Securing File Data Introduction Securing file data has never been more important or more challenging for organizations. Files dominate the data center, with analyst firm
What security and compliance challenges exist with the move to Microsoft Office 365?
PROOFPOINT FOR OFFICE 365: ENABLES ADVANCED SECURITY AND COMPLIANCE FOR YOUR ENTERPRISE UNDERSTAND THE SOLUTION BY ROLE: IT & SECURITY What security and compliance challenges exist with the move to Microsoft
3 MUST-HAVES IN PUBLIC SECTOR INFORMATION GOVERNANCE
EXECUTIVE SUMMARY Information governance incorporates the policies, controls and information lifecycle management processes organizations and government agencies utilize to control cost and risk. With
How To Protect Your Information From Being Hacked On A Network From A Mobile Device
Securosis, L.L.C. Best Practices for Endpoint Data Loss Prevention by Rich Mogull This Report Sponsored by: Securosis, L.L.C. http://securosis.com Author s Note The content in this report was developed
Best Practices for Endpoint Data Loss Prevention
Securosis, L.L.C. Best Practices for Endpoint Data Loss Prevention by Rich Mogull This Report Sponsored by: Securosis, L.L.C. http://securosis.com Author s Note The content in this report was developed
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
State of South Carolina Policy Guidance and Training
State of South Carolina Policy Guidance and Training Policy Workshop All Agency Mobile Security July 2014 Agenda Questions & Follow-Up Policy Workshop Overview & Timeline Policy Overview: Mobile Security
how can I comprehensively control sensitive content within Microsoft SharePoint?
SOLUTION BRIEF Information Lifecycle Control for Sharepoint how can I comprehensively control sensitive content within Microsoft SharePoint? agility made possible CA Information Lifecycle Control for SharePoint
Defensible Disposition Strategies for Disposing of Structured Data - etrash
Defensible Disposition Strategies for Disposing of Structured Data - etrash Presented by John Isaza, Esq., FAI Co-Founder & CEO, Information Governance Solutions, LLC Tom Reding, CRM Executive Consultant,
FROM PAPER TO ELECTRONIC RECORDS MANAGEMENT MANAGING THE TRANSITION
FROM PAPER TO ELECTRONIC RECORDS MANAGEMENT MANAGING THE TRANSITION Library Technology Conference 2011 Macalester College St. Paul, Minnesota Presenter: Barbara E. Nye, CRM - Ictus Consulting, LLC Managing
Archiving and The Federal Rules of Civil Procedure: Understanding the Issues
Archiving and The Federal Rules of Civil Procedure: Understanding the Issues An ArcMail Technology Research Paper ArcMail Technology, Inc. 401 Edwards Street, Suite 1620 Shreveport, Louisiana 71101 www.arcmailtech.com
Record Management in SharePoint
Record Management in SharePoint JULY 2013 (please consult http://www.katprotech.com/whitepapers for the latest version of this paper) ABOUT KATPROTECHNOLOGIES: Katpro Technologies is an advanced technology
Information Technology
Credit Card Handling Security Standards Overview Information Technology This document is intended to provide guidance to merchants (colleges, departments, organizations or individuals) regarding the processing
Using Enterprise Content Management Principles to Manage Research Assets. Kelly Mannix, Manager Deloitte Consulting Perth, WA.
Using Enterprise Content Management Principles to Manage Research Assets Kelly Mannix, Manager Deloitte Consulting Perth, WA November 2010 Agenda Introduction Defining ECM Understanding the Challenges
CISA TIMETABLE (4 DAYS)
CISA TIMETABLE (4 DAYS) ISACA-CISA Day 1 9.00 9.30 Welcome, Introductions, Coffee 9.30 11.00 About the CISA Exam Domain 1 - The Process of Auditing Information Systems Auditing Types of Audits Audit Methodology
The evolution of data archiving
The evolution of data archiving 1 1 How archiving needs to change for the modern enterprise Today s enterprises are buried by data, and this problem is being exacerbated by the unfettered growth of unstructured
A Maturity Model for Enterprise Key Management. Lessons Learned
A Maturity Model for Enterprise Key Management Lessons Learned Agenda Problem statement Approach Framework Maturity model Applying the model Gaps and lessons learned Conclusions Page 2 Problem statement
Information Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
TITUS Data Security for Cloud Email Identify and Control Sensitive Data Sent to the Cloud
Business Brief TITUS Data Security for Cloud Email Identify and Control Sensitive Data Sent to the Cloud Nine out of 10 businesses cite security as the top obstacle for cloud adoption. - IDC Control Data
The Future of Records Management. Senior Director, Loss Prevention Project Manager/Developer
The Future of Records Management Ann Ostrander Jimmy Lam Senior Director, Loss Prevention Project Manager/Developer Kirkland & Ellis LLP Loeb & Loeb LLP Agenda What is driving the change? People Technology
A. USB Portable Storage Device (PSD) Encryption Procedure
A. USB Portable Storage Device (PSD) Encryption Procedure After installing McAfee Endpoint Encryption software to your Windows PC, you can perform encryption to the USB PSD. I) When the USB PSD is inserted
Concepts of Database Management Seventh Edition. Chapter 7 DBMS Functions
Concepts of Database Management Seventh Edition Chapter 7 DBMS Functions Objectives Introduce the functions, or services, provided by a DBMS Describe how a DBMS handles updating and retrieving data Examine
Classifying Correspondence. General, Administrative, Project/Case, and Transitory
Classifying Correspondence General, Administrative, Project/Case, and Transitory UT Records Retention Schedule (UTRRS) Categories Correspondence to be retained as part of another record series, such as
Basic Records Management Practices for Saskatchewan Government*
Provincial Saskatchewan Archives R of Saskatchewan Basic Records Management Practices for Saskatchewan Government* Provincial Archives of Saskatchewan (306) 787-0734 [email protected] www.saskarchives.com
<Insert Picture Here> How to protect sensitive data, challenges & risks
How to protect sensitive data, challenges & risks Lars Klumpes CISSP Security Strategy Consultant EMEA Disclaimer The following is intended to outline our general product direction.
Information Archiving
Information Archiving Drinking from the firehose. Raymond Lambie Product Marketing Manager, HP Autonomy AP/J Archive or Backup What is the difference? Ctrl-X or Ctrl-C An archive is a primary copy of inactive
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Microsoft SharePoint and Records Management Compliance
Microsoft SharePoint and Records Management Compliance White Paper Revision: 2 Date created: 20 February 2015 Principal author: Nigel Carruthers-Taylor, Principal, icognition Reference: 15/678 Summary
98% 22% RM-Speedy [03] Sven Hapke IBM Deutschland GmbH. From Records Management to Information Lifecycle Governance
RM-Speedy [03] From Records Management to Information Lifecycle Governance Sven Hapke IBM Deutschland GmbH The Information Governance Problem 98% Companies that cite defensible disposal as key result of
Life Cycle of Records
Discard Create Inactive Life Cycle of Records Current Retain Use Semi-current Records Management Policy April 2014 Document title Records Management Policy April 2014 Document author and department Responsible
Data Security What are you waiting for? Lior Arbel General Manager Europe Performanta
Data Security What are you waiting for? Lior Arbel General Manager Europe Performanta So, what is a DLP solution? DLP = Data Leakage (loss) Prevention Products that, based on central policies, identify,
ILM et Archivage Les solutions IBM
Information Management ILM et Archivage Les solutions IBM Dr. Christian ARNOUX Consultant Information Management IBM Suisse, Software Group 2007 IBM Corporation IBM Strategy for Enterprise Content Compliance
5 FAM 440 ELECTRONIC RECORDS, FACSIMILE RECORDS, AND ELECTRONIC MAIL RECORDS
5 FAM 440 ELECTRONIC RECORDS, FACSIMILE RECORDS, AND ELECTRONIC MAIL RECORDS (CT:IM-158; 12-29-2014) (Office of Origin: A/GIS/IPS) NOTE: In October, 2014, the Department issued an interim directive superseding
Identifying Broken Business Processes
Identifying Broken Business Processes A data-centric approach to defining, identifying, and enforcing protection of sensitive documents at rest, in motion, and in use 6/07 I www.vericept.com Abstract The
