πŸ‘¨β€πŸ’»
Mike's Notes
  • Introduction
  • MacOs Setup
    • System Preferences
    • Homebrew
      • Usage
    • iTerm
      • VIM
      • Tree
      • ZSH
    • Visual Studio Code
    • Git
    • SSH Keys
  • DevOps Knowledge
    • SRE
      • Scaling Reliably
        • Splitting a Monolith into Microservices
      • Troubleshooting Common Issues
      • Service Level Terminology
      • Toil
      • Monitoring
      • Release Engineering
      • Best Practices
      • On-Call
      • Alerting
    • Containers
      • Docker
        • Best Practices
          • Image Building
          • Docker Development
        • CLI Cheat Sheet
      • Container Orchestration
        • Kubernetes
          • Benefits
          • Cheat Sheet
          • Components
          • Pods
          • Workload Resources
          • Best Practices
    • Developer Portal πŸ‘¨β€πŸ’»
      • Solution Overview 🎯
      • System Architecture πŸ—οΈ
      • Implementation Journey πŸ› οΈ
      • Cross-team Collaboration 🀝
      • Lessons & Future πŸŽ“
    • Provisioning
      • Terraform
        • Installation
        • Usage
    • Configuration Management
      • Ansible
        • Benefits
        • Installation
    • Build Systems
      • Bazel
        • Features
  • Security
    • Secure Software Engineering
    • Core Concepts
    • Security Design Principles
    • Software Security Requirements
    • Compliance Standards and Policies
      • Sarbanes-Oxley (SOX)
      • HIPAA and HITECH
      • Payment Card Industry Data Security Standard (PCI-DSS)
      • General Data Protection Regulation (GDPR)
      • California Consumer Privacy Act (CCPA)
      • Federal Risk and Authorization Management Program (FedRAMP)
    • Privacy & Data
  • Linux Fundamentals
    • Introduction to Linux
    • Architecture
    • Server Administration
      • User / Groups
      • File Permissions
      • SSH
      • Process Management
    • Networking
      • Diagrams
      • Browser URL Example
      • Network Topologies
      • Signal Routing
      • DNS (Domain Name System)
      • SSL (Secure Sockets Layer)
      • TLS (Transport Layer Security)
  • System Design
    • Process
    • Kafka
      • Advanced Topics
    • URL Shortener
Powered by GitBook
On this page
  • Personally Identifiable Information (PII)
  • Data
  • Data Classification

Was this helpful?

  1. Security

Privacy & Data

Privacy refers to an individual's right to keep their personal information, activities, and communications confidential.

Personally Identifiable Information (PII)

This refers to information that can be used to identify someone.

  • Full name

  • National identification number (i.e., SSN)

  • IP address

  • Home address

  • Motor vehicle registration plate number

  • Driver’s license or state ID number

  • Face, fingerprints, or handwriting

  • Credit card and bank account numbers

  • Date of birth

  • Birthplace

  • Genetic information

Data

Data refers to raw and unprocessed facts, figures, symbols, or information that can be in the form of numbers, text, images, or any other format. Data can be collected, stored, and manipulated to extract meaningful insights, support decision-making, or perform various tasks.

Data Classification

Data classification is a multifaceted process, encompassing state, use, and security importance, serving as a risk management tool to align protection costs with asset value and potentially becoming more intricate for larger enterprises with diverse data protection requirements, including compliance considerations.

Data States

  • At Rest/Being Stored

  • Being Created/Generated

  • Being Transmitted

  • Being Updated/Deleted

Data Usage

  • Input

  • Output

  • Initialized (internal)

Data Risk Impact

Impact
Damage
Financial Consequence

High

Death

Greater than $1,000,000

Medium

Severe Injury / Loss of Functionality

Greater than $100,000

Low

Minor Injury

Less than $100,000

PreviousFederal Risk and Authorization Management Program (FedRAMP)NextIntroduction to Linux

Last updated 1 year ago

Was this helpful?