Personal Identifiable Information (PII) Risk Management Strategy
VerifiedAdded on  2020/05/11
|11
|1182
|207
AI Summary
This assignment presents a comprehensive strategy for managing the various threats and risks associated with Personal Identifiable Information (PII). It includes an in-depth threat and risk assessment focusing on ten primary areas: improper encryption methods, inadequate security measures, human error, data lock-in issues, governance loss, compliance challenges, co-tenant activities, cloud service failure or termination, resource exhaustion, and malicious insiders. Each area is evaluated based on its description, root cause, potential response, affected assets, probability of occurrence, impact level, and recovery time. The document prioritizes the implementation of robust encryption techniques, strong security policies, accurate resource modeling, and effective governance to protect sensitive data from external threats and internal vulnerabilities. Additionally, it emphasizes the importance of vendor selection, compliance with regulations, monitoring tenant activities, and insider threat management. This strategic approach aims to safeguard user privacy, maintain company reputation, ensure service delivery, and build customer trust in cloud-based environments.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
1 out of 11