- Attacks, Threats, and Vulnerabilities (24%)
- Architecture and Design (21%)
- Implementation (25%)
- Operations and Incident Response (16%)
- Governance, Risk, Compliance (14%)
• Phishing • Smishing • Vishing • Spam • Spam over Internet messaging (SPIM) • Spear phishing • Dumpster diving • Shoulder surfing • Pharming • Tailgating • Eliciting information • Whaling • Prepending • Identity fraud • Invoice scams • Credential harvesting • Reconnaissance • Hoax • Impersonation • Watering hole attack • Typo squatting • Influence campaigns
- Hybrid warfare
- Social media • Principles (reasons for effectiveness)
- Authority
- Intimidation
- Consensus
- Scarcity
- Familiarity
- Trust
- Urgency
• Malware
- Ransomware
- Trojans
- Worms
- Potentially unwanted programs (PUPs)
- Fileless virus
- Command and control
- Bots
- Crypto malware
- Logic bombs
- Spyware
- Keyloggers
- Remote access Trojan (RAT)
- Rootkit
- Backdoor • Password attacks
- Spraying
- Dictionary
- Brute force - Offline - Online
- Rainbow tables
- Plaintext/unencrypted • Physical attacks
- Malicious universal serial bus (USB) cable
- Malicious flash drive
- Card cloning
- Skimming • Adversarial artificial intelligence (AI)
- Tainted training data for machine learning (ML)
- Security of machine learning algorithms • Supply-chain attacks • Cloud-based vs. on-premises attacks • Cryptographic attacks
- Birthday
- Collision
- Downgrade
• Privilege escalation • Cross-site scripting • Injections
- Structured query language (SQL)
- Dynamic link library (DLL)
- Lightweight directory access protocol (LDAP)
- Extensible markup language (XML) • Pointer/object dereference • Directory traversal • Buffer overflows • Race conditions
- Time of check/time of use • Error handling • Improper input handling • Replay attack
- Session replays • Integer overflow • Request forgeries
- Server-side
- Client-side
- Cross-site • Application programming interface (API) attacks • Resource exhaustion • Memory leak • Secure sockets layer (SSL) stripping • Driver manipulation
- Shimming
- Refactoring • Pass the hash
• Wireless
- Evil twin
- Rogue access point
- Bluesnarfing
- Bluejacking
- Disassociation
- Jamming
- Radio frequency identifier (RFID)
- Near field communication (NFC)
- Initialization vector (IV) • Man in the middle • Man in the browser • Layer 2 attacks
- Address resolution protocol (ARP) poisoning
- Media access control (MAC) flooding
- MAC cloning • Domain name system (DNS)
- Domain hijacking
- DNS poisoning
- Universal resource locator (URL) redirection
- Domain reputation • Distributed denial of service (DDoS)
- Network
- Application
- Operational technology (OT) • Malicious code or script execution
- PowerShell
- Python
- Bash
- Macros
- Virtual Basic for Applications (VBA)
• Actors and threats
- Advanced persistent threat (APT)
- Insider threats
- State actors
- Hacktivists
- Script kiddies
- Criminal syndicates
- Hackers - White hat - Black hat - Gray hat
- Shadow IT
- Competitors • Attributes of actors
- Internal/external
- Level of sophistication/capability
- Resources/funding
- Intent/motivation • Vectors
- Direct access
- Wireless
- Supply chain
- Social media
- Removable media
- Cloud • Threat intelligence sources
- Open source intelligence (OSINT)
- Closed/proprietary
- Vulnerability databases
- Public/private information sharing centers
- Dark web
- Indicators of compromise
- Automated indicator sharing (AIS) - Structured threat information exchange (STIX)/Trusted automated exchange of indicator information (TAXII)
- Predictive analysis
- Threat maps
- File/code repositories • Research sources
- Vendor websites
- Vulnerability feeds
- Conferences
- Academic journals
- Request for comments (RFC)
- Local industry groups
- Social media
- Threat feeds - Adversary tactics, techniques, and procedures (TTP)
• Cloud-based vs. on-premises vulnerabilities • Zero-day • Weak configurations
- Open permissions
- Unsecured root accounts
- Errors
- Weak encryption
- Unsecure protocols
- Default settings
- Open ports and services • Third-party risks
- Vendor management - System integration - Lack of vendor support
- Supply chain
- Outsourced code development
- Data storage • Improper or weak patch management
- Firmware
- Operating system (OS)
- Applications • Legacy platforms • Impacts
- Data loss
- Data breaches
- Data exfiltration
- Identity theft
- Financial
- Reputation
- Availability loss
• Threat hunting
- Intelligence fusion
- Threat feeds
- Advisories and bulletins
- Maneuver • Vulnerability scans
- False positives
- False negatives
- Log reviews
- Credentialed vs. non-credentialed
- Intrusive vs. non-intrusive
- Application
- Web application
- Network
- Common Vulnerabilities and Exposures (CVE)/Common Vulnerability Scoring System (CVSS)
- Configuration review • Syslog/Security information and event management (SIEM)
- Review reports
- Packet capture
- Data inputs
- User behavior analysis
- Sentiment analysis
- Security monitoring
- Log aggregation
- Log collectors • Security orchestration, automation, response (SOAR)
1.8 Explain the techniques used in penetration testing
• Penetration testing
- White box
- Black box
- Gray box
- Rules of engagement
- Lateral movement
- Privilege escalation
- Persistence
- Cleanup
- Bug bounty
- Pivoting • Passive and active reconnaissance
- Drones/unmanned aerial vehicle (UAV)
- War flying
- War driving
- Footprinting
- OSINT • Exercise types
- Red team
- Blue team
- White team
- Purple team
• Configuration management
- Diagrams
- Baseline configuration
- Standard naming conventions
- Internet protocol (IP) schema • Data sovereignty • Data protection
- Data loss prevention (DLP)
- Masking
- Encryption
- At rest
- In transit/motion
- In processing
- Tokenization
- Rights management • Hardware security module (HSM) • Geographical considerations • Cloud access security broker (CASB) • Response and recovery controls • Secure Sockets Layer (SSL)/Transport Layer Security (TLS) inspection • Hashing • API considerations • Site resiliency
- Hot site
- Cold site
- Warm site • Deception and disruption
- Honeypots
- Honeyfiles
- Honeynets
- Fake telemetry
- DNS sinkhole
• Cloud models
- Infrastructure as a service (IaaS)
- Platform as a service (PaaS)
- Software as a service (SaaS)
- Anything as a service (XaaS)
- Public
- Community
- Private
- Hybrid • Cloud service providers • Managed service provider (MSP)/ Managed security service provider (MSSP) • On-premises vs. off-premises • Fog computing • Edge computing • Thin client • Containers • Micro-services/API • Infrastructure as code
- Software-defined networking (SDN)
- Software-defined visibility (SDV) • Serverless architecture • Services integration • Resource policies • Transit gateway • Virtualization
- Virtual machine (VM) sprawl avoidance
- VM escape protection
• Environment
- Development
- Test
- Staging
- Production
- Quality assurance (QA) • Provisioning and deprovisioning • Integrity measurement • Secure coding techniques
- Normalization
- Stored procedures
- Obfuscation/camouflage
- Code reuse/dead code
- Server-side vs. client-side execution and validation
- Memory management
- Use of third-party libraries and software development kits (SDKs)
- Data exposure • Open Web Application Security Project (OWASP) • Software diversity
- Compiler
- Binary • Automation/scripting
- Automated courses of action
- Continuous monitoring
- Continuous validation
- Continuous integration
- Continuous delivery
- Continuous deployment • Elasticity • Scalability • Version control
• Authentication methods
- Directory services
- Federation
- Attestation
- Technologies - Time-based one-time password (TOTP) - HMAC-based one-time password (HOTP) - Short message service (SMS) - Token key - Static codes - Authentication applications - Push notifications - Phone call
- Smart card authentication • Biometrics
- Fingerprint
- Retina
- Iris
- Facial
- Voice
- Vein
- Gait analysis
- Efficacy rates
- False acceptance
- False rejection
- Crossover error rate • Multifactor authentication (MFA) factors and attributes
- Factors - Something you know - Something you have - Something you are
- Attributes - Somewhere you are - Something you can do - Something you exhibit - Someone you know • Authentication, authorization, and accounting (AAA) • Cloud vs. on-premises requirements
• Redundancy
- Geographic dispersal
- Disk - Redundant array of inexpensive disks (RAID) levels - Multipath
- Network - Load balancers - Network interface card (NIC) teaming
- Power - Uninterruptible power supply (UPS) - Generator - Dual supply - Managed power distribution units (PDUs) • Replication
- Storage area network (SAN)
- VM • On-premises vs. cloud • Backup types
- Full
- Incremental
- Snapshot
- Differential
- Tape
- Disk
- Copy
- Network attached storage (NAS)
- SAN
- Cloud
- Image
- Online vs. offline
- Offsite storage - Distance considerations • Non-persistence
- Revert to known state
- Last known good configuration
- Live boot media • High availability
- Scalability • Restoration order • Diversity
- Technologies
- Vendors
- Crypto
- Controls
• Embedded systems
- Raspberry Pi
- Field programmable gate array (FPGA)
- Arduino • System control and data acquisition (SCADA)/industrial control system (ICS)
- Facilities
- Industrial
- Manufacturing
- Energy
- Logistics • Internet of Things (IoT)
- Sensors
- Smart devices
- Wearables
- Facility automation
- Weak defaults • Specialized
- Medical systems
- Vehicles
- Aircraft
- Smart meters • Voice over IP (VoIP) • Heating, ventilation, air conditioning (HVAC) • Drones/AVs • Multifunction printer (MFP) • Real-time operating system (RTOS) • Surveillance systems • System on chip (SoC) • Communication considerations
- 5G
- Narrow-band
- Baseband radio
- Subscriber identity module (SIM) cards
- Zigbee • Constraints
- Power
- Compute
- Network
- Crypto
- Inability to patch
- Authentication
- Range
- Cost
- Implied trust
• Bollards/barricades • Mantraps • Badges • Alarms • Signage • Cameras
- Motion recognition
- Object detection • Closed-circuit television (CCTV) • Industrial camouflage • Personnel
- Guards
- Robot sentries
- Reception
- Two-person integrity/control • Locks
- Biometrics
- Electronic
- Physical
- Cable locks • USB data blocker • Lighting • Fencing • Fire suppression • Sensors
- Motion detection
- Noise detection
- Proximity reader
- Moisture detection
- Cards
- Temperature • Drones/UAV • Visitor logs • Faraday cages • Air gap • Demilitarized zone (DMZ) • Protected cable distribution • Secure areas
- Air gap
- Vault
- Safe
- Hot aisle
- Cold aisle • Secure data destruction
- Burning
- Shredding
- Pulping
- Pulverizing
- Degaussing
- Third-party solutions
• Digital signatures • Key length • Key stretching • Salting • Hashing • Key exchange • Elliptical curve cryptography • Perfect forward secrecy • Quantum
- Communications
- Computing • Post-quantum • Ephemeral • Modes of operation
- Authenticated
- Unauthenticated
- Counter • Blockchain
- Public ledgers • Cipher suites
- Stream
- Block • Symmetric vs. asymmetric • Lightweight cryptography • Steganography
- Audio
- Video
- Image • Homomorphic encryption • Common use cases
- Low power devices
- Low latency
- High resiliency
- Supporting confidentiality
- Supporting integrity
- Supporting obfuscation
- Supporting authentication
- Supporting non-repudiation
- Resource vs. security constraints • Limitations
- Speed
- Size
- Weak keys
- Time
- Longevity
- Predictability
- Reuse
- Entropy
- Computational overheads
- Resource vs. security constraints
• Protocols
- Domain Name System Security Extension (DNSSEC)
- SSH
- Secure/multipurpose Internet mail exchanger (S/MIME)
- Secure real-time protocol (SRTP)
- LDAPS
- File transfer protocol, secure (FTPS)
- Secured file transfer protocol (SFTP)
- Simple Network Management Protocol, version 3 (SNMPv3)
- Hypertext transfer protocol over SSL/TLS (HTTPS)
- IPSec - Authentication header (AH)/ Encapsulated security payload (ESP) - Tunnel/transport
- Secure post office protocol (POP)/ Internet message access protocol (IMAP) • Use cases
- Voice and video
- Time synchronization
- Email and web
- File transfer
- Directory services
- Remote access
- Domain name resolution
- Routing and switching
- Network address allocation
- Subscription services
• Endpoint protection
- Antivirus
- Anti-malware
- Endpoint detection and response (EDR)
- DLP
- Next-generation firewall
- Host intrusion prevention system (HIPS)
- Host intrusion detection system (HIDS)
- Host-based firewall • Boot integrity
- Boot security/Unified Extensible Firmware Interface (UEFI)
- Measured boot
- Boot attestation • Database
- Tokenization
- Salting
- Hashing • Application security
- Input validations
- Secure cookies
- Hypertext Transfer Protocol (HTTP) headers
- Code signing
- Whitelisting
- Blacklisting
- Secure coding practices
- Static code analysis - Manual code review
- Dynamic code analysis
- Fuzzing • Hardening
- Open ports and services
- Registry
- Disk encryption
- OS
- Patch management - Third-party updates - Auto-update • Self-encrypting drive (SED)/ full disk encryption (FDE)
- Opal • Hardware root of trust • Trusted Platform Module (TPM) • Sandboxing
• Load balancing
- Active/active
- Active/passive
- Scheduling
- Virtual IP
- Persistence • Network segmentation
- Virtual local area network (VLAN)
- DMZ
- East-west traffic
- Extranet
- Intranet
- Zero trust • Virtual private network (VPN)
- Always on
- Split tunnel vs. full tunnel
- Remote access vs. site-to-site
- IPSec
- SSL/TLS
- HTML5
- Layer 2 tunneling protocol (L2TP) • DNS • Network access control (NAC)
- Agent and agentless • Out-of-band management • Port security
- Broadcast storm prevention
- Bridge Protocol Data Unit (BPDU) guard
- Loop prevention
- Dynamic Host Configuration Protocol (DHCP) snooping
- Media access control (MAC) filtering • Network appliances
- Jump servers
- Proxy servers - Forward - Reverse
- Network-based intrusion detection system (NIDS)/network-based intrusion prevention system (NIPS) - Signature based - Heuristic/behavior - Anomaly - Inline vs. passive
- HSM
- Sensors
- Collectors
- Aggregators
- Firewalls - Web application firewall (WAF) - Next-generation firewall - Stateful - Stateless - Unified threat management (UTM) - Network address translation (NAT) gateway - Content/URL filter - Open-source vs. proprietary - Hardware vs. software - Appliance vs. host-based vs. virtual • Access control list (ACL) • Route security • Quality of service (QoS) • Implications of IPv6 • Port spanning/port mirroring
- Port taps • Monitoring services • File integrity monitors
• Cryptographic protocols
- WiFi protected access II (WPA2)
- WiFi protected access III (WPA3)
- Counter-mode/CBC-MAC protocol (CCMP)
- Simultaneous Authentication of Equals (SAE) • Authentication protocols
- Extensible Authentication Protocol (EAP)
- Protected Extensible Application Protocol (PEAP)
- EAP-FAST
- EAP-TLS
- EAP-TTLS
- IEEE 802.1X
- Remote Authentication Dial-in User Server (RADIUS) Federation • Methods
- Pre-shared key (PSK) vs. Enterprise vs. Open
- WiFi Protected Setup (WPS)
- Captive portals • Installation considerations
- Site surveys
- Heat maps
- WiFi analyzers
- Channel overlays
- Wireless access point (WAP) placement
- Controller and access point security
• Connection methods and receivers
- Cellular
- WiFi
- Bluetooth
- NFC
- Infrared
- USB
- Point to point
- Point to multipoint
- Global Positioning System (GPS)
- RFID • Mobile device management (MDM)
- Application management
- Content management
- Remote wipe
- Geofencing
- Geolocation
- Screen locks
- Push notifications
- Passwords and pins
- Biometrics
- Context-aware authentication
- Containerization
- Storage segmentation
- Full device encryption • Mobile devices
- MicroSD HSM
- MDM/Unified endpoint management (UEM)
- Mobile application management (MAM)
- SEAndroid • Enforcement and monitoring of:
- Third-party app stores
- Rooting/jailbreaking
- Sideloading
- Custom firmware
- Carrier unlocking
- Firmware over-the-air (OTA) updates
- Camera use
- SMS/multimedia message service (MMS)/Rich communication services (RCS)
- External media
- USB on the go (OTG)
- Recording microphone
- GPS tagging
- WiFi direct/ad hoc
- Tethering
- Hotspot
- Payment methods • Deployment models
- Bring your own device (BYOD)
- Corporate-owned personally enabled (COPE)
- Choose your own device (CYOD)
- Corporate-owned
- Virtual desktop infrastructure (VDI)
• Cloud security controls
- High availability across zones
- Resource policies
- Secrets management
- Integration and auditing
- Storage - Permissions - Encryption - Replication - High availability
- Network - Virtual networks - Public and private subnets - Segmentation - API inspection and integration
- Compute - Security groups - Dynamic resource allocation - Instance awareness - Virtual private cloud (VPC) endpoint - Container security • Solutions
- CASB
- Application security
- Next-generation secureweb gateway (SWG)
- Firewall considerations in a cloud environment - Cost - Need for segmentation - Open Systems Interconnection (OSI) layers • Cloud native controls vs. third-party solutions
• Identity
- Identity provider (IdP)
- Attributes
- Certificates
- Tokens
- SSH keys
- Smart cards • Account types
- User account
- Shared and generic accounts/credentials
- Guest accounts
- Service accounts • Account policies
- Password complexity
- Password history
- Password reuse
- Time of day
- Network location
- Geofencing
- Geotagging
- Geolocation
- Time-based logins
- Access policies
- Account permissions
- Account audits
- Impossible travel time/risky login
- Lockout
- Disablement
• Authentication management
- Password keys
- Password vaults
- TPM
- HSM
- Knowledge-based authentication • Authentication
- EAP
- Challenge Handshake Authentication Protocol (CHAP)
- Password Authentication Protocol (PAP)
- 802.1X
- RADIUS
- Single sign-on (SSO)
- Security Assertions Markup Language (SAML)
- Terminal Access Controller Access Control System Plus (TACACS+)
- OAuth
- OpenID
- Kerberos • Access control schemes
- Attribute-based access control (ABAC)
- Role-based access control
- Rule-based access control
- MAC
- Discretionary access control (DAC)
- Conditional access
- Privilege access management
- Filesystem permissions
• Public key infrastructure (PKI)
- Key management
- Certificate authority (CA)
- Intermediate CA
- Registration authority (RA)
- Certificate revocation list (CRL)
- Certificate attributes
- Online Certificate Status Protocol (OCSP)
- Certificate signing request (CSR)
- CN
- SAN
- Expiration • Types of certificates
- Wildcard
- SAN
- Code signing
- Self-signed
- Machine/computer
- User
- Root
- Domain validation
- Extended validation • Certificate formats
- Distinguished encoding rules (DER)
- Privacy enhanced mail (PEM)
- Personal information exchange (PFX)
- .cer
- P12
- P7B • Concepts
- Online vs. offline CA
- Stapling
- Pinning
- Trust model
- Key escrow
- Certificate chaining
• Network reconnaissance and discovery
- tracert/traceroute
- nslookup/dig
- ipconfig/ifconfig
- nmap
- ping/pathping
- hping
- netstat
- netcat
- IP scanners
- arp
- route
- curl
- the harvester
- sn1per
- scanless
- dnsenum
- Nessus
- Cuckoo • File manipulation
- head
- tail
- cat
- grep
- chmod
- logger • Shell and script environments
- SSH
- PowerShell
- Python
- OpenSSL • Packet capture and replay
- Tcpreplay
- Tcpdump
- Wireshark • Forensics
- dd
- Memdump
- WinHex
- FTK imager
- Autopsy • Exploitation frameworks • Password crackers • Data sanitization
• Incident response plans • Incident response process
- Preparation
- Identification
- Containment
- Eradication
- Recovery
- Lessons learned • Exercises
- Tabletop
- Walkthroughs
- Simulations • Attack frameworks
- MITRE ATT&CK
- The Diamond Model of Intrusion Analysis
- Cyber Kill Chain • Stakeholder management • Communication plan • Disaster recovery plan • Business continuity plan • Continuity of operation planning (COOP) • Incident response team • Retention policies
• Vulnerability scan output • SIEM dashboards
- Sensor
- Sensitivity
- Trends
- Alerts
- Correlation • Log files
- Network
- System
- Application
- Security
- Web
- DNS
- Authentication
- Dump files
- VoIP and call managers
- Session Initiation Protocol (SIP) traffic • syslog/rsyslog/syslog-ng • journalctl • nxlog • Retention • Bandwidth monitors • Metadata
- Mobile
- Web
- File • Netflow/sflow
- Echo
- IPfix • Protocol analyzer output
• Reconfigure endpoint security solutions
- Application whitelisting
- Application blacklisting
- Quarantine • Configuration changes
- Firewall rules
- MDM
- DLP
- Content filter/URL filter
- Update or revoke certificates • Isolation • Containment • Segmentation • Secure Orchestration, Automation, and Response (SOAR)
- Runbooks
- Playbooks
• Documentation/evidence
- Legal hold
- Video
- Admissibility
- Chain of custody
- Timelines of sequence of events - Time stamps - Time offset
- Tags
- Reports
- Event logs
- Interviews • Acquisition
- Order of volatility
- Disk
- Random-access memory (RAM)
- Swap/pagefile
- OS
- Device
- Firmware
- Snapshot
- Cache
- Network
- Artifacts • On-premises vs. cloud
- Right to audit clauses
- Regulatory/jurisdiction
- Data breach notification laws • Integrity
- Hashing
- Checksums
- Provenance • Preservation • E-discovery • Data recovery • Non-repudiation • Strategic intelligence/ counterintelligence
• Category
- Managerial
- Operational
- Technical • Control type
- Preventative
- Detective
- Corrective
- Deterrent
- Compensating
- Physical
5.2 Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture
• Regulations, standards, and legislation
- General Data Protection Regulation (GDPR)
- National, territory, or state laws
- Payment Card Industry Data Security Standard (PCI DSS) • Key frameworks
- Center for Internet Security (CIS)
- National Institute of Standards and Technology (NIST) RMF/CSF
- International Organization for Standardization (ISO) 27001/27002/27701/31000
- SSAE SOC 2 Type II/III
- Cloud security alliance - Cloud control matrix - Reference architecture • Benchmarks /secure configuration guides
- Platform/vendor-specific guides
- Web server
- OS
- Application server
- Network infrastructure devices
• Personnel
- Acceptable use policy
- Job rotation
- Mandatory vacation
- Separation of duties
- Least privilege
- Clean desk space
- Background checks
- Non-disclosure agreement (NDA)
- Social media analysis
- Onboarding
- Offboarding
- User training - Gamification - Capture the flag - Phishing campaigns - Phishing simulations - Computer-based training (CBT) - Role-based training • Diversity of training techniques • Third-party risk management
- Vendors
- Supply chain
- Business partners
- Service level agreement (SLA)
- Memorandum of understanding (MOU)
- Measurement systems analysis (MSA)
- Business partnership agreement (BPA)
- End of life (EOL)
- End of service (EOS)
- NDA • Data
- Classification
- Governance
- Retention • Credential policies
- Personnel
- Third party
- Devices
- Service accounts
- Administrator/root accounts • Organizational policies
- Change management
- Change control
- Asset management
• Risk types
- External
- Internal
- Legacy systems
- Multiparty
- IP theft
- Software compliance/licensing • Risk management strategies
- Acceptance
- Avoidance
- Transference - Cybersecurity insurance
- Mitigation • Risk analysis
- Risk register
- Risk matrix/heat map
- Risk control assessment
- Risk control self-assessment
- Risk awareness
- Inherent risk
- Residual risk
- Control risk
- Risk appetite
- Regulations that affect risk posture
- Risk assessment types - Qualitative - Quantitative
- Likelihood of occurrence
- Impact
- Asset value
- Single loss expectancy (SLE)
- Annualized loss expectancy (ALE)
- Annualized rate of occurrence (ARO) • Disasters
- Environmental
- Man-made
- Internal vs. external • Business impact analysis
- Recovery time objective (RTO)
- Recovery point objective (RPO)
- Mean time to repair (MTTR)
- Mean time between failures (MTBF)
- Functional recovery plans
- Single point of failure
- Disaster recovery plan (DRP)
- Mission essential functions
- Identification of critical systems
- Site risk assessment
• Organizational consequences of privacy breaches
- Reputation damage
- Identity theft
- Fines
- IP theft • Notifications of breaches
- Escalation
- Public notifications and disclosures • Data types
- Classifications - Public - Private - Sensitive - Confidential - Critical - Proprietary
- Personally identifiable information (PII)
- Health information
- Financial information
- Government data
- Customer data • Privacy enhancing technologies
- Data minimization
- Data masking
- Tokenization
- Anonymization
- Pseudo-anonymization • Roles and responsibilities
- Data owners
- Data controller
- Data processor
- Data custodian/steward
- Data privacy officer (DPO) • Information life cycle • Impact assessment • Terms of agreement • Privacy notice