Security Control - Data Security through Classification Policies
Description Controlling data encryption via security policy enforcement and/or risk posture
Components and Required Capabilities

 Data Loss Prevention

  • Must have the ability to get user profile data from identity administration

Cloud Access Security Broker

  • Must have the ability to encrypt documents for administrative analysis

Fraud & Risk

  • Must have the ability to send risk status to requesting tool as a defined value (low, moderate, high, extreme)
Interaction Diagram