Explanation should include
- configuration management
- standard naming convention
- IP
- data protection
- data loss prevention (DLP)
- masking, encryption
- at rest
- in transit and/or motion
- in processing
- tokenization
- right’s management
- response and recovery controls
- Secure Sockets Layer (SSL)/Transport Layer Security (TSL) inspection
- hashing
- site resiliency
- hot, cold, and warm sites
- deception and disruption
- honeypots
- honeyfiles
- honeynets
- fake telemetry
- DNS sinkhole.