While security controls are implemented in the create phase in the form of SSL/TLS, this only protects data in transit and not data at rest. The store phase is the first phase in which security controls are implemented to protect data at rest.
When your create data, you're just typing or modifying however, when you submit it, you'll trigger the store phase, hence the secuirt starts at the store phase
B is the correct choice - the CCSP official study indicates this is the first stage where security controls can be implemented to protect data at rest.
This is a tricky question to try and trip you up. It says "the first stage" making it sound like the first phase in the data life cycle world, which would be "Create."
However, "Store" is the right answer, because in the "Create" phase the data owner is defined, then data is categorized, classified, labeled, tagged and marked. And if created remotely, data should be encrypted, and connections secured (VPN) and secure key management practices should be practiced. Now, in the "Store" phase which occurs almost concurrently with the "Create" phase is where it's immediately important to employ:
The use of backup methods on top of security controls to prevent data loss.
Additional encryption for data at rest. DLP and IRM technologies are used to ensure that data security is enforced during the Use and Share phases of the cloud data lifecycle.
While security controls are implemented in the create phase in the form of SSL/TLS, this only protects data in transit and not data at rest. The store phase is the first phase in which security controls are implemented to protect data at rest.
security controls can be initially implemented at the create phase as well, specifically in the form of technologies such as SSL/TLS with data that is inputted or imported.
Create - as has been said throughout the comments, data classification and labeling is most certainly a "security control" as defined in NIST SP 800-53, ISO 27001, HITRUST, etc. (look up "information handling" in the control sets).
Store
The Store phase often happens in tandem with (or immediately after) the Create
phase. During this phase, the created or modified data is saved to some sort of
digital repository within the application or system. Storage can be in the form of
saved files on a filesystem, rows and columns saved to a database, or objects saved
in a cloud storage system.
During the Store phase, the classification level assigned during creation is used to
assign and implement appropriate security controls. Controls like encryption (at
rest), Access Control Lists (ACLs), logging, and monitoring are important during
this phase. In addition, this phase is when you should consider how to appropriately back up your data to maintain redundancy and availability
The Create
phase presents the greatest opportunity to classify data according to its sensitivity,
ensuring that the right security controls are implemented from the beginning.
So, what security do you think can be implemented while creating data?
upvoted 3 times
...
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
brandV
Highly Voted 2 years, 10 months ago[Removed]
Highly Voted 2 years, 10 months agoCBO2025
Most Recent 1 week, 4 days agoKneebee
7 months, 2 weeks agoFranklinG
8 months, 3 weeks agoJBvino
1 year agokollmekay
8 months, 4 weeks agoMartijnBdV
1 year, 4 months agoescaprix
1 year, 5 months agoPurespace
1 year, 7 months agosecisfun
1 year, 11 months agokepalon
2 years, 8 months agoxaccan
3 years, 7 months agophanil1
3 years, 7 months agoasldavid
3 years, 8 months agoRangakarthik
3 years, 10 months agojonclem
3 years, 10 months agoNobleGiantz
3 years, 9 months agoAhbey_911
3 years, 10 months ago