The Protection Process

Protection process includes the processes associated with deterrence, prevention, detection, reaction, and adaption as well as the protection based on data state (at rest, in motion, and in use). and encompasses protective mechanisms which it controls. Process involves some sort of workflow whether formally defined or not, and this work flow determines approval processes, controls separation mechanisms, and induces time delays. Process interacts with some sort of inventory whether formally defined or not, and this inventory affects the granularity and completeness of the processes.

It operates in light of external forces like life cycles and context to implement the process elements of the technical security architecture.

All protection is formed from combinations of these process elements and the selection of how to mix them is critical to the effectiveness and costliness of protection.

In addition, protection process involves the different states of data - at rest, in motion, and in use.