# Domain 2 - Index
Domain 2 covers data and asset lifecycle governance: classification, ownership, handling, privacy, storage, retention, backup, media controls, cloud data protection, and techniques like masking/tokenization.
## Concepts
1. [[Data Lifecycle (Create-Store-Use-Share-Archive-Destroy)]]
2. [[Information and Asset Ownership]]
3. [[Data Classification Levels and Handling Rules]]
4. [[Data Labeling and Marking]]
5. [[Record Management and Data Retention]]
6. [[Data Minimization and Purpose Limitation]]
7. [[Data States: At Rest, In Transit, In Use]]
8. [[Data Residency and Sovereignty]]
9. [[Data Inventory and Asset Register]]
10. [[Asset Valuation and Criticality]]
11. [[Access Control to Data Assets]]
12. [[Data Encryption Overview (Asset Security)]]
13. [[Key Management Basics (Asset Security)]]
14. [[Data Masking and Redaction]]
15. [[Pseudonymization vs Anonymization]]
16. [[Tokenization]]
17. [[Digital Rights Management (DRM) and Watermarking]]
18. [[Data Loss Prevention (DLP)]]
19. [[Cloud Data Protection (SaaS, PaaS, IaaS)]]
20. [[CASB and SSPM CSPM Overview]]
21. [[Backups for Data Protection (Domain 2 view)]]
22. [[Data Archiving vs Backup]]
23. [[Media Management and Sanitization]]
24. [[Sanitization Methods: Overwrite, Degauss, Cryptographic Erase, Shred]]
25. [[Physical Protection of Media]]
26. [[Secure Data Disposal and Destruction Records]]
27. [[Data Handling in Third-Party Contexts]]
28. [[Shadow IT and Unsanctioned Data Stores]]
29. [[Endpoint Data Protections (FDE, EDR, Port Controls)]]
30. [[Printing and Hardcopy Data Controls]]
31. [[Data Quality and Integrity Controls]]
32. [[Hashing and Checksums for Data Integrity]]
33. [[Data Discovery and Classification Tools]]
34. [[Data Catalogs and Metadata Management]]
35. [[Data Lineage and Provenance]]
36. [[Master Data Management (MDM)]]
37. [[Database Security: Access Models (RBAC, ABAC, RLS)]]
38. [[Database Security: Encryption Options (TDE, Field-Level)]]
39. [[Data Warehouse and Data Lake Security]]
40. [[Big Data Platforms Security (Hadoop Spark Concepts)]]
41. [[Secrets Management (Vaults, KMS, Rotation)]]
42. [[API Keys and Application Secrets Handling]]
43. [[SaaS Admin Hygiene and Least Privilege]]
44. [[Tenant Isolation and Cross-Tenant Risks]]
45. [[BYOD and Mobile Data Protection (MDM MAM)]]
46. [[Removable Media and Portable Storage Policy]]
47. [[Email Security for Data Protection (SPF DKIM DMARC DLP)]]
48. [[Secure File Transfer (SFTP, FTPS, AS2)]]
49. [[Data Sharing and External Collaboration Controls]]
50. [[Object Storage Security (Buckets, Versioning, Immutability)]]
51. [[Ransomware Data Protections (Immutable Backups, Snapshots)]]
52. [[Logs and Telemetry as Sensitive Data]]
53. [[Secrets in CI CD and Infrastructure as Code]]
54. [[Data in Caches and Temporary Storage]]
55. [[Synthetic Data Generation for Testing]]
56. [[Data Fingerprinting and Watermarking (Datasets)]]
57. [[Data Breach Response (Asset-Focused)]]
58. [[Data Protection Impact Assessment (DPIA PIA)]]
59. [[Data Governance Committee and Stewardship]]
> Also see: [[MOC - CISSP]]