Introduction
Why should SSNs be protected?
()
The last four digits of SSNs
()
The SSN protection process
()
1. Establish a Policy Foundation
Build senior leadership support
()
Create an SSN policy
()
Educate employees about SSNs
()
2. Identify Legitimate Uses of SSNs
Understand legitimate uses of SSNs
()
Inventory business processes
()
Interview key employees
()
Follow data flows
()
3. Eradicate Unnecessary SSNs
Eliminate unnecessary business processes
()
Clean up digital SSN stores
()
Destroy paper records
()
4. Protect Remaining SSNs
Understand encryption
()
Symmetric and asymmetric cryptography
()
Choose encryption algorithms
()
PKI and digital certificates
()
Encrypt stored SSNs
()
Encrypt SSNs in transit
()
Restrict and audit SSN access
()
5. Maintain SSN Posture
Repeat the cycle
()
Data loss prevention
()
Conclusion
What's next?
()
Ex_Files_Protect_SSNs.zip
(1.0 MB)