Architecture and design
Goal: Design an architecture that enforces privacy and security by construction.
- Produce security architecture diagrams showing trust boundaries, data flows and classification.
- Apply Data Flow Mapping and Data Classification (sensitive vs non-sensitive).
- Embed privacy controls: data minimization, consent capture points, and user-facing
- Specify encryption, key management, segmentation, and secure default configurations.
- Plan for logging, monitoring, and auditability (what to log, how long, who has access).
- Document fallback modes and failure behaviors to avoid privacy leaks or insecure defaults.
No Comments