Four years ago I wrote the initial Data Security Lifecycle and a series of posts covering the constituent technologies. In 2009 I updated it to better fit cloud computing, but I have never been happy with that work. It was rushed and didnt address cloud specifics nearly sufficiently. This update should better reflect the more complex environments and use cases we tend to see these days. The Lifecycle includes six phases from creation to destruction. In the first post we will revisit the basic lifecycle, and the next post will add locations and access devices.”]
Source: http://www.securosis.com/blog/data-security-lifecycle-2.0

