Threat modeling for data protection
When evaluating the security of an application and data model ask the questions: What is the sensitivity of the data? What are the regulatory, compliance, or privacy requirements for the data? What is the attack [c]