A secure privacy architecture is essential for every organization. It helps to manage data centers, privilege management, secure software development and privacy controls. Many organizations place privacy requirements at the heart of their operational models. If privacy breaches or lapses occur, it can lead to the organization losing its ability to do business on the market.
The CDPSE certification by ISACA covers the most important topics of privacy architecture as implemented by security professionals.
Domains of ISACA CDPSE
The ISACA CDPSE exam has three domains.
Domain 1: Privacy Governance (34%).
Domain 2: Privacy Architecture (36%)
Domain 3: Data Lifecycle (30%)
This blog provides an overview and exploration of the contents and concepts in ISACA CDPSE Domain 2.
Domain 2: Privacy Architecture
Privacy Architecture is the second domain for the CDPSE certification and accounts for 36% of the exam weightage. This domain includes how software, hardware, enterprise technologies, and professionals work together to create a privacy architecture for an organisation. It covers the technical privacy controls required to protect data and how they are applied.
The CDPSE certification is a validation of the candidate’s ability to implement essential operations such as privacy impacts assessments when developing software applications in an organization.
What is Privacy Architecture?
Privacy architecture is an infrastructure that includes software and technical privacy controls. It provides valuable insight into the privacy requirements of an organization. Organizations can use the privacy architecture design techniques to create secure technologies for their existing products and services that contain user data. Domain 2 will cover the first and second sections of security infrastructure and software development concepts.
Privacy architecture is necessary to track technologies and privacy controls used to monitor and manage privacy impacts within the organization. Without tracking privacy controls and technology, it is difficult to maintain privacy throughout the organization. Domain 2 will cover privacy controls and tracking technologies.
Outline of ISACA CDPSE Domain2: Privacy Architecture
Part 1: Infrastructure
This section covers self-managed infrastructure, cloud computing basics, privacy concerns, such as privileged access based upon privacy controls, and other approaches to end-point protection.
Module 1: Self-managed infrastructure includes technology stacks.
Advantages of self-managed infrastructure
Limitations of self-managed infrastructure
Module 2: Cloud ComputingCloud Data Centers
Cloud computing characteristics
Cloud Service Models
Model of shared responsibility
Cloud computing has many advantages
Cloud computing has its limitations
Module 3: Endpoint Security
Module 4: Remote AccessVirtual Private Networks
Management of Privileged Access
Module 5: System Hardening
Part 2: Software and Applications
This domain covers privacy controls that are implemented during the development phase of software applications. It refers to the Secure Development Life cycle. Tracking technologies are used to ensure that privacy architecture is implemented in the development phase.
Module 1: Secure Development Life CyclePrivacy and the Phases
Privacy by Design
Module 2: Software and Applications Hardening
Module 3: APIs & Web Services
Module 4: Tracking TechnologiesTypes Of Tracking Technologies
Part 3: Technical Privacy Protections
This domain includes the concepts and models of communication protocols.