A security analyst is emailing PII in a spreadsheet file to an audit validator for after-actions related to a security assessment. The analyst must make sure the PII data is protected with the following minimum requirements:
✑ Ensure confidentiality at rest.
✑ Ensure the integrity of the original email message.
Which of the following controls would ensure these data security requirements are carried out?
MelvinJohn
Highly Voted 5 years agomxh778872
3 years, 9 months agoID77
Most Recent 1 year, 3 months ago