CIPM categorizes controls intotechnical, administrative, and organizationalmeasures. Technical data controls are system-based safeguards that directly enforce confidentiality, integrity, and availability.
Firewalls, encryption, and multifactor authentication are classic technical controls implemented through hardware or software. Data minimization is aprivacy principle and governance practice, not a technical control. Pseudonymization, while sometimes implemented technically, is treated within CIPM as adata management and risk-reduction technique, not a core access or security control. Therefore, A, B, and E correctly represent technical controls.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit