Data Lifecycle & Data States
Vòng đời Dữ liệu & Trạng thái Dữ liệu
Theory
Data Lifecycle Stages & Controls
Data passes through six stages from creation to destruction. Security controls must be applied at every stage — there is no safe gap in the lifecycle.
| Stage | Tiếng Việt | Key Controls | TS Example |
|---|---|---|---|
| Create | Tạo | Input validation, classification at ingestion, consent capture | Customer submits loan application; KYC data captured via Partner C/Platform C onboarding |
| Store | Lưu trữ | Encryption at rest, access control (RBAC), backup and recovery, integrity controls | AES-256-CTR in PostgreSQL (Platform C); signed PDFs in GCS; card tokens in encrypted store |
| Use | Sử dụng | Authorization enforcement, audit logging, need-to-know access, minimize in-memory exposure | Credit scoring service processes income data; AML screening queries customer profile |
| Share | Chia sẻ | Encryption in transit (TLS/mTLS), data sharing agreements (DPA/NDA), data minimization in payloads | Send credit score to Partner A via H2H; AML check with AML Vendor; biometric verify with eKYC Vendor |
| Archive | Lưu trữ lâu dài | Retention schedule compliance, continued encryption, restricted access, integrity verification | Closed Partner A loan records archived to cold GCS storage after 2 years; access restricted to compliance team |
| Destroy | Hủy | NIST SP 800-88 method appropriate to media, verification and documentation of destruction | Platform B 30-day soft-delete window expires; NIST media sanitization for decommissioned hardware |
Data States & Their Controls
At any point in its lifecycle, data exists in one of three states. Each state requires different protection mechanisms:
| State | Tiếng Việt | Controls |
|---|---|---|
| At Rest | Lưu trữ (tĩnh) | AES-256 encryption, full-disk encryption (FDE), database encryption, access control lists, key management (Vault) |
| In Transit | Truyền tải | TLS 1.3, mTLS (mutual authentication), VPN tunnels, SFTP, certificate pinning |
| In Use | Đang xử lý | Secure enclaves (Intel SGX, AWS Nitro), minimize exposure time, memory scrubbing, process isolation |
In Use — The Hardest State to Protect
When data is actively being processed, it must be decrypted in RAM. Standard encryption does not apply to data in memory. This is why secure enclaves (isolated memory regions that prevent even the OS from reading the data) are used for the most sensitive operations. Memory-scrapers and cold-boot attacks target this state specifically.
Data Minimization
A core GDPR principle: collect only what is necessary for the stated purpose, and retain only as long as necessary. Collecting more data than needed increases breach impact, regulatory exposure, and storage costs. For FinTech Company X: collect the minimum credit decision fields; do not collect data "because it might be useful later."
Key Terms
Exam Tips
Work Application — FinTech Company X
| Stage | Audit Question | Expected State |
|---|---|---|
| Create | Is consent captured and logged (with timestamp + version) for every data field collected? | Consent log in immutable store; field-level consent mapping |
| Store | Is AES-256-CTR confirmed active for all PII fields in PostgreSQL? | Encryption verified; Vault key rotation schedule active |
| Use | Is the credit scoring service audit-logged for every data access event? | SIEM receiving access logs; anomaly alerting enabled |
| Share | Is mTLS enforced for the AML Vendor AML API call? Is payload minimized to required fields only? | mTLS certificates verified; no PII beyond required AML fields in payload |
| Archive | Are closed Partner A loan records encrypted in cold GCS storage with access restricted to compliance team? | GCS bucket: encryption on, public access off, IAM role-gated |
| Destroy | Platform B 30-day soft-delete: does it also purge Redis cache, Kafka events, Elasticsearch index, AND eKYC Vendor biometrics? | All data stores included in deletion job; eKYC Vendor biometric deletion confirmed via API |
Practice Questions
Q1. An Platform B customer's data is loaded into RAM during their active session for profile rendering and credit limit display. Which data state does this represent?
A) At Rest B) In Transit C) In Use D) In Archive
✓ C) In UseQ2. mTLS (mutual TLS) between Platform C and the AML Vendor AML API protects data in which state?
A) At Rest B) In Use C) In Transit D) In Archive
✓ C) In TransitQ3. Partner A loan records are moved to a cold GCS archive after 2 years. What classification level applies to this archived data?
A) Unclassified — archived data is no longer active B) Internal — reduced sensitivity over time C) Same Confidential/Restricted level as when active D) Public — data is historical
✓ C) Same Confidential/Restricted level as when activeQ4. Why is the "In Use" data state considered the hardest to protect?
A) Encryption algorithms are weaker for RAM B) Data must be decrypted in memory for processing, making standard encryption inapplicable C) Regulations don't cover In Use data D) It is only temporary, so controls are skipped
✓ B) Data must be decrypted in memory for processingQ5. GDPR's data minimization principle requires that an organization:
A) Encrypt all data at rest B) Collect only necessary data and retain it only as long as needed C) Share data only within the EU D) Anonymize all data before storage
✓ B) Collect only necessary data and retain it only as long as needed