A comprehensive approach (including people, processes, and systems) of implementing policies and controls that are designed specifically to discover, monitor, and protect confidential data while it is stored, used, or in transit over the network and at the perimeter. Adapted from: FFIEC IT Examination Handbook, Information Security. 2021. https://ithandbook.ffiec.gov/glossary.aspx