File system security

To achieve the right level of availability, integrity, and confidentiality, it needs to be protected by the underlying file system.

Data is typically at rest or in transit. In this module, we look at the rest state, typically when it is stored on disk. To achieve the right level of availability, integrity, and confidentiality, it needs to be protected by the underlying file system. We will have a look at the available file systems, options, and measures that can be taken.