Analyze the flow of the data from the source to destination:
– Perform red team or blue team penetration tests
– Perform analysis for the data-at-rest or data-intransit
– Perform deep inspection about data encryption with emphases on the inflection points.
– Analyze how the data is stored and how is secured