Protection against any attack is always about putting up as many walls and layers of protection between your environment and the attacker. This document is meant as a short checklist of data protection capabilities you need to consider.