Policy structure examples
The efficiency and effectiveness with which Trust Protection Platform manages your encryption system resources depends on how you deploy your system policies. The following sections provide a brief overview of different ways you can deploy policies in Trust Protection Platform. When you create your own policy structure, you can adapt these strategies to meet your own needs and requirements. The objective is to create a policy structure that enforces your organization’s security requirements, supports your native framework of system administration, and keeps your encryption system resources at an optimal configuration.