1 Executive Summary
The Information Protection Life Cycle (IPLC) and Framework describes the phases, methods, and controls associated with the protection of information. The IPLC documents three stages in the life of information and multiple categories of controls which can be applied to secure information. The “main sequence” of information is Active Use Life. Deception technologies are designed to simulate real production networks and assets to lure would-be attackers away from valuable resources and to draw them into an environment where their Tactics, Techniques, and Procedures (TTPs) can be studied to mount more effective defenses.