fbpx Skip to content

Knowledge Byte: An Introduction to Protecting Data in the Cloud

84057392_3382513485109192_2570936499621068800_n

Cloud Credential Council (CCC)

PCS-cover2

Data handling is a major issue for organizations today. Most organizations do not have mature data classification processes, single source of truth for their data, and/or understand the value of their data until lost.

Organizations moving data into the cloud need to understand the importance of their data and then how can they secure their data properly both on-premise and within the cloud services.

Data can take many forms. For example, for cloud-based application development along with the development tools, it includes application programs, scripts, and configuration settings.

For deployed applications, it includes records and other content created or used by the applications, including de-allocated objects, as well as account information about the users of the applications.

Access controls and encryption are the means to keep data away from unauthorized users. As we learned, access controls are typically identity-based. This makes authentication of the user’s identity a very important issue in cloud computing. Due to a lack of physical control over the storage of information, encryption may be the only way to ensure that data is protected.

Data Protection: Primer

Organizations need to understand their data protection requirements, policies, and security responses/ capabilities. The major elements, which need to be understood prior to moving workloads to cloud, are as given:

● Data protection requirements

● International data protection elements

● Data governance

● Data protection/security policy

● Data classification

● Data discovery

● Data classification enablement

● Understanding data relationships

Data Protection Requirements

There are a number of regulations, standards, and frameworks, which can impact data on cloud computing. Security personnel needs to understand these laws and protection requirements as they are related to geography, access, and protections: at rest, in use, and in transit.

Related products to help you upskill

Sorry, we couldn't find any posts. Please try a different search.

Never miss an interesting article

Get our latest news, tutorials, guides, tips & deals delivered to your inbox.

Please enter your name.
Please enter a valid email address.
Please check the required field.
Something went wrong. Please check your entries and try again.

Keep learning

PCSM-cover2

Knowledge Byte: 5 Key Cloud Management Roles

Cloud service management roles are not fully defined in a single framework or standard. In addition, the crossover among service management, the organization and cloud...
A Massive Influx Into Remote Work Creates an Opportunity for Hackers

A Massive Influx Into Remote Work Creates an Opportunity for Hackers

While the coronavirus pandemic has infected millions of people worldwide, sending people back to work and study from home, these new habits could benefit cybercriminals....
jurian article

ITIL® 4, Why Should You? What’s New?

By 2019, when ITIL® 4 was finally launched, ITIL had been the leading guidance for IT Service Management for the past three decades. Millions of...
Scroll To Top
Tweet
Share
Share