Time
9 hours 48 minutes
Difficulty
Intermediate
CEU/CPE
10

Video Transcription

00:00
All right, let's talk about Gap, because that's what it's all about. We gotta protect our dad. I've got to keep it safe. We won't protect the confidentiality, integrity and availability of data.
00:11
Well,
00:12
Dad exists in different states, right? You know, gotta you could be working on Dad. It's loaded into RAM. You're manipulating it. Data could be in transport across the network, or data can be stored in a drive at rest.
00:26
So we have different types of protection for data, depending on you know where it exists. So the first thing that we would talk about us, we talk about data at rest, and it could be abbreviated D A r. I really don't see that. But that addressed.
00:42
So to protect that at rest, we've got to think about encryption. That's usually the easiest thing, right? We're thinking about that privacy. We have to encrypt. Absolutely.
00:53
We also want to make sure that we have redundancy of data from an availability standpoint as well.
00:59
So I've got data stored on a dry drive or on a device while it's in storage. I want to make sure that I've encrypted it. Want to make sure that I protected
01:07
now data in motion. This is where it gets tricky because we're sharing information, right? The whole nature of sharing
01:15
is to make things available. The whole nature of securities toe lock down that availability and limit access. So that idea of network security is kind of an oxymoron, right? I mean, you have one thing whose function is to share the other. That's function is to protect.
01:33
It's very difficult. So it always goes back to
01:37
how we want to work this out. So we get the greatest benefit for the least cost. And we remember also that when we talk about cost benefit analysis, it is not always dollars. It's not always money that we're talking about cost or benefits.
01:53
You know, anytime you implement security, it will cost you something
01:57
may cost you. Time may cost you. Performance may cost you ease of use backwards compatibility those air, all costs associated with implementing security.
02:08
Right. Um, the benefit may not be, you know, hardened fast dollars. It maybe you know that we lose less money this year than we did last year.
02:19
Customer confidence. That's really hard to put a dollar value on, right? So these aren't always. When I talk about cost benefit analysis, it's not always so clear cut. But just like it rest that emotion not secured by default. I've gotta find a way to protect it, to the degree that makes sense
02:38
based on the value of the death.
02:40
Easy now. All right, so
02:43
one of the things that we think about doing is isolating traffic based on its value.
02:49
It's a matter of fact, you know, when people talk about what firewalls do,
02:53
you know, ideally, and you can come up with a lot of definitions. But one of the things that I described firewalls, the service that they perform is that they isolate security zones.
03:05
I have a trusted network, have an untrusted domain. That firewall goes but to between the two and creates the isolation,
03:13
isolation, isolation, isolation,
03:16
the most foundational principle in my mind of security,
03:23
the most single foundational principle of security.
03:28
Keep users out of your stuff or they'll break it.
03:32
I'm gonna write that up formally and call it Kelly's principal.
03:37
Keep users out of your stuff or they'll break it.
03:39
And yeah, I said it very casually. But really, what I mean is keep untrusted entities away from your trusted resource is don't allow unfettered access from trusted toe untrusted or untrusted trust. When I say your trusted resource is I mean
03:57
your dad, your file servers, your resource is your list of users and pass with your stuff,
04:03
right? That's your trusted stuff. That's what you want to protect.
04:06
Untrusted entities, users.
04:10
Anybody else, right? That shouldn't have access. So firewall creates that isolation.
04:16
You can also segment your network in certain ways. A virtual land means Okay, maybe secure data will be on this network.
04:27
Unstick your data will be on that network. I'll create two separate virtual networks, which means I create the isolation on a switch instead of physically connecting them. Right. But the idea of villains are all about isolation.
04:41
Keeping traffic O R or resource is of the same value together
04:47
transport protocols, protocols that helps secure data in motion. That's important. Assess, Alan T. L s or gonna protect our web traffic. You know, http, um,
05:01
creating this idea of an encrypted tunnel from in point in point
05:08
where the entire, uh I'm not saying that's what SSL does that's really more VPN connection. VP ends. I p sec tunnels reference there. That's in point in point from initiating computer all the way in to the accepting server, the entire path is protected through
05:27
and I pee set Tom
05:28
or point point Tunnel in particular well, to TP or whatever peddling particle. But the bottom line is, and we're not getting into that yet. We're not trying to be technical here, but just the idea that while that is in motion,
05:41
it is not protected. So we have to come up with the security solution to protect that data.
05:46
VP ends, we might isolate networks. We might use inspection devices like firewalls, but we've gotta figure out something
05:56
and then last data in use. You know, while transactions are being processed, they're not encrypted. I have data that stored it's encrypted. When data goes to process, it's loaded into RAM. Its secret
06:09
transactions or processed gets re encrypted to store well
06:14
on the horizon. And this was driven by Blockchain technology. If you're familiar with any sort of any sort of ideas in the world of digital currency, the need for her being able to process such high value data we have to be able to find a way to encrypted while in process.
06:32
And that's a technology called home, um, or FIC encryption.
06:38
We don't have the capability. There's a lot of overhead. We can't really do it cheaply. Cost effectively now for common data. But for highly, highly, highly valuable data where performance or access is essential
06:54
with the right amount of money you can you can make anything work right so I wouldn't know that Torque term Home Obor Fick Encryption.

Up Next

Certified Cloud Security Professional (CCSP)

This Certified Cloud Security Professional (CCSP) certification course covers topics across six domains, to ensure the candidate has a wide range of competencies and is capable in the assessment and implementation of cloud service solutions.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor