Cloud Data Lifecycle

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
12 hours 57 minutes
Difficulty
Intermediate
Video Transcription
00:00
>> Now we're going to talk about the Cloud data lifecycle.
00:00
Our objectives of this lesson are discuss
00:00
the six steps of the cloud data lifecycle,
00:00
the three states that data can take in this lifecycle,
00:00
which are data in transit,
00:00
data in use,
00:00
and data in storage.
00:00
The security considerations for each of these states,
00:00
as well as each of the steps along
00:00
the Cloud data lifecycle. Let's take a look.
00:00
As I said, there are six steps
00:00
in the Cloud data lifecycle.
00:00
It all begins when the data is created.
00:00
Now we've talked about that data should be classified
00:00
to ensure that we know the proper security protections.
00:00
That's the most important thing to do when
00:00
data's created to ensure that it is classified.
00:00
Another consideration in terms of
00:00
the data state is, when it's created,
00:00
if it's outside the Cloud and needs
00:00
to be transmitted to the Cloud,
00:00
data is going over the internet,
00:00
so it is in the state of data in transit.
00:00
Then the data needs to be stored somewhere.
00:00
This is our second step in the lifecycle and
00:00
also reflects another state that data can take.
00:00
Data at rest.
00:00
When data is not moving between
00:00
applications or are being used in a process,
00:00
we described that data as being at rest.
00:00
When data is stored in the Cloud,
00:00
it needs to be encrypted to ensure that it's properly
00:00
protected and only changed by authorized individuals.
00:00
Our next stage, use that data.
00:00
We talked about the value associated with data,
00:00
how we secure database on its criticality,
00:00
now it needs to be used to create
00:00
value for our customers and for our business.
00:00
Data in use is another state.
00:00
Our third state of those
00:00
three data processing stages that we talked about.
00:00
Data in use is when data is used within an application.
00:00
There are actually encryption schemes
00:00
that we'll talk about later that can
00:00
be used when data is in use. Sharing the data.
00:00
You've stored your data, you've used it.
00:00
Now you're figuring out, how do I want to
00:00
share my results or share
00:00
the output of the how that data was processed.
00:00
Sharing data. This is
00:00
again where data may be sent to people outside
00:00
your organization or potentially
00:00
even within the Cloud between
00:00
applications and this is
00:00
another example of data in transit.
00:00
We need to ensure that the proper protocols are
00:00
used when sharing data to keep it safe and
00:00
secure and ensure that
00:00
no unauthorized individuals can
00:00
spy or intercept that data while it's being transmitted.
00:00
Then our fifth stage is archive.
00:00
Archiving the data really hinges on
00:00
having an effective retention policy.
00:00
Different data based on
00:00
its jurisdiction or regulations around it,
00:00
has different potential legal requirements
00:00
for how long it needs to be stored and
00:00
retained and how those storage
00:00
of the data needs to be protected.
00:00
Then ultimately, once that data is no longer required,
00:00
it should be destroyed.
00:00
As soon as data isn't useful,
00:00
or it no longer
00:00
has regulatory requirements for its preservation,
00:00
data should be destroyed,
00:00
but it should be destroyed securely.
00:00
We're going to go into some of the techniques such
00:00
as crypto shredding for how data can be
00:00
encrypted and then the keys that encrypt it are
00:00
destroyed in the Cloud to
00:00
prevent that data from ever being accessed.
00:00
It's almost as though it didn't exist.
00:00
That concludes the end of our data lifecycle here.
00:00
We're creating data, we're storing it, we're using it,
00:00
sharing it, archiving it,
00:00
and then ultimately destroying it.
00:00
Quiz question. What are
00:00
the correct steps of the cloud data lifecycle?
00:00
Create, use, store share, archive and destroy?
00:00
Creates store share, use archive then destroy or create,
00:00
store, use, share, archive, and destroy.
00:00
If you said create store, use, share,
00:00
archive, and destroy you are correct.
00:00
If you didn't get this,
00:00
I've got a little funny saying that I use to
00:00
remember the stages of the cloud data lifecycle.
00:00
When your data wasn't
00:00
protected and someone's got a hold of it,
00:00
you're ultimately became sad
00:00
because you said that
00:00
that data wasn't properly protected.
00:00
Because you create, store use,
00:00
sad; share archive, destroy.
00:00
That helps me, I don't know what will help you,
00:00
but you can keep it in mind because you
00:00
sad that data wasn't properly protected.
00:00
In summary, we talked about
00:00
the phases of the cloud data lifecycle.
00:00
We talked about the different states
00:00
>> that data can take,
00:00
>> and we talked about the security considerations that
00:00
each phase of the cloud data lifecycle.
Up Next