Cloud Data Security Strategy

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
12 hours 57 minutes
Difficulty
Intermediate
CEU/CPE
13
Video Transcription
00:00
Alright. So now we're gonna talk about cloud data security strategies. What are the methods that we can really employ at least at a high level to ensure that data in the cloud stay safe.
00:13
In this lesson we're gonna talk about the main security strategies for protecting data in the cloud. We also want to relate many of these strategies back to other topics related data security that we've talked about already. Such a classification roles and responsibilities and where these strategy community deployed within the data life cycle.
00:32
Also we want to look at different scenarios and think about how some of these strategies can be used.
00:39
Therefore, main data security strategies that we're going to talk about
00:44
the first. We've seen it many times but encryption
00:47
encryption is the use of algorithms to render information
00:52
um unable to be seen or understood by a party that doesn't have the
00:59
ability to decrypt the information and render it back to clear tax stories. Original state
01:04
encryption is often deployed in many instances. As we'll see later in our affecting our various data states, such as data. In transit encryption is used to secure the process of transmitting information
01:19
data in process encryption can actually be used even when data is being processed. And then most importantly in the cloud context data and storage, ensuring that the data cannot be accessed by other parties, especially in some of our cloud models that we've gone over where data is being shared or stored on shared hardware.
01:40
I'm asking this is a technique and actually a host of different techniques to make render data sense of data in a state that people can't infer completely want. The sense of information is masking techniques are applied and a lot of uh
01:57
test cases of data or sometimes by certain regulations that prevent you from seeing the full string of digits in a credit card. For example,
02:07
let's also talk about security information and event management.
02:12
So this is a critical security feature used to monitor events that are happening regarding data in your cloud based environments. You're gonna want to set up appropriate threshold and really be visiting an investigating any unusual activity when it comes to the transportation or manipulation of data in your cloud based environments.
02:31
Then lastly, egress monitoring. Egress refers to
02:36
things exiting or leaving.
02:38
Egress monitoring is really done through a host of different technology and solutions related to what are called data loss prevention and digital rights management. We'll go into some of those technical solutions are used to ensure that you see when any data is leaving your environment and ensure that
02:55
it's not being exfiltrate ID by a threat actor and that is supposed to be
03:00
Leaving for one and then it's going to the right place.
03:05
Alright quiz question.
03:07
Obscuring the digits of a credit card number is an example of which data security strategy
03:12
encryption.
03:13
Egress monitoring or masking
03:15
If you said masking your correct remember, encryption is used to enter the confidentiality and integrity of data. And then egress monitoring is used to
03:27
capture when data is leaving your cloud environment and to ensure that that is intended to happen and protect data that when it leaves is appropriately protected.
03:38
All right. And some of you talked about the data security strategies. We talked about how these strategies can be used together and then also some of the stages in the data life cycle where they really apply as well as the the different data states that are applicable to these strategies.
Up Next