Managing Data Migrations

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

9 hours 59 minutes
Video Transcription
this video focuses on managing cloud data. Migrations will start off talking about cloud application security brokers. Data loss prevention will get into specifics of managing cloud data migrations,
and we'll finish up with the review on securing data transfers.
Cloud Application security brokers, or casby for short are primarily used to monitor and protect the use of sad as applications. The casts its egress points on the network you are trying to monitor so it can view the outgoing traffic.
Initially, it just observes the flow and figures out the various SAS applications being used by performing DNS lookups
and relying on databases that the cat as suppliers will manage. This allows you to get a feel for what is being used,
and sometimes the calves can be set up in such a way that it can tell you who is accessing which says providers After Discovery. Security admin is confuse the cab to set up preventative controls that block access to certain, says products. This capability is being quickly replaced through integration of DLP,
something we will talk about shortly
through integration with deal piece service. You can allow access to certain SAS products, but also control the kind of activities or information being sent to the SAS provider.
For example, if somebody uses linked in, you can restrict certain keywords or statements from being sent to the platform, consider making sure that somebody isn't divulging upcoming financial results for your company before they have been publicly announced. Alternatively, you may want to keep a lid on conversations about certain confidential projects.
AP I Integration is another aspect that some castes can offer
when you're considering a cast for a P I integration, you're looking to determine how people are using the different cloud products and understanding the meta structure of the offering. This even allows you to monitor how I as and pads services air being used. For example, the castor can tell you the amount of Loggins that have occurred
and other details about the cloud environment itself.
You need to pay particular attention to whether the Casbah vendor supports the platform AP eyes that you are actually consuming Casby is a maturing technology and undergoing rapid changes when you're investigating, cast is very important that you perform vendor comparisons based on what you actually need versus what the Cavs vendors offer.
After all, who cares about the cast supports most AP eyes by volume.
If it doesn't support any of the providers you use or plan to use in the near future, the same could be said for integrations being ableto leverage. External DLP solutions using Casby to control and monitor pass and I ask, is a fairly new capability in the marketplace. In other words, don't rely on the cash to be
your application security testing tool or to be your point for performing vulnerability assessments
in your pass and I as environments, as we alluded to in the conversation about cab a DLP tool data loss prevention help detect data migrations to cloud services. Remember, this isn't the panacea solution. You need to train a DLP to understand what is sensitive data and what is not.
Also, a DLP cannot inspect network traffic that is encrypted. Some cloud s decays and AP eyes may encrypt portions of data and traffic. This will interfere with the success of the DLP implementation. The man in the middle approach used to unwrap and rewrap TLS streams
may break many of the communications between past services in the cloud
and the client applications. Communicating with those past services. An important step in managing data migrations is to define your policies about which data is allowed to migrate in the first place. This is part of the date of classification exercise. Then you identify key repositories of the data meeting this classification
and you monitor them for activity tools like database activity, monitoring and file activity. Monitoring
can really help. In this case. Be sure to monitor cloud usage and data transfers, leaving your network with either casby de L P or you R L filtering. We didn't talk about your URL filtering previously, but it plays a role very similar to the cast. It's much simpler, and then it monitors Thea outgoing girls and http
and looks for what users are accessing
and then can block them from accessing certain girls or blacklisting. Unlike a casby, it doesn't inspect the nuances of the specific data in transfer between the client and the cloud based provider. When migrating data to the Cloud use provider recommended methods whenever possible,
many providers have a P I based methods for uploading data.
If they don't, you can resort to traditional methods of data transfer,
but don't use clear text methods like ftp at least go with something like secure FTP is an alternative.
Remember, it's important that data in transit is encrypted during its journey to the cloud provider.
Methods to accomplish this when moving data over network include TLS like https VPN. But this only works if you have a link between you and the provider, and it can handle the amount of data traffic going through that tunnel
and finally, proxy. I mention this because it's a method described in the C S. A guidance and it may be on the exam. Personally, I have never seen this approach juice.
We have large amounts of data shipping. Physical storage devices can be quicker and safer than sending things over the Internet. But keep in mind, somebody could still snoop on the data when it is in physical transit. So consider encrypting the data and sharing the key with the provider through some other method.
But I beg you, Please, please do not send the key through normal email you some sort of secure transfer method over the network to send the key. So far, our conversation is really focused on you sending data to a cloud provider, but 1/3 party could also be posting data to a cloud provider for you to access
in these situations. Be sure to sanitize the data
before processing. It keeps you safe from processing data that may contain Trojan horses, sequel, injection bombs or other things of that nature.
In this video, we talked about casts. We went over DLP what it is when you use it.
Then we examined managing cloud data migrations at a more strategic and simplistic level, and we touched on the different methods for securing data transfers from you to the cloud provider.
Up Next
Certificate of Cloud Security Knowledge (CCSK)

This course prepares you to take the Certificate of Cloud Security Knowledge (CCSK) certification by covering material included in the exam. It explains how the exam can be taken and how CCSK certification process works.

Instructed By