_______ is a key enforcement tool for information and data governance. As with all areas of
cloud security, its use should be risk-based since it is not appropriate to secure everything equally.
Data security
3 Buckets of Data Security Controls
what are the Key Control and Processes for protecting and managing data in the Cloud?
Cloud Data Storage Types
______ (sometimes also known as data fragmentation of bit splitting). This process takes chunks of
data, breaks them up, and then stores multiple copies on different physical storage to provide high
durability
Data Dispersion
Data Migration process to the Cloud
Data Migration Monitoring tools
Cloud Data Access controls should be implemented at minimum in three layers. What are these?
_______ protects data by applying
a mathematical algorithm that “scrambles” the data, which then can only be recovered by running
it through an unscrambling process with a corresponding key.
Encryption
_______ is often used when the format of the data is important (e.g. replacing credit card
numbers in an existing system that requires the same format text string).
Tokenization
______ encrypts data with a key but also keeps the same structural format as tokenization, but it
may not be as cryptographically secure due to the compromises.
Format-preserving Encryption
what are the three components of an encryption system:?
data, the encryption engine, and key
management.
Different methods of Data Encryption in IaaS
It is a volume storage encryption encryption engine runs within the instance, and the key is stored in the
volume but protected by a passphrase
or keypair.
Instance managed encryption
It is a volume storage encryption where The encryption engine runs in the instance, but the keys are managed externally and issued to the instance on request.
Externally managed encryption
When object Server storage is used as the back-end for an application (including mobile HSM, SECaaS, VM, or Server applications), encrypt the data using an encryption engine embedded in the application or client.
Client-side encryption
Data is encrypted on the server (cloud) side after
being transferred in. The cloud provider has access to the key and runs the encryption engine.
Server side encryption
In this model, you connect the volume to a special instance or appliance/
software, and then connect your instance to the encryption instance. The proxy handles all
crypto operations and may keep keys either onboard or externally.
Proxy Encryption
Different methods of Data Encryption in PaaS
Different methods of Data Encryption in SaaS
- Proxy Encryption
Data is encrypted in the PaaS application or the client accessing
the platform
Application layer encryption
Data is encrypted in the database using encryption that’s built in and is
supported by a database platform like Transparent Database Encryption (TDE) or at the field level.
Database encryption
Data is encrypted in the SaaS application and generally managed
by the provider.
Provider-managed encryption
Data passes through an encryption proxy before being sent to the SaaS
application
Proxy encryption