Chapter 4 Flashcards
Correct Order of Cloud Secure Data Lifecycle
- Create
- Store
- Use
- Share
- Archive
- Destroy
Three Components of DLP are
- Discovery and Classification
- Monitoring
- Enforcement
This type of storage typically uses APIs or network requests
- Object
DLP implementation goals
- Policy Enforcement
- Data Discovery
- Data Loss Mitigation
Six Steps of the tokenization Architecture
- An application collects or generates a piece of sensitive data.
- Data is sent to the tokenization server; it is not stored locally.
- The tokenization server generates the token. The sensitive data and the token are stored in the token database.
- The tokenization server sends back the token to the application.
- The application stores the token instead of the original data.
- When sensitive data is required, an authorized application or user requests it.
Approaches to data masking
- Random Substitution: Replace the Value with a Random Value
- Algorithm Substitution: Replaces the value with an algorithm-generated value
- Shuffle: Shuffles different values from the data set
- Masking: Hides certain parts of the data using specific characters
- Deletion: Deletes the data or uses a null value
Encryption Engine
File-Level Encryption - Database servers typically reside on volume storage. For this deployment, you are encrypting the volume or folder of the database, with the encryption engine and keys residing on the instances attached to the volume.
Transparent Encryption - Many Database-management systems have the ability to encrypt the entire database or specific portions, such as tables. The encryption engine resides within the database and it is transparent to the application.
Application-level Encryption - The encryption engine resides at the application that is utilizing the database.
The Key Principles of enterprise architecture that should be followed at all times :
- Explain protections that enable trust in the cloud
- Provide directions to secure information preserved by regulations
- Prepare the resilient architecture and support multi landlord platforms
Cloud storage architectures and their associated cloud models
IaaS: Volume-based and object-based storage
PaaS and SaaS: Databases
Challenges associated with Key Management
- Backup and Replication
- Access to the Keys
- Key Storage