Domain 11 - Data Security and Encryption Flashcards
_______ is a key enforcement tool for information and data governance. As with all areas of
cloud security, its use should be risk-based since it is not appropriate to secure everything equally.
Data security
3 Buckets of Data Security Controls
- Controlling what and where data goes into the cloud
- Protecting and managing cloud data
- Enforcing Information Life-cycle Management Security
what are the Key Control and Processes for protecting and managing data in the Cloud?
- Access controls
- Encryption
- Architecture
- Monitoring/alerting (of usage, configuration, lifecycle state, etc.)
- Additional controls, including those related to the specific product/service/platform of
your cloud provider, data loss prevention, and enterprise rights management.
Cloud Data Storage Types
- Object Storage
- Volume Storage
- Database
- Application/Platform
______ (sometimes also known as data fragmentation of bit splitting). This process takes chunks of
data, breaks them up, and then stores multiple copies on different physical storage to provide high
durability
Data Dispersion
Data Migration process to the Cloud
- Define policies data types that are allowed and where
- Tie policies to baseline requirements
- Identify key repositories
- Monitor for large migration
Data Migration Monitoring tools
- CASB
- URL Filtering
- DLP
Cloud Data Access controls should be implemented at minimum in three layers. What are these?
- Management Plane
- Public and Internal Sharing Controls
- Application Level Controls
_______ protects data by applying
a mathematical algorithm that “scrambles” the data, which then can only be recovered by running
it through an unscrambling process with a corresponding key.
Encryption
_______ is often used when the format of the data is important (e.g. replacing credit card
numbers in an existing system that requires the same format text string).
Tokenization
______ encrypts data with a key but also keeps the same structural format as tokenization, but it
may not be as cryptographically secure due to the compromises.
Format-preserving Encryption
what are the three components of an encryption system:?
data, the encryption engine, and key
management.
Different methods of Data Encryption in IaaS
- Volume Storage Encryption
- instance managed
- externally managed - Object and file Storage
- Client-side
- Server Side
- Proxy
It is a volume storage encryption encryption engine runs within the instance, and the key is stored in the
volume but protected by a passphrase
or keypair.
Instance managed encryption
It is a volume storage encryption where The encryption engine runs in the instance, but the keys are managed externally and issued to the instance on request.
Externally managed encryption