Blog | Cyber Security News & Training | Securetain

Securing Cloud Data Part I

You must have heard the following cloud encryption and key management buzz words:

Do we trust the cloud provider to manage encryption and key management? One of the important aspects of cloud security training is encryption and key management. The important challenges for key management solutions are compliance, API support, access control, cost, life cycle management, governance, audit, application integration, etc. Data security is very critical for an organization, and the number of data breaches and their impact keeps growing:

Ref: https://informationisbeautiful.net

What are the top reasons that cause data breaches?

The cloud security training in data security contests includes data-at-rest encryption to protect confidentiality, data in transit encryption to protect the integrity, and high availability clusters and failover for availability. The encryption consideration includes data classification, encryption policy, regulatory and compliance requirements, high availability, application integration, support, and key life cycle management. Encryption types for data-at-rest include the following:

Encryption types for data-in-motion include (but are not limited to) the following:

The most common method of protecting data in motion is the use of a secure sockets layer virtual private network (SSL VPN). Technologies such as SSL VPN are critical in the effort to protect against man-in-the-middle attacks and packet sniffers.

The major cloud corporations provide the following encryption methods:

The major cloud corporation provide the following key management solutions:

The other key management solutions include OWN HSM Solution and Software-Based Key Management. Corporations need to decide in advance the encryption and key management requirement and ensure could provider supports the requirement.

RELATED POST: Securing Cloud Data – AWS and Azure Security Part II

Securing Cloud Data – Cloud Encryption Considerations Part III