Blog | Cyber Security News & Training | Securetain

Securing Cloud Data – Cloud Encryption Considerations Part III

The last posting – Securing Cloud Data Part I – we discussed the security triad in the context of data security which includes data-at-rest encryption to protect confidentiality, data in transit encryption to protect the integrity, high availability clusters, and failover for availability.

Part II was focused on understanding cloud security training domains, AWS and Azure storage choices, access methodology, encryption capability, etc. The encryption consideration includes data classification, encryption policy, regulatory and compliance requirements, high availability, application integration, support, and key life cycle management.

The Cloud Security Training Series Part II onwards is focused on providing basic conceptual information about cloud security in the context of AWS and Azure. This will help security reviewers, auditors, and risk management personnel.

Encryption – Data at Rest

The security triad in the contest of data security includes data-at-rest encryption to protect confidentiality, data in transit encryption to protect the integrity and high availability clusters and failover for availability. Encryption types for data-at-rest include the following:

Encryption – Data in Transit

Encryption types for data-in-motion include (but are not limited to) the following:

Encryption Available from Cloud Security Providers

The major cloud security corporations provide the following encryption methods:

The major cloud securitycorporation provide the following key management solutions:

The other key management solutions include OWN HSM Solution and Software-Based Key Management. Corporations need to decide in advance the encryption and key management requirement and ensure could provider supports the requirement

Cloud Encryption Consideration

The encryption consideration includes data classification, encryption policy, regulatory and compliance requirements, high availability, application integration, support, and key life cycle management.

Cloud encryption and key management buzz words:

Visit www.securetain.com to know more about GRC, Audit and Information Security practice.

RELATED POST: 

Securing Cloud Data Part I

Securing Cloud Data – AWS and Azure Security Part II