Beyond Encryption: The 5 Pillars of Cloud Data Security

5,462 views
5,128 views

Published on

Your data is valuable. Between hackers and PRISM, encryption of cloud data is the talk of enterprise IT departments. But there's more to cloud security than just encryption. Learn the 5 pillars of cloud data security to make your data in the cloud as secure as money in a bank vault.

Published in: Technology
0 Comments
4 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
5,462
On SlideShare
0
From Embeds
0
Number of Embeds
1,227
Actions
Shares
0
Downloads
99
Comments
0
Likes
4
Embeds 0
No embeds

No notes for slide

Beyond Encryption: The 5 Pillars of Cloud Data Security

  1. 1. Brought to you by ! Beyond Encryption: The 5 Pillars of Cloud Data Security
  2. 2. With & how do you keep your corporate data secure in the cloud?
  3. 3. Banks employ: 1 vaults 2 vault access policies 3 guards 4 surveillance 5 armored transport Encryption is 1 step, but like bank security there are 5 pillars of cloud data security
  4. 4. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Contextual Access Control Application Auditing Encryption Cloud-to-Cloud Control Vault Surveillance Armored Transport Vault Access Policy Data Loss PreventionGuards
  5. 5. 1 Encryption must be based on accepted industry standards for both structured and unstructured data Hot Tip: Make sure sorting, searching, and other end-user functionalities still work
  6. 6. 2 Contextual access control for corporate data in the cloud based on user, device, and geographic location
  7. 7. 3 Application auditing of cloud usage and automatic alerts for anomalous (potentially malicious) use Real-Life Example A t e c h c o m p a n y t r a c k e d Salesforce.com usage and set automatic alerts whenever an anomalous usage pattern was detected, such as downloading an unusual number of customer contacts in one day
  8. 8. 4 Data loss prevention for cloud data should include blocking of disallowed actions, alerting, and encryption Hot Tip: Perform DLP for data inline and offline and integrate with existing DLP system
  9. 9. 5 Extend cloud security, governance, and compliance policies to data as it moves between cloud services Hot Tip: It’s not just about office- to-cloud and mobile-to- cloud (cloud-to-cloud matters too)
  10. 10. Discover Your Cloud Risk Receive a free personalized cloud discovery & risk assessment. http://bit.ly/TrySkyhigh Brought to you by ! SCHEDULE RISK ASSESSMENT

×