Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Beyond Encryption: The 5 Pillars of Cloud Data Security


Published on

Your data is valuable. Between hackers and PRISM, encryption of cloud data is the talk of enterprise IT departments. But there's more to cloud security than just encryption. Learn the 5 pillars of cloud data security to make your data in the cloud as secure as money in a bank vault.

Published in: Technology
  • Be the first to comment

Beyond Encryption: The 5 Pillars of Cloud Data Security

  1. 1. Brought to you by ! Beyond Encryption: The 5 Pillars of Cloud Data Security
  2. 2. With & how do you keep your corporate data secure in the cloud?
  3. 3. Banks employ: 1 vaults 2 vault access policies 3 guards 4 surveillance 5 armored transport Encryption is 1 step, but like bank security there are 5 pillars of cloud data security
  4. 4. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Contextual Access Control Application Auditing Encryption Cloud-to-Cloud Control Vault Surveillance Armored Transport Vault Access Policy Data Loss PreventionGuards
  5. 5. 1 Encryption must be based on accepted industry standards for both structured and unstructured data Hot Tip: Make sure sorting, searching, and other end-user functionalities still work
  6. 6. 2 Contextual access control for corporate data in the cloud based on user, device, and geographic location
  7. 7. 3 Application auditing of cloud usage and automatic alerts for anomalous (potentially malicious) use Real-Life Example A t e c h c o m p a n y t r a c k e d usage and set automatic alerts whenever an anomalous usage pattern was detected, such as downloading an unusual number of customer contacts in one day
  8. 8. 4 Data loss prevention for cloud data should include blocking of disallowed actions, alerting, and encryption Hot Tip: Perform DLP for data inline and offline and integrate with existing DLP system
  9. 9. 5 Extend cloud security, governance, and compliance policies to data as it moves between cloud services Hot Tip: It’s not just about office- to-cloud and mobile-to- cloud (cloud-to-cloud matters too)
  10. 10. Discover Your Cloud Risk Receive a free personalized cloud discovery & risk assessment. Brought to you by ! SCHEDULE RISK ASSESSMENT