Cloud computing and data protection can be tricky. When moving services to the cloud, it can be both intimidating...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
and terrifying for an enterprise to surrender control of its sensitive data and rely solely on a cloud computing service provider to keep it safe.
This cloud computing data protection guide, which is a collection of SearchCloudSecurity.com news and expert technical content, offers advice on how to secure data in the cloud and acts as a cloud computing encryption tutorial, discussing the benefits of cloud encryption, the challenges of implementing cloud encryption, as well as common use cases.
TABLE OF CONTENTS
- Data security in the cloud: SaaS encryption
- Cloud computing encryption and IaaS
- Using DLP tools in the cloud
- Managing unauthorized use of cloud computing
- Cloud encryption use cases and architectures
- Data security in the cloud with cloud encryption
Data security in the cloud: Weighing SaaS encryption options
For some enterprises, embracing cloud services can be scary. Relinquishing control and having to rely on security providers isn’t easy, and that especially holds true with Software as a Service (SaaS), which offers the least amount of control.
Considering this, companies should always work with cloud computing providers they trust for SaaS security, but there are also several SaaS encryption techniques companies can use for protecting sensitive data stored in a SaaS application. Here, gain a better understanding of SaaS security as well as SaaS encryption options.
Cloud computing encryption and Infrastructure as a Service
There are many obvious security reasons to encrypt data, but when you are dealing with a cloud computing provider, some of the reasons for implementing encryption maybe not be as obvious.
In this tip, information security expert Rich Mogull discusses the most important reasons for encrypting data in the cloud, cloud computing encryption techniques for IaaS security, and how to encrypt two kinds of IaaS storage for IaaS security.
More on data protection and cloud computing
Amazon rolled out new server-side S3 encryption service, which offers and alternative to client-side encryption.
Learn why network data encryption is key to making cloud computing work outside of your enterprise firewall.
Discover why enterprises should take advantage of encryption technologies to ensure data in the cloud is kept secure.
Learn how to keep SaaS data secure in transit between third parties.
Cloud computing and data protection: Using DLP tools in the cloud
Making a move into the cloud can raise many enterprise security concerns, especially concerning data protection. Consequently, a thorough examination into and understanding of cloud computing and data protection options is essential for every enterprise. Data loss prevention (DLP) tools can help control migration of data to the cloud and also find sensitive data leaked to the cloud.
In this tip from Rich Mogull, security professionals will learn more about how to use DLP tools for protecting cloud-based data, as well as the limitations of data loss prevention technologies operating in the cloud.
Cloud computing data security: Managing unauthorized use of cloud computing
While you may think you are aware of any enterprise cloud computing activity, such as deployment of data or applications to the cloud, that is not always the case. Developers or sales executives may be moving data to the cloud without your knowledge.
Here, Rich Mogull explains how to detect and manage unauthorized use of cloud computing and discusses three tools that can help enterprises manage unauthorized use of cloud computing.
Identifying cloud encryption use cases and architectures
Cloud encryption can be complicated, but when implemented properly, it has advantages – both in private and public clouds -- by allowing enterprises to protect data that in a shared repository containing data with different levels of sensitivity.
In this tip, security professionals will learn three main use cases for cloud encryption and how the three major components for encryption -- the data, the encryption engine and the key management -- are handled in common cloud computing architectures.
Ensuring data security in the cloud with cloud encryption
Every data protection strategy should consider both data in transit as well as data at rest. And, unfortunately, while most cloud service providers support encryption for data in transit, few offer support for data at rest. Consequently, in order to ensure data security in a cloud computing environment, organizations need to understand cloud encryption alternatives.
Here, security pro Joseph Granneman discusses cloud encryption and compliance and examines critical considerations and options for cloud computing encryption as well as achieving data security in the cloud.