These data security technologies are crucial in the cloud
While the cloud presents new challenges, many data security technologies used in it are wholly familiar. Learn more about which tool best suits each phase of the data lifecycle. Watch Now
Like any good story, the data life cycle has a beginning, middle and an end. Data is created, modified, used, distributed, archived and, eventually, destroyed. It’s a story with heroes and villains -- enterprise information security professionals who protect data from harm and attackers who do everything they can to compromise it. For decades, this narrative hadn’t changed much. But the rise of cloud services has written a new chapter in the story of data life cycle management -- one filled with thrill, intrigue and crypto-shredding.
Is a happily-ever-after scenario possible when it comes to securing cloud data? That depends on how well you understand cloud storage architectures, data life cycle management and which security technologies are best suited for securing different types of cloud environments and data.
These are among the many concepts tested in the CCSP exam as part of Domain 2, Cloud Data Security. This section of the test covers an extensive breadth of topics, including cloud data life cycle management, threats to cloud storage, types of storage, data security strategies, data discovery, data retention and much more.
This Security School, based on (ISC)² CCSP training material, covers the fundamentals of Domain 2. Once you've reviewed the parts of this Security School on cloud data life cycle management and security, take the quiz to see how prepared you are for Domain 2 of the exam.
View our Security School Course Catalog to view more schools.
CCSP® is a registered mark of (ISC)².