Transcript
Page 1: Beyond Encryption: The 5 Pillars of Cloud Data Security

Brought to you by !

Beyond Encryption:

The 5 Pillars of Cloud Data Security

Page 2: Beyond Encryption: The 5 Pillars of Cloud Data Security

With & how do you keep your corporate data secure in the cloud?

Page 3: Beyond Encryption: The 5 Pillars of Cloud Data Security

Banks employ: 1 vaults 2 vault access policies 3 guards

4 surveillance 5 armored transport

Encryption is 1 step, but like bank security there are 5 pillars of cloud data security

Page 4: Beyond Encryption: The 5 Pillars of Cloud Data Security

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

Contextual Access Control

Application Auditing

Encryption

Cloud-to-Cloud Control

Vault

Surveillance

Armored Transport

Vault Access Policy

Data Loss Prevention Guards

Page 5: Beyond Encryption: The 5 Pillars of Cloud Data Security

1 Encryption must be based on accepted industry standards for both structured and unstructured data

Hot Tip: Make sure sorting,

searching, and other end-user functionalities

still work

Page 6: Beyond Encryption: The 5 Pillars of Cloud Data Security

2 Contextual access control for corporate data in the cloud based on user, device, and geographic location

Page 7: Beyond Encryption: The 5 Pillars of Cloud Data Security

3 Application auditing of cloud usage and automatic alerts for anomalous (potentially malicious) use

Real-Life Example

A t e c h c o m p a n y t r a c k e d Salesforce.com usage and set automat ic a ler ts whenever an anomalous usage pattern was detected, such as downloading an unusual number of customer contacts in one day

Page 8: Beyond Encryption: The 5 Pillars of Cloud Data Security

4 Data loss prevention for cloud data should include blocking of disallowed actions, alerting, and encryption

Hot Tip: Perform DLP for data inline and offline and integrate with existing

DLP system

Page 9: Beyond Encryption: The 5 Pillars of Cloud Data Security

5 Extend cloud security, governance, and compliance policies to data as it moves between cloud services

Hot Tip: It’s not just about office-to-cloud and mobile-to-cloud (cloud-to-cloud

matters too)

Page 10: Beyond Encryption: The 5 Pillars of Cloud Data Security

Discover Your Cloud Risk Receive a free personalized cloud discovery & risk assessment.

http://bit.ly/TrySkyhigh

Brought to you by !

SCHEDULE RISK ASSESSMENT


Top Related