![Page 1: Beyond Encryption: The 5 Pillars of Cloud Data Security](https://reader034.vdocument.in/reader034/viewer/2022042713/547c370db47959b6508b45d9/html5/thumbnails/1.jpg)
Brought to you by !
Beyond Encryption:
The 5 Pillars of Cloud Data Security
![Page 2: Beyond Encryption: The 5 Pillars of Cloud Data Security](https://reader034.vdocument.in/reader034/viewer/2022042713/547c370db47959b6508b45d9/html5/thumbnails/2.jpg)
With & how do you keep your corporate data secure in the cloud?
![Page 3: Beyond Encryption: The 5 Pillars of Cloud Data Security](https://reader034.vdocument.in/reader034/viewer/2022042713/547c370db47959b6508b45d9/html5/thumbnails/3.jpg)
Banks employ: 1 vaults 2 vault access policies 3 guards
4 surveillance 5 armored transport
Encryption is 1 step, but like bank security there are 5 pillars of cloud data security
![Page 4: Beyond Encryption: The 5 Pillars of Cloud Data Security](https://reader034.vdocument.in/reader034/viewer/2022042713/547c370db47959b6508b45d9/html5/thumbnails/4.jpg)
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
Contextual Access Control
Application Auditing
Encryption
Cloud-to-Cloud Control
Vault
Surveillance
Armored Transport
Vault Access Policy
Data Loss Prevention Guards
![Page 5: Beyond Encryption: The 5 Pillars of Cloud Data Security](https://reader034.vdocument.in/reader034/viewer/2022042713/547c370db47959b6508b45d9/html5/thumbnails/5.jpg)
1 Encryption must be based on accepted industry standards for both structured and unstructured data
Hot Tip: Make sure sorting,
searching, and other end-user functionalities
still work
![Page 6: Beyond Encryption: The 5 Pillars of Cloud Data Security](https://reader034.vdocument.in/reader034/viewer/2022042713/547c370db47959b6508b45d9/html5/thumbnails/6.jpg)
2 Contextual access control for corporate data in the cloud based on user, device, and geographic location
![Page 7: Beyond Encryption: The 5 Pillars of Cloud Data Security](https://reader034.vdocument.in/reader034/viewer/2022042713/547c370db47959b6508b45d9/html5/thumbnails/7.jpg)
3 Application auditing of cloud usage and automatic alerts for anomalous (potentially malicious) use
Real-Life Example
A t e c h c o m p a n y t r a c k e d Salesforce.com usage and set automat ic a ler ts whenever an anomalous usage pattern was detected, such as downloading an unusual number of customer contacts in one day
![Page 8: Beyond Encryption: The 5 Pillars of Cloud Data Security](https://reader034.vdocument.in/reader034/viewer/2022042713/547c370db47959b6508b45d9/html5/thumbnails/8.jpg)
4 Data loss prevention for cloud data should include blocking of disallowed actions, alerting, and encryption
Hot Tip: Perform DLP for data inline and offline and integrate with existing
DLP system
![Page 9: Beyond Encryption: The 5 Pillars of Cloud Data Security](https://reader034.vdocument.in/reader034/viewer/2022042713/547c370db47959b6508b45d9/html5/thumbnails/9.jpg)
5 Extend cloud security, governance, and compliance policies to data as it moves between cloud services
Hot Tip: It’s not just about office-to-cloud and mobile-to-cloud (cloud-to-cloud
matters too)
![Page 10: Beyond Encryption: The 5 Pillars of Cloud Data Security](https://reader034.vdocument.in/reader034/viewer/2022042713/547c370db47959b6508b45d9/html5/thumbnails/10.jpg)
Discover Your Cloud Risk Receive a free personalized cloud discovery & risk assessment.
http://bit.ly/TrySkyhigh
Brought to you by !
SCHEDULE RISK ASSESSMENT