Skip to content
Menu
Cloud Gal 42
  • Home
Cloud Gal 42

Category: security

Cloud Data Encryption Architecture and Options

July 14, 2021July 12, 2021 by admin

Encryption architecture is very much dependent on the goals of the encryption solutions, along with the cloud delivery mechanism. Protecting data at rest from local compromise or unauthorized access differs significantly from protecting data in motion into the cloud. Adding additional controls to protect the integrity and availability of data can further complicate the process….

Read More

Is your Sensitive Data hiding from you?

July 14, 2021 by admin

The modern enterprise has evolved into a giant producer and consumer of data. Despite the large volume of controls and efforts to protect various data types, very few organizations can map exactly where their sensitive data is located and what security controls are deployed to guard it. Structured data types that are centrally managed allow…

Read More

QuickGuide: Encryption

July 13, 2021July 12, 2021 by admin

Symmetric Encryption There are two primary forms of cryptography in use today: symmetric and asymmetric cryptographies. Symmetric algorithms operate with a single cryptographic key that is used for both encryption and decryption of the message. For this reason, it is often called single, same, or shared key encryption. It can also be called secret or…

Read More

Data Loss Prevention (DLP)

July 12, 2021 by admin

Data loss prevention and data leakage prevention are terms used interchangeably to describe the controls put in place by an organization to ensure that certain types of data (structured and unstructured) remain under organizational controls, in line with policies, standards, and procedures. Controls to protect data form the foundation of organizational security and enable the…

Read More

Data Anonymization

July 11, 2021July 12, 2021 by admin

Direct identifiers and indirect identifiers form two primary components for identification of individuals, users, or personal information. Direct identifiers are fields that uniquely identify the subject (usually name, address, etc.) and are usually referred to as personally identifiable information. Masking solutions are usually used to protect direct identifiers. Indirect identifiers typically consist of demographic or…

Read More

Data Masking/Obfuscation

July 10, 2021July 12, 2021 by admin

Data masking or data obfuscation is the process of hiding, replacing, or omitting sensitive information from a specific data set. Data masking is usually used to protect specific data sets such as PII or commercially sensitive data or to comply with certain regulations such as HIPAA or PCI DSS. Data masking or obfuscation is also…

Read More

Cloud Storage Services

July 9, 2021July 12, 2021 by admin

At the core of all cloud services, products, and solutions are software tools with three underlying pillars of functionality: Processing data and running applications (compute servers) Moving data (networking) Preserving or storing data (storage) Cloud Storage Services Cloud storage is basically defined as data storage that is made available as a service via a network….

Read More

Data Security: Access Control

July 7, 2021 by admin

Previous article in series – Data Security: Functions, Actors, and Locations As with most areas of technology, access control is merging and aligning with other combined activities—some of these are automated using single sign-on capabilities, while others operate in a standalone, segregated fashion. The combination of access control and effective management of those technologies, processes,…

Read More

Data Security: Functions, Actors, and Locations

July 6, 2021July 7, 2021 by admin

Previous article in series – Data Security: The Secure Data Lifecyle Upon completion of mapping the various data phases, along with data locations and device access, it is necessary to identify what can be done with the data (i.e., data functions) and who can access the data (i.e., the actors). It is also important to…

Read More

Data Security : The Secure Data Lifecycle

July 5, 2021July 7, 2021 by admin

Data security is a core element of cloud security. Cloud service providers often share the responsibility for security with the customer. Roles such as the chief information security officer (CISO), chief security officer (CSO), chief technology officer (CTO), enterprise architect, and network administrator may all play a part in providing elements of a security solution…

Read More
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • …
  • 9
  • Next

Recent Posts

  • Role of AI/ML in Cybersecurity
  • QuickGuide: Security on OCI
  • The Cloud Management Plane
  • Secure Installation and Configuration of Virtualized Cloud Datacenters
  • Cloud Datacenter: Hardware-specific Security Configuration Requirements

Recent Comments

  • Rafael on Installing Debian on OCI
  • Jorge on Installing Debian on OCI
  • admin on Installing Debian on OCI
  • Andreas on Installing Debian on OCI
  • admin on Installing Debian on OCI

Archives

  • December 2022
  • February 2022
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • February 2021
  • January 2021
  • November 2020
  • October 2020

Categories

  • aws
  • bcdr
  • cloud
  • cloudsecurity
  • compliance
  • informationsecurity
  • oracle
  • pci
  • QuickGuide
  • security
©2025 Cloud Gal 42 | Powered by WordPress and Superb Themes!