Beyond Encryption: The 5 Pillars of Cloud Data Security

10
Brought to you by Beyond Encryption: The 5 Pillars of Cloud Data Security

description

Your data is valuable. Between hackers and PRISM, encryption of cloud data is the talk of enterprise IT departments. But there's more to cloud security than just encryption. Learn the 5 pillars of cloud data security to make your data in the cloud as secure as money in a bank vault.

Transcript of Beyond Encryption: The 5 Pillars of Cloud Data Security

Page 1: Beyond Encryption: The 5 Pillars of Cloud Data Security

Brought to you by !

Beyond Encryption:

The 5 Pillars of Cloud Data Security

Page 2: Beyond Encryption: The 5 Pillars of Cloud Data Security

With & how do you keep your corporate data secure in the cloud?

Page 3: Beyond Encryption: The 5 Pillars of Cloud Data Security

Banks employ: 1 vaults 2 vault access policies 3 guards

4 surveillance 5 armored transport

Encryption is 1 step, but like bank security there are 5 pillars of cloud data security

Page 4: Beyond Encryption: The 5 Pillars of Cloud Data Security

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

Contextual Access Control

Application Auditing

Encryption

Cloud-to-Cloud Control

Vault

Surveillance

Armored Transport

Vault Access Policy

Data Loss Prevention Guards

Page 5: Beyond Encryption: The 5 Pillars of Cloud Data Security

1 Encryption must be based on accepted industry standards for both structured and unstructured data

Hot Tip: Make sure sorting,

searching, and other end-user functionalities

still work

Page 6: Beyond Encryption: The 5 Pillars of Cloud Data Security

2 Contextual access control for corporate data in the cloud based on user, device, and geographic location

Page 7: Beyond Encryption: The 5 Pillars of Cloud Data Security

3 Application auditing of cloud usage and automatic alerts for anomalous (potentially malicious) use

Real-Life Example

A t e c h c o m p a n y t r a c k e d Salesforce.com usage and set automat ic a ler ts whenever an anomalous usage pattern was detected, such as downloading an unusual number of customer contacts in one day

Page 8: Beyond Encryption: The 5 Pillars of Cloud Data Security

4 Data loss prevention for cloud data should include blocking of disallowed actions, alerting, and encryption

Hot Tip: Perform DLP for data inline and offline and integrate with existing

DLP system

Page 9: Beyond Encryption: The 5 Pillars of Cloud Data Security

5 Extend cloud security, governance, and compliance policies to data as it moves between cloud services

Hot Tip: It’s not just about office-to-cloud and mobile-to-cloud (cloud-to-cloud

matters too)

Page 10: Beyond Encryption: The 5 Pillars of Cloud Data Security

Discover Your Cloud Risk Receive a free personalized cloud discovery & risk assessment.

http://bit.ly/TrySkyhigh

Brought to you by !

SCHEDULE RISK ASSESSMENT