Читать книгу The Official (ISC)2 CCSP CBK Reference - Leslie Fife, Aaron Kraus - Страница 86
Cloud Secure Data Lifecycle
ОглавлениеAs with all development efforts, the best security is the security that is designed into a system. The cloud secure data lifecycle can be broken down into six steps or phases.
Create: This is the creation of new content or the modification of existing content.
Store: This generally happens at creation time. This involves storing the new content in some data repository, such as a database or file system.
Use: This includes all the typical data activities such as viewing, processing, and changing.
Share: This is the exchange of data between two entities or systems.
Archive: Data is no longer used but is being stored.
Destroy: Data has reached the end of its life, as defined in a data retention policy or similar guidance. It is permanently destroyed.
At each of these steps in the data's lifecycle, there is the possibility of a data breach or data leakage. The general tools for preventing these are encryption and the use of data loss prevention (DLP) tools.