Читать книгу The Official (ISC)2 CCSP CBK Reference - Leslie Fife, Aaron Kraus - Страница 86

Cloud Secure Data Lifecycle

Оглавление

As with all development efforts, the best security is the security that is designed into a system. The cloud secure data lifecycle can be broken down into six steps or phases.

 Create: This is the creation of new content or the modification of existing content.

 Store: This generally happens at creation time. This involves storing the new content in some data repository, such as a database or file system.

 Use: This includes all the typical data activities such as viewing, processing, and changing.

 Share: This is the exchange of data between two entities or systems.

 Archive: Data is no longer used but is being stored.

 Destroy: Data has reached the end of its life, as defined in a data retention policy or similar guidance. It is permanently destroyed.

At each of these steps in the data's lifecycle, there is the possibility of a data breach or data leakage. The general tools for preventing these are encryption and the use of data loss prevention (DLP) tools.

The Official (ISC)2 CCSP CBK Reference

Подняться наверх