- Describe Cloud Data Concepts
- Cloud Data Life Cycle Phases
- Data Dispersion
- Design and Implement Cloud Data Storage Architectures
- Storage Types (e.g. long term, ephemeral, raw-disk)
- Threats to Storage Types
- Design and Apply Data Security Technologies and Strategies
- Encryption and Key Management
- Hashing
- Masking
- Tokenization
- Data Loss Prevention (DLP)
- Data Obfuscation
- Data De-identification (e.g., anonymization)
- Implement Data Discovery
- Structured Data
- Unstructured Data
- Implement Data Classification
- Mapping
- Labeling
- Sensitive data (e.g., Protected Health Information (PHI), Personally Identifiable Information (PII), card holder data)
- Design and Implement Information Rights Management (IRM)
- Objectives (e.g., data rights, provisioning, access models)
- Appropriate Tools (e.g., issuing and revocation of certificates)
- Plan and Implement Data Retention, Deletion and Archiving Policies
- Data Retention Policies
- Data Deletion Procedures and Mechanisms
- Data Archiving Procedures and Mechanisms
- Legal Hold
- Design and Implement Auditability, Traceability and Accountability of Data Events
- Definition of Event Sources and Requirement of Identity Attribution
- Logging, Storage and Analysis of Data Events
- Chain of Custody and Non-repudiation