Menu

Cloud Data Security

  1. Describe Cloud Data Concepts
    • Cloud Data Life Cycle Phases
    • Data Dispersion
  2. Design and Implement Cloud Data Storage Architectures
    • Storage Types (e.g. long term, ephemeral, raw-disk)
    • Threats to Storage Types
  3. Design and Apply Data Security Technologies and Strategies
    • Encryption and Key Management
    • Hashing
    • Masking
    • Tokenization
    • Data Loss Prevention (DLP)
    • Data Obfuscation
    • Data De-identification (e.g., anonymization)
  4. Implement Data Discovery
    • Structured Data
    • Unstructured Data
  5. Implement Data Classification
    • Mapping
    • Labeling
    • Sensitive data (e.g., Protected Health Information (PHI), Personally Identifiable Information (PII), card holder data)
  6. Design and Implement Information Rights Management (IRM)
    • Objectives (e.g., data rights, provisioning, access models)
    • Appropriate Tools (e.g., issuing and revocation of certificates)
  7. Plan and Implement Data Retention, Deletion and Archiving Policies
    • Data Retention Policies
    • Data Deletion Procedures and Mechanisms
    • Data Archiving Procedures and Mechanisms
    • Legal Hold
  8. Design and Implement Auditability, Traceability and Accountability of Data Events
    • Definition of Event Sources and Requirement of Identity Attribution
    • Logging, Storage and Analysis of Data Events
    • Chain of Custody and Non-repudiation