Unit 2 Cloud computing
Unit 2 Cloud computing
1. Complexity: Keys stored across on-premises and cloud platforms can be hard to sync
and standardize.
- Customer: Manages user access, data within the application, and specific
configurations.
Strategies to Address Challenges
1. Centralized KMS: Use a unified system for managing keys in both environments.
3. Encryption Practices: Use end-to-end encryption and separate keys for different data
types.
1. Tokenization Process:
- Replace sensitive data with unique tokens that have no value outside the
tokenization system.
- Store the link between sensitive data and tokens in a secure vault.
2. Token Retrieval:
- Retrieve original data by sending the token to the vault through authorized requests.
2. Maintaining Usability:
3. Security Enhancements:
4. Encryption Complement:
- Adds an extra layer of security alongside encryption for data at rest and in transit.
Considerations for Implementing Data Tokenization
2. Token Management:
Conclusion
Tokenization protects sensitive data while maintaining usability, enhancing both security
and compliance.
3. Encryption::
Regulatory Compliance: Ensures compliance with laws like GDPR and PCI-DSS to avoid
penalties.
Mitigates Data Breach Impact: Stolen encrypted data remains secure without the
decryption key.
1. Data at Rest:
- How to Implement: Encrypt data before storing it using strong algorithms like AES-
256.
2. Data in Transit:
- How to Implement: Use secure protocols like TLS or HTTPS to protect data during
transmission from interception or tampering.
3. Data in Use:
- How to Implement: Encrypt backup and archived data to protect it, even if backup
systems are compromised.
Types of Encryption:
1. Symmetric Encryption
2. Asymmetric Encryption
4. Data Classification