Organizations use cloud services for a wide variety of data storage needs. These cloud services offer tremendous flexibility and cost effectiveness but also come with security concerns that administrators must address. In this video, learn the importance of securing data stored in cloud services through the use of access controls and encryption.
- [Narrator] Organizations use cloud services…for a wide variety of data storage needs.…These cloud services offer tremendous flexibility…and cost-effectiveness but also come with…security concerns that administrators must address.…The basic principle that organizations should follow…is that you should apply the same security controls…to data stored in the cloud as you would…data stored in your own data center.…If you'd encrypt information in your own data center,…you should encrypt it in the cloud.…If you'd restrict access in your own data center,…you should restrict it in the cloud.…
The two main issues you should think about…when handling cloud data security…are encryption and access control.…The way you'll implement encryption depends upon…the type of service that you're using…and the way that you use it.…For example, when using an infrastructure as a service…provider for servers, you may be able to encrypt…entire virtual disk volumes to prevent anyone,…including the provider, from accessing…the contents of the disk.…
To join one of Mike's free study groups for access to bonus tips and practice questions, visit certmike.com.
- The security triad: confidentiality, integrity, and availability
- Security principles
- Resource security
- Data security
- Security controls
- Assessing security controls
- Security policy
- Physical security
Skill Level Intermediate
Q: This course was updated on 05/18/2018. What changed?
A: New videos were added that cover software licensing. In addition, the following topics were updated: integrity, leveraging industry standards, data encryption, security control selection and implementation, audits and assessments, security policy framework, security policy training and procedures, and ethics.
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Intermediate
1. The Security Triad
2. Security Principles
3. Resource Security
4. Data Security
5. Data Security Controls
6. Security Controls
Control frameworks3m 55s
7. Assessing Security Controls
8. Security Policy
9. Awareness and Training
10. Physical Security
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.