The cloud offers a variety of data storage options. In this video, Mike Chapple explains the differences between raw disk storage, ephemeral storage, and long-term storage.
- [Instructor] Cloud storage comes in a variety of forms. In the first course in this series we discussed the differences between block and object storage. We also talked about how object storage may have different classifications designed for both active and long-term use. As we explore data security, let's dive a little deeper into two different categories of block storage. Cloud block storage may can consist of either raw disk storage, or ephemeral storage The difference between these two is quite important to understand, as it impacts the level of permanence for that storage. Raw disk storage is permanently allocated storage that may exist independently of a server instance. Think of this as a cloud disk drive, that you create and can then attach to any server instance that needs to use the storage. If you turn off the server, the raw disk storage continues to exist and may be attached to another server. Ephemeral storage is temporary storage associate with a specific instance. This of it as the scratch space that an instance can use temporarily to do it's thinking. Ephemeral storage is temporary in nature, and it exists only as long as the instance associated with it exists. If you turn that instance off, the disk is destroyed and the data stored on it is lost. Ephemeral storage is often faster than permanent storage, because it's usually contained on a disk that is physically attached to the hardware running in the server instance. But, ephemeral storage should never be used as anything other than a temporary storage location. Data that needs to be retained permanently must be placed on a regular disk volume, or in an object storage.
- Block storage types
- Cloud storage security threats
- Encryption basics
- Choosing encryption algorithms
- Key management
- Public key infrastructure (PKI)
- Creating and revoking digital signatures
- Securing common protocols
- Data protection
- Information management
- Information rights management
- Logging security events
- Continuous security monitoring