Cloud providers offer increased availability and durability by distributing data among multiple data centers. In this video, Mike Chapple explains the concept of data dispersion and how it impacts cloud security.
- [Instructor] Data Dispersion is one of the core principles of business continuity. It says that important data should always be stored in more than one location. This ensures that a copy of the data persists even if one location is completely destroyed. Think of data dispersion as the modern day equivalent of the adage, "Don't put all your eggs in one basket." Data dispersion lets you put each egg in many different baskets. Storage administrators have practiced data dispersion for years. In on premises data centers, they often used techniques like redundant storage systems at remote locations that were active and ready to pick up at a moment's notice or, less expensively, they kept backup tapes at a location other than the organization's primary data center. Data dispersion in the era of on premises computing was expensive and time consuming. The cloud makes data dispersion much easier because it shifts the complexity from the customer to the cloud service provider. Infrastructure as a Service vendors offer classes of service for their storage that automatically replicate data across multiple data centers and even across different regions of the world. Customers may pay additional fees for replication that goes beyond the basic class of service but they can achieve data dispersion with the click of a mouse. Organizations using Software and Platform as a Service vendors should carefully investigate all aspects of their vendor's business-continuity plans, including data dispersion provisions, to get a sense of the level of assurance that they have that their data is protected in the event of a catastrophic incident.
- Block storage types
- Cloud storage security threats
- Encryption basics
- Choosing encryption algorithms
- Key management
- Public key infrastructure (PKI)
- Creating and revoking digital signatures
- Securing common protocols
- Data protection
- Information management
- Information rights management
- Logging security events
- Continuous security monitoring