Cloud Computing Patterns | Design Patterns | Cloud Data Breach Protection


Cloud Computing Patterns, Mechanisms > Cloud Service and Storage Security Patterns > Cloud Data Breach Protection
Home > Design Patterns > Cloud Data Breach Protection

Cloud Data Breach Protection (Cope, Erl)

How can organizations provide protection against data breaches for cloud data?

Cloud Data Breach Protection

Problem

Unprotected data is vulnerable to a wide variety of breaches by attackers that can have significant consequences on the cloud architecture security and/or the organization’s business itself.

Solution

A system is established that provides encryption of sensitive data so that if it is lost, it is not readable by an attacker.

Application

Using validated encryption and governance that meets enterprise security assurance levels, data at rest is encrypted.

Cloud Data Breach Protection: The use of enterprise encryption for sensitive data.

The use of enterprise encryption for sensitive data.


CloudSchool.com Cloud Certified Professional (CCP) Module 7: Fundamental Cloud Security
CloudSchool.com Cloud Certified Professional (CCP) Module 8: Advanced Cloud Security

This mechanism is covered in CCP Module 7: Fundamental Cloud Security and
in Module 8: Advanced Cloud Security.

For more information regarding the Cloud Certified Professional (CCP) curriculum, visit www.arcitura.com/ccp.


Cloud Computing Design Patterns

The architectural model upon which this design pattern is based is further covered in:

Cloud Computing Design Patterns by Thomas Erl, Robert Cope, Amin Naserpour

(ISBN: 9780133858563, Hardcover, ~ 528 pages)

For more information about this book, visit www.arcitura.com/books.