Cloud Computing Patterns, Mechanisms > Cloud Service and Storage Security Patterns > Cloud Data Breach Protection
Cloud Data Breach Protection (Cope, Erl)
How can organizations provide protection against data breaches for cloud data?
Problem
Unprotected data is vulnerable to a wide variety of breaches by attackers that can have significant consequences on the cloud architecture security and/or the organization’s business itself.
Solution
A system is established that provides encryption of sensitive data so that if it is lost, it is not readable by an attacker.
Application
Using validated encryption and governance that meets enterprise security assurance levels, data at rest is encrypted.
Compound Patterns
Burst In, Burst Out to Private Cloud, Burst Out to Public Cloud, Cloud Authentication, Cloud Balancing, Elastic Environment, Infrastructure-as-a-Service (IaaS), Isolated Trust Boundary, Multitenant Environment, Platform-as-a-Service (PaaS), Private Cloud, Public Cloud, Resilient Environment, Resource Workload Management, Secure Burst Out to Private Cloud/Public Cloud, Software-as-a-Service (SaaS)
The use of enterprise encryption for sensitive data.