Data Security for a Dynamic Cloud Environment - Beyond Basic Controls
Cloud Security Podcast
Award Winning Globally Ranked 100 Weekly LIVE Video & Audio Podcast talking about Cloud Security
Simply relying on encryption will not suffice. Use of data perimeters, confidential computing etc will be huge components of effective data security in a dynamic cloud environment.
Incase, this is your 1st Cloud Security Newsletter! You are in good company!You are reading this issue along with your friends and colleagues from companies like Netflix, Citi, JP Morgan, Linkedin, Reddit, Github, Gitlab, CapitalOne, Robinhood, HSBC, British Airways, Airbnb, Block, Booking Inc & more who subscribe to this newsletter, who like you want to learn what’s new with Cloud Security each week from their industry peers like many others who listen to Cloud Security Podcast & AI CyberSecurity Podcast every week.
If you would prefer to read this in your email, you can subscribe to the newsletter here.
Cloud Security Topic of the Week?
Data Security for a Dynamic Cloud Environment - Beyond Basic Controls
Welcome to this week's edition of the Cloud Security Newsletter!
This week, we're diving deep into data security in Cloud environments. With the growing use of AI among existing data projects organizations are now increasingly handling sensitive data across multiple clouds and regions. Traditional security controls of just doing data encryption is no longer sufficient for such a distributed data security use case. AWS infact recently also announced Resource Control Policy (RCPs) to enable single point of controlling external access for resource using data perimeters.
In this week’s issue our featured experts from Cloud Security Podcast, share their practical insights on implementing comprehensive data security while enabling business agility.
Featured Experts This Week
Definitions and Core Concepts
Data Security Components
????Data Protection Triad:
??? Data Perimeter Constructs
??? Data Security Controls
??? Data Security Tooling
??? Data Access Patterns
??? Security Implementation Concepts
Our Insights from These Practitioners
1. Data Security Requires Multiple Protection Layers
Steve Orrin outlines the three critical aspects of data security that organizations need to address: "If you look at data security, there's sort of what we call the three legs to that stool - there's data at rest, which is typically full disk encryption file encryption... there's data in transit, which is your TLS sessions... and data in use - how do I protect data while it's being transacted?"
Organizations should:
2. Data Access Patterns Should Drive Perimeter Design
John Burgess highlights the importance of understanding data access patterns: "Identifying those access patterns and what data is crossing those zones of trust within your environment... is probably the first step before you start crafting any automation or any policies. It's also the hardest step, given that there is essentially a lack of telemetry available out of the box to you."
Key Activities:
3. Implement Strong Controls for Shared Data Services
Prahathess shares insights about securing shared data layers: "You want to identify the crown jewel right away... Look at where they're spending the money. Obviously equal amount of money in every account. That'd be very weird. It's going to be like one or two accounts where they're spending like a million dollars or 100,000 dollars like on something. And that means that you can use that as a proxy metric to assign importance."
Implementation Strategies:
5. Consider Data Sovereignty in Multi-Cloud Environments
Steve Orrin emphasizes the importance of data sovereignty: "Data sovereignty is a key thing... German citizen data has to stay in Germany. Australian citizen data has to stay in Australia. Those are requirements that don't really fit well with the whole global cloud idea."
Key Considerations:
6. Use Data Insights to Drive Better Security Controls
Prahathess emphasizes the importance of using data insights to implement effective controls: "The general is policy. And we were sending alerts about our policies to everyone. And for a good chunk of the teams, the alerts were meaningless because that was a standard operating procedure... As a central security team, not like an embedded one, you tend to miss out on that context."
Practical Implementation Steps:
6. Automate Data Security Controls
Tyler Warren emphasizes the importance of automation in scaling data security: "If your only way to scale as your security organization is to add headcount, I think you're setting yourself up for failure... The mantra is do more with less. And I think the only way to even make a dent is to use automation."
Automation Strategies:
This comprehensive overview should help you implement robust data security controls in your cloud environments. Next week, we'll explore another critical aspect of cloud security. Stay tuned!
???Related Resources
???Related Podcast Episodes
We would love to hear from you?? for a feature or topic request or if you would like to sponsor an edition of Cloud Security Newsletter.
Thank you for continuing to subscribe and Welcome to the new members in tis newsletter community??
Peace!
Was this forwarded to you? You can Sign up here, to join our growing readership.
Want to sponsor the next newsletter edition! Lets make it happen
Have you joined our FREE Monthly?Cloud Security Bootcamp yet?
checkout our sister podcast?AI Cybersecurity Podcast
Great dad | Inspired Risk Management and Security Profesional | Cybersecurity | Leveraging Data Science & Analytics My posts and comments are my personal views and perspectives but not those of my employer
2 周Cloud Security Podcast great topics. A lot of great insights.
Cybersecurity& GRC Thought leader| AI Governance & Risk Advisor| Speaker | Mentor | Top Voice| Best Selling Author | Top 10 Global Women in Cybersecurity| Certified Board Member| Top Technology Leader | CISO 100 winner|
2 周Great write up however in tooling CASB & DLP are missing and should be added ??
A word from this week's edition's sponsor- Varonis Need secure data protection for your cloud environments? With Varonis cloud data security, you can defend your multi-cloud storage and critical SaaS apps from insider threats and cyberattacks. Our agentless, cloud-native DLP, powered by AI, automatically discovers and classifies sensitive data at rest, prevents exposure, monitors data activity, and stops data exfiltration. Sign up today for a free personalized demo and see how our all-in-one platform can protect your critical data and dramatically reduce the likelihood of a breach - https://www.varonis.com/products/cloud-dlp
If you prefer to receive this in your inbox - you can sign up here - https://www.cloudsecuritynewsletter.com/