How to solve data retention Challenges in Cloud ?

How to solve data retention Challenges in Cloud ?

Crypto-shredding is the practice of 'deleting' data by deliberately deleting or overwriting the encryption keys.This requires that the data have been encrypted. Data may be considered to exist in three states: data at rest, data in transit and data in use.

Crypto-shredding is the deletion or overwriting of the encryption keys that give access to encrypted data. Destroying the key to the encrypted data means it cannot be accessed and that data is effectively deleted because it is unreadable.

Drawback of Crypto-Shredding:

Under Article 17 of the GDPR, also referred to as ‘the right to be forgotten’, data subjects can request that all their personal data be deleted and cease to be processed. The request must be fulfilled completely and with ‘undue delay’.

crypto-shredding is only as effective as the encryption service used to protect the data in the first place. With cyberattacks becoming more sophisticated year on year, crypto-shredding may not be the most future-proof solution if encrypted data can be hacked

Reference:

https://medium.com/@brentrobinson5/crypto-shredding-how-it-can-solve-modern-data-retention-challenges-da874b01745b

https://en.wikipedia.org/wiki/Crypto-shredding#:~:text=Crypto%2Dshredding%20is%20the%20practice,transit%20and%20data%20in%20use .

https://www.verdict.co.uk/crypto-shredding-gdpr-cloud-systems/?cf-view

要查看或添加评论,请登录

RaviKumar M的更多文章

  • Just-in-Time Access

    Just-in-Time Access

    Just-in-Time (JIT) access is a fundamental security practice where the privilege granted to access applications or…

  • K.I.S.S Security Principle

    K.I.S.S Security Principle

    KISS, an acronym for "Keep it simple, stupid!", is a design principle first noted by the U.S.

  • Homomorphic encryption

    Homomorphic encryption

    encryption is the process of converting the plaintext into ciphertext . Homomorphic encryption is the conversion of…

  • Kerberos

    Kerberos

    Kerberos provides a centralized authentication server whose function is to authenticate users to servers and servers to…

  • Data Life Cycle

    Data Life Cycle

    A data lifecycle refers to the different stages a unit of data undergoes, from initial Create to when it’s no longer…

  • Security Content Automation Protocol(SCAP)

    Security Content Automation Protocol(SCAP)

    This article Provide of what is SCAP and how it's helps the enterprise to detect and manage the various vulnerability…

  • GoFetch

    GoFetch

    This Week seeing the trend in new side channel vulnerability Found in Apple M-Series Chips Leaks Secret Encryption…

社区洞察

其他会员也浏览了