0% found this document useful (0 votes)
61 views

Data Security in Cloud Computing

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views

Data Security in Cloud Computing

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Data security in

cloud computing
Agenda

introduction

Cloud Security Challenges


and solutions

Data Security in Azure


Emerged Teconlogies &
Cloud computing
• Machine learning and artificial intelligence (AI)
• Blockchain
• Internet of Things (IoT)
• Containers
• Homomorphic encryption
On-Prem Cloud

Responsible for security end to end Shared security responsibility

Disconnected security tools; not Interconnected, API-driven On-Prem


typically driven by APIs security tools
vs
Static resources, perimeter-based
security boundaries
Dynamic resources, ephemeral
security boundaries cloud
Security
Rarely automated Can be highly automated

IT-driven Developer-driven
Segmentation of cloud security responsibilities

Software-as-a-service (SaaS) — Customers are responsible for securing their data


and user access.

Platform-as-a-service (PaaS) — Customers are responsible for securing their data,


user access, and applications.

Infrastructure-as-a-service (IaaS) — Customers are responsible for securing their


data, user access, applications, operating systems, and virtual network traffic.
Visibility into cloud data

Control over cloud data 

Cloud Access to cloud data and applications

Compliance
security Cloud-native breaches 

challenges Misconfiguration

Disaster recovery

Insider threats 
• Single sign-on
• Reverse proxy
• Multi-Factor Authentication

Azure • Azure role-based access control (Azure RBAC)


• Security monitoring, alerts, and machine learning-

identity based reports


• Consumer identity and access management

management • Device registration


• Privileged identity management

security • Identity protection


• Hybrid identity management/Azure AD connect
• Azure AD access reviews
Encryption of data in transit
• Data-link Layer encryption in Azure
• TLS encryption in Azure
• Azure Storage transactions
• In-transit encryption in VMs
• In-transit encryption in Data Lake
Encryption of data at rest
• Azure encryption models
• Azure disk encryption
• Azure Storage Service Encryption
• Encryption of data at rest with Azure SQL Database
Azure Key Vault
• Azure Key Vault security
• Key Vault roles
Example
Threat
Conclusion
Thank you

You might also like