From the course: Cloud Data, Platform, and Applications Security by Pearson

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Phase 4: Share

Phase 4: Share

In phase four, the share phase, it goes without saying that there's more than one subject involved in accessing this data because it's visible, it's analyzed, and it's allocated among more than one user or subject such as a system or an application. This involves often global collaboration and sharing of data, for example, in cloud storage, and introduces obvious risks and vulnerabilities when you have lack of control. Most of the control used in the previous phases will also be implemented in the share phase, but the key issue is there's multiple parties accessing this data simultaneously in most cases. Data is consumed by people, applications, systems, services, and tools. It's often changed from its original state before it's being shared. And of course, again here, raw data becomes information because more than one party is providing their input or their processing of the data. And again, remotely used data should be protected as in phase three. In phase four, stringent identity…

Contents