From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Cloud data life cycle, data dispersion, and data flows

Cloud data life cycle, data dispersion, and data flows

From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep

Cloud data life cycle, data dispersion, and data flows

- [Lecturer] Welcome to this lesson on the Cloud Data Life Cycle, Data Dispersion and Data Flows. Since we've already been over this, the focus of this lesson will be to discuss different security considerations and controls that we're going to apply in each phase. We'll also briefly discuss data dispersion and data flows. As a reminder, the cloud secure data lifecycle is made up of six steps. These steps are create, store, use, share, archive, and destroy, and I absolutely recommend memorizing the order of these steps before going into your CCSP exam. The first step is create, and this is where the initial generation or modification of digital information takes place. Some activities that we might take during this phase are going to be data classification, and this refers to the process of assigning a security label to the data. For example, some labels could be public, confidential, secret or top secret based on both the content and the purpose of the data. This is also an important…

Contents