From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Cloud data life cycle, data dispersion, and data flows
From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Cloud data life cycle, data dispersion, and data flows
- [Lecturer] Welcome to this lesson on the Cloud Data Life Cycle, Data Dispersion and Data Flows. Since we've already been over this, the focus of this lesson will be to discuss different security considerations and controls that we're going to apply in each phase. We'll also briefly discuss data dispersion and data flows. As a reminder, the cloud secure data lifecycle is made up of six steps. These steps are create, store, use, share, archive, and destroy, and I absolutely recommend memorizing the order of these steps before going into your CCSP exam. The first step is create, and this is where the initial generation or modification of digital information takes place. Some activities that we might take during this phase are going to be data classification, and this refers to the process of assigning a security label to the data. For example, some labels could be public, confidential, secret or top secret based on both the content and the purpose of the data. This is also an important…
Contents
-
-
-
-
(Locked)
Domain 2 overview48s
-
(Locked)
Cloud data life cycle, data dispersion, and data flows8m 12s
-
(Locked)
Storage types9m 12s
-
Storage threats6m 48s
-
(Locked)
Encryption and key management10m 11s
-
(Locked)
Hashing, data obfuscation, and tokenization9m 8s
-
(Locked)
Data loss prevention, keys, secrets, and certificates9m 35s
-
(Locked)
Different structures of data and data location7m 4s
-
(Locked)
Data classification policies4m 39s
-
(Locked)
Data mapping and labeling3m 59s
-
(Locked)
Information rights management6m 5s
-
(Locked)
Data retention policies7m 52s
-
(Locked)
Data deletion, archiving, and legal hold6m 51s
-
(Locked)
Enable data audit, trace, and accountability7m 40s
-
(Locked)
-
-
-
-