Domain and Learning Objectives
Cloud Data Life Cycle
Cloud Data Life Cycle: Create, Store, Use, and Share
Real-World Scenario
Cloud Data Life Cycle: Archive
Cloud Data Life Cycle: Destroy, Key Data Functions
Cloud Data Storage Architectures
Cloud Data Storage Architectures: Storage Types for IaaS
Cloud Data Storage Architectures: Storage Types for PaaS
Cloud Data Storage Architectures: Storage Types for SaaS
Cloud Data Storage Architectures: Threats to Storage Types
Real-World Scenario
Data Security Strategies
Data Security Strategies: Encryption (Use Cases)
Data Security Strategies: Encryption Challenges
Data Security Strategies: Encryption in IaaS
Data Security Strategies: Database Encryption
Data Security Strategies: Key Management
Data Security Strategies: Key Storage in the Cloud
Data Security Strategies: Masking
Data Security Strategies: Data Anonymization
Data Security Strategies: Tokenization
Data Security Strategies: Homomorphic Encryption and Bit Splitting
Real-World Scenario
Data Security Strategies: Data Loss Prevention
Scenario
Data Discovery and Classification Technology
Data Discovery and Classification Technology: Data Classification
Data Discovery and Classification Technology: Challenges with Cloud Data
Jurisdictional Data Protections for Personally Identifiable Information (PII)
Privacy Acts: GDPR
Privacy Acts: Data Protection policies
Privacy Acts: United States
Privacy Acts: HIPAA, FISMA, and SOX
Jurisdictional Data Protections for PII: Responsibilities of Cloud Services
Data Rights Management
Data Retention, Deletion, and Archiving Policies
Data Retention
Data Deletion
Real-World Scenario
Data Archiving
Real-World Scenario
Legal Hold
Auditability, Traceability, and Accountability of Data Events
SIEM
Chain of Custody
Nonrepudiation
Real-World Scenario
Key Takeaways