Cloud Security

  1. Data Protection and Encryption
    1. Data Classification and Governance
      1. Data Discovery
        1. Automated Discovery Tools
          1. Data Inventory Management
            1. Sensitive Data Identification
            2. Data Classification Schemes
              1. Sensitivity Levels
                1. Regulatory Classifications
                  1. Business Impact Classifications
                  2. Data Labeling and Tagging
                    1. Metadata Management
                      1. Automated Labeling
                        1. Label Enforcement
                        2. Data Lifecycle Management
                          1. Data Creation
                            1. Data Usage
                              1. Data Archival
                                1. Data Destruction
                              2. Encryption Technologies
                                1. Cryptographic Fundamentals
                                  1. Symmetric Encryption
                                    1. Asymmetric Encryption
                                      1. Hash Functions
                                        1. Digital Signatures
                                        2. Data at Rest Encryption
                                          1. Full Disk Encryption
                                            1. Database Encryption
                                              1. File-Level Encryption
                                                1. Object Storage Encryption
                                                2. Data in Transit Encryption
                                                  1. Transport Layer Security (TLS)
                                                    1. IPSec
                                                      1. Application-Level Encryption
                                                      2. Data in Use Protection
                                                        1. Homomorphic Encryption
                                                          1. Secure Multi-Party Computation
                                                            1. Trusted Execution Environments
                                                          2. Key Management
                                                            1. Key Management Principles
                                                              1. Key Generation
                                                                1. Key Distribution
                                                                  1. Key Storage
                                                                    1. Key Rotation
                                                                      1. Key Destruction
                                                                      2. Key Management Services
                                                                        1. Cloud-Native KMS
                                                                          1. Hardware Security Modules
                                                                            1. Key Escrow Services
                                                                            2. Key Management Policies
                                                                              1. Key Lifecycle Policies
                                                                                1. Access Control Policies
                                                                                  1. Audit and Compliance Policies
                                                                                  2. Customer Key Management
                                                                                    1. Customer-Managed Keys
                                                                                      1. Bring Your Own Key (BYOK)
                                                                                        1. Hold Your Own Key (HYOK)
                                                                                      2. Data Loss Prevention
                                                                                        1. DLP Strategy Development
                                                                                          1. Policy Definition
                                                                                            1. Risk Assessment
                                                                                              1. Implementation Planning
                                                                                              2. DLP Technologies
                                                                                                1. Network DLP
                                                                                                  1. Endpoint DLP
                                                                                                    1. Storage DLP
                                                                                                      1. Cloud DLP
                                                                                                      2. Content Inspection
                                                                                                        1. Pattern Matching
                                                                                                          1. Statistical Analysis
                                                                                                            1. Machine Learning Detection
                                                                                                            2. Data Exfiltration Prevention
                                                                                                              1. Channel Monitoring
                                                                                                                1. Behavioral Analysis
                                                                                                                  1. Anomaly Detection
                                                                                                                2. Database Security
                                                                                                                  1. Database Access Controls
                                                                                                                    1. Authentication Mechanisms
                                                                                                                      1. Authorization Models
                                                                                                                        1. Privilege Management
                                                                                                                        2. Database Encryption
                                                                                                                          1. Transparent Data Encryption
                                                                                                                            1. Column-Level Encryption
                                                                                                                              1. Application-Level Encryption
                                                                                                                              2. Database Activity Monitoring
                                                                                                                                1. Query Monitoring
                                                                                                                                  1. Access Logging
                                                                                                                                    1. Anomaly Detection
                                                                                                                                    2. Data Masking and Anonymization
                                                                                                                                      1. Static Data Masking
                                                                                                                                        1. Dynamic Data Masking
                                                                                                                                          1. Tokenization
                                                                                                                                            1. Pseudonymization