Chapter 3
Storing Data in the Cloud
IN THIS CHAPTER
Overcoming data siloes
Creating a data catalog
Labeling data
Following a classification system
Tokenizing data
Encrypting data in motion
Working with data access security levels
Setting user access controls
In January of 2021, hackers gained access to over 250,000 Microsoft Exchange servers worldwide. The hack they used to break in was an unknown exploit in the email server software. Because this was an unknown problem, there was no way that anyone could have anticipated the attack. The problem is that the exploit revealed an amazing amount of confidential information from some of the largest companies in the world. Once the hackers ...
Get Cloud Security For Dummies now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.