Skip to Main Content
Information Security Management Handbook, Volume 7, 6th Edition
book

Information Security Management Handbook, Volume 7, 6th Edition

by Richard O'Hanley, James S. Tiller
August 2013
Intermediate to advanced content levelIntermediate to advanced
434 pages
15h 17m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 7, 6th Edition
212 ◾  Information Security Management Handbook
Further, for the provider to enforce data segregation between each subscriber, separate keys
should be used. When separate keys are used for each subscriber, the provider could provide a
copy of the keys to each subscriber as part of its data backup and recovery services. For exam-
ple, if the provider keeps the encrypted backup copies of each subscriber in escrow, then in
the event that the provider goes out of business, the subscriber can recover its encrypted data.
Cloud Subprovider
Consider when a cloud provider outsources some or all of its services to another provider as shown
in Figure 16.6 ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 5, 6th Edition

Information Security Management Handbook, Volume 5, 6th Edition

Micki Krause Nozaki, Harold F. Tipton
Information Security for Managers

Information Security for Managers

Michael Workman, Daniel C. Phelps, John N. Gathegi

Publisher Resources

ISBN: 9781466567498