New Skills

New Training: Plan for Cybersecurity in the Cloud

by Team Nuggets
New Training: Plan for Cybersecurity in the Cloud picture: A
Published on April 20, 2021

In this 6-video skill, CBT Nuggets trainer Bart Castle discusses common cybersecurity concepts and solutions being used in cloud computing environments. Gain an understanding of cloud security trends and services as well as storage, network, and compute security practices. Watch this new cybersecurity training.

Watch the full course: CompTIA Security+

This training includes:

  • 6 videos

  • 1.5 hours of training

You’ll learn these topics in this skill:

  • Plan for Cloud Cybersecurity

  • Security Patterns and Controls

  • Cloud Storage Security

  • Cloud Network Security

  • Cloud Compute Security

  • Cloud Security Solutions

A Brief Understanding Of Data Storage Security In The Cloud

Cloud security can be a complicated beast. Unlike the traditional on-premise data center environment, organizations don't have full control over the hardware and services that cloud services offer. Instead, the responsibility of security is split between both the vendor and the client. While vendors, like AWS, do implement security tools for their services, clients still need to configure and use these tools properly. One of the more common use cases for cloud resources that have had this drastic shift in the security paradigm is in cloud data storage.

There are three aspects of the cloud data storage paradigm that cloud engineers need to understand:

  1. Data at rest

  2. Data in transition

  3. Data in use

Each of these dynamics requires different types of security awareness. For instance, the major cloud providers offer tools to limit data access. These tools can be IAM policies that restrict types of usage with specific user IDs or policies that dictate how storage containers can be used. That only helps with data access and usage, though. Cloud engineers will need to think about making data immutable to protect against things like crypto-malware attacks or encrypting data in transport between the organization and the cloud provider.

Recommended Articles