Cloud Security Alliance VP: Database security boils down to these three things
Here's how not to end up in their next report as a cautionary tale
Interview Securing cloud databases boils down to three things, according to John Yeoh, global VP for research at Cloud Security Alliance (CSA).
"Look at protecting the data itself, protecting the people who have access to it, and protecting how people access it — the networks and the applications that are giving access to your data," Yeoh told The Register.
Of course, this is easier said than done, especially as the amount of data that organizations amass, and then need to protect, grows exponentially.
Luckily, CSA is in the business of educating companies about best practices when it comes to cloud security. And in a conversation with The Register, which you can watch below, Yeoh discussed some of these best practices.
Strong encryption is key, especially when it comes to protecting critical databases. And while we've gotten pretty good at encrypting data at rest and in motion, newer technologies like confidential computing, which processes data in private memory using hardware-based secure enclaves, provides a way to protect data in use.
Plus, most cloud providers now offer confidential computing services.
Also: lock down identity and access, Yeoh said. "Who is accessing that information in your systems," he asked. "Not just about people and users accessing information, but the devices and endpoints." ®