From the course: Cloud Security Concepts: Services and Compliance
Unlock the full course today
Join today to access over 23,900 courses taught by industry experts.
Application-level cloud security
From the course: Cloud Security Concepts: Services and Compliance
Application-level cloud security
- [Narrator] There are several components of application security for the cloud, including application/data or the application itself and the data connected to the application. An example is a cloud-based accounting application connected to a database like Oracle. Event monitoring or logging means recording how an application is running and what events are occurring, such as updating a database or logging in users, encryption at rest, meaning that the data is stored on a virtual or physical device and encrypted and thus protected. Encryption in flight means that the data moving over a network is encrypted and thus not visible to those monitoring the network. Credentials, meaning that we can validate users and devices to applications. Threat detection means we can spot issues through a proactive monitoring approach. Next, let's take a look at application logs. These logs are core to application security because they can spot issues through a proactive monitoring and recording of…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Business case for cloud security1m 47s
-
(Locked)
Breach scenarios and attack vectors3m 5s
-
(Locked)
Infrastructure-level cloud security1m 53s
-
(Locked)
Application-level cloud security2m 50s
-
(Locked)
Data-level cloud security2m 38s
-
(Locked)
Rise of identity and access management2m 58s
-
(Locked)
Compliance and security2m 40s
-
(Locked)
AI-related cloud security issues1m 34s
-
(Locked)
Challenge: Create a cloud security business case for ABC Corp1m 1s
-
(Locked)
Solution: Create a cloud security business case for ABC Corp1m 28s
-
-
-
-
-