From the course: Cloud Security Concepts: Services and Compliance

Unlock the full course today

Join today to access over 23,200 courses taught by industry experts.

Application-level cloud security

Application-level cloud security

- [Narrator] There are several components of application security for the cloud, including application/data or the application itself and the data connected to the application. An example is a cloud-based accounting application connected to a database like Oracle. Event monitoring or logging means recording how an application is running and what events are occurring, such as updating a database or logging in users, encryption at rest, meaning that the data is stored on a virtual or physical device and encrypted and thus protected. Encryption in flight means that the data moving over a network is encrypted and thus not visible to those monitoring the network. Credentials, meaning that we can validate users and devices to applications. Threat detection means we can spot issues through a proactive monitoring approach. Next, let's take a look at application logs. These logs are core to application security because they can spot issues through a proactive monitoring and recording of…

Contents