Cloud Security Terms You Need to Know
Published 06/04/2022
As more companies are migrating to the cloud, security must remain at the forefront of everyone’s minds. Regardless of your job title, industry, or technical knowledge, the topic of cloud security is necessary. Explore the following terms to stay up-to-date with and gain a baseline knowledge of the growing business of cloud security.
Cloud Computing
Cloud computing separates application and information resources from the underlying infrastructure used to deliver them. It describes the on-demand collection of services, applications, and information from network and storage resources. With cloud, organizations can move faster, reduce downtime, and save money.
Digital Transformation
Digital transformation is the process of adopting new digital technologies and business models, such as cloud computing, with the goal of improving revenue, efficiency, or other business objectives.
Cloud Migration
Cloud migration describes the movement of applications and infrastructure from a physical data center to that of public and private clouds.
Zero Trust
In a Zero Trust network, users aren’t allowed access to anything until they authenticate who they are. This security architecture withholds access until a user or device has been thoroughly inspected and authenticated. The least amount of access is granted and there is continuous monitoring of suspicious activity.
Serverless
An execution model for the cloud that gives users/developers the ability to build and run applications and services without thinking about servers. Serverless applications are built faster, launched only as needed, and the management of the infrastructure is no longer required.
DevSecOps
Short for development, security, and operations, a DevSecOps model automates the integration of security at every phase of the software development lifecycle, from initial design through integration, testing, deployment, and software delivery.
Ransomware
Ransomware is a form of malware used by an attacker to encrypt a victim’s data and demand a ransom for the encryption key, which allows the victim access to their data. It is typically delivered through exploits, associated with website advertisements containing malware, or through phishing campaigns
Phishing
A type of attack in which a message is sent from a malicious party disguised as a trusted source. Phishing has the intention of fooling the recipient into giving up credentials, money, or confidential data.
Quantum Computing
An area of quantum mechanics focused on developing computer technology based on quantum theory to deliver a huge leap forward in computation to solve complex problems.
Threat Modeling
To identify threats and preventative measures for a system or application. Clout threat modeling expands on standard threat modeling practices to account for unique cloud services and an application’s qualities and consideration.
Data Loss Prevention (DLP)
A type of security that prevents sensitive data from being shared outside the organization or to unauthorized individuals within the organization. DLP is usually done through policies that encrypt data or control sharing settings.
Related Articles:
Zero Standing Privileges (ZSP): Vendor Myths vs. Reality
Published: 11/15/2024
What is Cloud Workload in Cloud Computing?
Published: 11/13/2024
Modernization Strategies for Identity and Access Management
Published: 11/04/2024