Cloud 101CircleEventsBlog
The CCSK v5 and Security Guidance v5 are now available!

Download Publication

Sensitive Data in the Cloud
Sensitive Data in the Cloud
Who it's for:
  • cloud security practitioners
  • cybersecurity professionals 

Sensitive Data in the Cloud

Release Date: 07/12/2022

Anjuna commissioned CSA to develop a survey to better understand the industry’s knowledge, attitudes, and opinions regarding sensitive data in the cloud. The survey was conducted online in April 2022 and received 452 responses from IT and security professionals from organizations of various sizes and locations. The key areas of interest included:
  • Cloud use and data security issues
  • Cloud data security challenges and priorities for the next year
  • Approach to hosting sensitive data and workloads in the cloud
  • Familiarity with cloud and data security technologies
Respondents were asked questions about how much of their workload is in the cloud, the effectiveness of their cloud provider’s security controls, their confidence in their organization’s ability to protect sensitive data in the cloud, their current use of cloud security technologies, and more. Read this report for the full analysis of their responses.

Key Takeaways: 
  • The vast majority of organizations (89%) host sensitive data or workloads in the cloud.
  • Most organizations report that their cloud provider’s security controls are highly effective (38%) or somewhat effective (51%). 
  • Organizations feel less confident in their own ability to protect sensitive data in the cloud, with most respondents feeling slightly (31%) or moderately (44%) confident.
  • Over half of organizations plan to implement emerging solutions such as homomorphic encryption (59%) and confidential computing (55%) within the next 1-2 years. 
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources

Sponsor

Enterprise Authority To Operate (EATO) Controls Framework
Enterprise Authority To Operate (EATO) Controls...
CCM v4.0 Implementation Guidelines
CCM v4.0 Implementation Guidelines
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
The Cybersecurity Tower of Babel Requires Focus on Business Fundamentals: Part 2
The Cybersecurity Tower of Babel Requires Focus on Business Fundame...
Published: 07/25/2024
Incident Response in Cloud Security
Incident Response in Cloud Security
Published: 07/25/2024
Asking the Right Questions About ASPM
Asking the Right Questions About ASPM
Published: 07/24/2024
Cybersecurity Training for Employees: Upskill the Easy Way with CSA Team Training Programs
Cybersecurity Training for Employees: Upskill the Easy Way with CSA...
Published: 07/23/2024

Acknowledgements

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training