Unit 5 | HTCS 701 Notes | Database Security and Access Control | AKTU Notes




    1. Cloud Data Security

    Cloud Data Security means protecting data that is stored, processed, or accessed in the cloud. Cloud data is stored on remote servers and accessed through the internet.

    • Protects data from unauthorized access
    • Ensures data confidentiality, integrity, and availability
    • Prevents data loss and data breaches

    Example: Google Drive protects files using login authentication and encryption.


    2. Recent Trends in Database Security and Access Control Mechanisms

    Recent trends refer to modern techniques used to secure cloud databases and data access.

    • Encryption Everywhere: Data is encrypted while stored and transferred
    • Zero Trust Security: No user is trusted by default
    • Multi-Factor Authentication (MFA): Password plus OTP or biometric
    • Role-Based Access Control (RBAC): Access based on roles
    • Continuous Monitoring: Logs and alerts for suspicious activity


    3. Cloud Data Audit – Introduction

    Cloud Data Audit is the process of checking whether cloud data is secure, accurate, and compliant with security rules and laws.

    • Ensures data security
    • Detects unauthorized access
    • Verifies compliance with policies

    Example: Checking access logs of a cloud database.


    4. Cloud Data Audit

    Cloud Data Audit involves examining cloud data activities such as access, modification, and deletion of data.

    • Who accessed the data
    • When data was accessed
    • What changes were made
    • Whether security rules were followed

    Audits can be internal (by the organization) or external (by third-party auditors).


    5. Best Practices in Cloud Data Audit

    Best practices are recommended methods for effective cloud data auditing.

    • Enable logging for all activities
    • Perform audits regularly
    • Review and update access permissions
    • Verify encryption of data
    • Ensure compliance with regulations


    6. Key Management in Cloud Security

    Key Management refers to handling cryptographic keys used for encrypting and decrypting data.

    • Key generation
    • Key storage
    • Key rotation
    • Key revocation

    Example: Cloud Key Management Service (KMS).


    7. Importance of Key Management

    If encryption keys are compromised, data security fails. Proper key management ensures secure encryption.

    • Prevents unauthorized key access
    • Ensures regular key rotation
    • Revokes old or compromised keys


    8. Cloud Key Management Audit

    Cloud Key Management Audit checks whether encryption keys are securely managed.

    • Who can access encryption keys
    • Where keys are stored
    • How often keys are rotated
    • Whether key usage is logged

    Example: Auditor verifies key access control policies.


    9. Benefits of Cloud Data Security and Audit

    • Protects sensitive cloud data
    • Prevents data breaches
    • Ensures legal and regulatory compliance
    • Builds trust with users
    • Improves overall cloud security


    Summary

    • Cloud data security protects data on cloud servers
    • Modern trends include encryption, MFA, RBAC, Zero Trust
    • Cloud data audit checks security and compliance
    • Key management protects encryption keys
    • Key management audit ensures key security

    No comments:

    Post a Comment