New to SaaSworthy? Sign Up
Already Registered? Sign In
Companies need to adopt the approach that every piece of data in their possession should be encrypted to protect confidentiality in the event of a security breach. In this guide, you’ll learn about Data encryption in the top tier public clouds, the prerequisites of data confidentiality, Key management terms, and best practices.
Table of contents
About the Author
Introduction
Chapter 1 / Encryption 101
Practices to Mitigate Leaks
The CIA Triad
Defining Our Terms
Encryption Methods
Symmetric or Secret Key Encryption
Asymmetric or Public Key Encryption
Envelope Encryption
Chapter 2 / Key Management
Chapter 3 / Key Generation
Entropy
Symmetric Key Generation
Asymmetric Key Generation
Chapter 4 / Amazon Web Services
Server-Side vs. Client-Side Encryption
Encryption Methods
Key Management
Chapter 5 / Microsoft Azure
Encryption Methods
Key Management
Chapter 6 / Google Cloud Platform
Encryption Methods
Key Management
Conclusion