Data Security Patterns
In this chapter, we will learn about the patterns that can be leveraged to secure data and storage resources in multiple clouds. The key areas covered will be as follows:
- Protecting data at rest
- Protecting data in transit
- Protecting data in use
The primary object of the data security patterns shared in the following diagram is to protect the data with respect to the following aspects:
- Confidentiality – Making sure that only the people who need to know are made aware of the information and that no one else can access it in an unauthorized way.
- Integrity – Ensuring that the content, while it is transferred or communicated, is not altered in transmission. Data integrity refers to maintaining and assuring the accuracy and consistency of data over its entire life cycle.
- Availability – Ensuring the data is available to the right authorized entities at the right time and is accessible.