banner
Best Practices for Cloud Data Protection and Key Management - White Paper

Best Practices for Cloud Data Protection and Key Management - White Paper

Digital transformation is a persistent trend that has resulted in fundamental shifts in storage, access and management of digital assets. These shifts are particularly noticeable for the most prized asset: an organization’s sensitive data. Sensitive data used to reside in controlled, on-premises enterprise data centers protected by both physical and logical security controls. Although, until recently it was unthinkable to trust a third-party with such data, organizations are now accelerating the migration of their workloads and data to the cloud. According to the Thales 2021 Global Data Threat Report [1], 50% of respondents said that more than 40% of their data is stored using infrastructure (IaaS), platform (PaaS) or software (SaaS) services of public CSPs such as Amazon Web Services, Microsoft Azure and Google Cloud Platform. This change, though initially driven by economics, has delivered greater flexibility and elasticity in management of computing and storage resources. A clear casualty of increased cloud consumption has been the traditional method of data security that relied on well-defined network perimeter to protect data.