Gartner Research

Simplify Operations and Compliance in the Cloud by Protecting Sensitive Data

Published: 02 June 2015

ID: G00275235

Analyst(s): Brian Lowans

Summary

Public clouds offer attractive fast implementation and lower operational costs, but some security best practices must be employed when processing sensitive data. CIOs and CISOs must also understand the limitations of using encryption or tokenization in the cloud before proceeding.

Table Of Contents
  • Key Challenges

Introduction

Analysis

  • Simplify Audits When Using Cloud Services by Implementing Encryption or Tokenization to Control Access to Sensitive Data
  • Develop a Data Security Governance Strategy to Address Data Residency and Compliance Issues by Applying Encryption or Tokenization and Access Controls
  • Avoid Data Breach Notification Requirements for PII and ePHI by Protecting Data Stored in the Cloud
  • Don't Rely on the Service Provider to Delete All Copies of Data in the Cloud
  • Understand That Protecting Sensitive Data in Cloud-Based SaaS Applications May Require Trading Off Security and Functionality
  • Assess Each Encryption Solution by Following the Data to Understand When Data Appears in Clear Text, Where Keys Are Made Available and Stored, and Who Has Access to the Keys

Gartner Recommended Reading

©2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form without Gartner’s prior written permission. It consists of the opinions of Gartner’s research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party. For further information, see Guiding Principles on Independence and Objectivity.

Already have a Gartner Account?

Purchase this Document

To purchase this document, you will need to register or sign in above

Become a client