Cloud data protection

Enabling scalable data protection capabilities

Vishi Bindra

Vishi Bindra

Director Advisory, Cyber Security Services, KPMG US

+1 612-305-5812

Steve Barlock

Steve Barlock

Principal, Advisory, KPMG US

+1 415-963-7025

If data permissions on an internal system are compromised, thousands of trusted people have access. If data permissions in the cloud are compromised, millions of untrusted people could have access.

Cloud data protection summary

  • Cloud adoption concerns
    As companies adopt a cloud-first approach, data protection and usage capabilities are also changing. Data security control parity should be a primary concern.
  • Limited visibility of data usage
    There may be a danger of data leakage due to security misconfigurations or insufficient access controls.
  • Enforcing data flows
    As more organizations adopt SaaS and PaaS models, there is a greater need to understand how data is used and managed during its lifecycle.
  • Defining and protecting the perimeter
    With the shift to a less-defined perimeter, with cloud, data protection controls must focus on protection of data at rest, using encryption and rights management capabilities.