From the course: Applying the Azure Well-Architected Framework
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Confidentiality - Azure Tutorial
From the course: Applying the Azure Well-Architected Framework
Confidentiality
- [Instructor] Now, let's talk about confidentiality. Imagine you have curtains on your windows to prevent outsiders from seeing inside your house. In the cloud, we protect sensitive data from unauthorized access by using encryption and access controls. Encryption transforms data into a format that can only be read by someone with the correct decryption key. Much like how a locked box can only be opened with the right key. There are two main types of encryption, encryption at rest and encryption in transit. Encryption at rest protects data stored on disks, while encryption in transit protects data as it travels across networks. We also use access controls to ensure that only authorized users can access sensitive data. This involves setting permissions and roles that define who can view, edit, or delete data. Additionally, we implement data masking and tokenization to protect sensitive information. Data masking replaces sensitive data with fictitious data but realistic data, while…