Certified Cloud Security Professional – CCSP – Question380

Apart from using encryption at the file system level, what technology is the most widely used to protect data stored in an object storage system?

A.
TLS
B. HTTPS
C. VPN
D. IRM

Correct Answer: D

Explanation:

Explanation: Information rights management (IRM) technologies allow security controls and policies to be enforced on a data object regardless of where it resides. They also allow for extended controls such as expirations and copying restrictions, which are not available through traditional control mechanisms. Hypertext Transfer Protocol Secure (HTTPS), virtual private network (VPN), and Transport Layer Security (TLS) are all technologies and protocols that are widely used with cloud implementations for secure access to systems and services and likely will be used in conjunction with other object data protection strategies.