Module 14: Data Flows and Data Dispersion
The exam expects you to trace how data moves — between users and the cloud, between cloud services, and between regions. If you cannot map the data flow, you cannot secure it.
Understanding Cloud Data Flows
Data in cloud environments flows in complex patterns that differ significantly from traditional on-premises architectures. The exam tests your ability to identify these flows and apply appropriate security controls at each point.
Types of Data Flows
- Client to cloud: Users accessing cloud services (web browsers, mobile apps, APIs). Controls: TLS, MFA, WAF.
- Cloud to cloud: Data moving between cloud services within the same or different providers. Controls: service mesh encryption, API authentication, network policies.
- Cloud to on-premises: Hybrid environments where data flows between cloud and traditional data centers. Controls: VPN, dedicated connections, data classification gating.
- Inter-region: Data replicating between geographic regions within the same provider. Controls: encryption in transit, jurisdictional compliance verification.
Data Flow Mapping
The exam expects you to understand data flow mapping as a critical security activity. A data flow map identifies: where data originates, what systems it passes through, where it is stored, who can access it at each point, and what controls protect it at each stage.
Without a data flow map, security controls are applied blindly. The exam may present a scenario where an organization has strong encryption for data at rest but no encryption for internal cloud-to-cloud communication, exposing data during processing.
Data Dispersion
Cloud providers distribute data across multiple physical locations, availability zones, and regions. This dispersion provides resilience but creates security challenges:
Jurisdictional Complexity
When data is dispersed across regions, it may cross jurisdictional boundaries. A file stored in a European region but replicated to a US backup region is subject to both European and US data protection laws. The exam expects you to identify these jurisdictional implications.
Attack Surface Expansion
Each copy of data is a potential target. More copies in more locations means more potential points of compromise. The exam tests whether you understand that data dispersion increases the number of locations an attacker could target.
Destruction Complexity
Ensuring all copies are destroyed becomes harder with dispersion. Backup systems, CDN caches, log files, and temporary processing copies all may contain data remnants. The exam expects you to account for all copies in your destruction verification.
Exam insight: When a question describes data deletion in a cloud environment, always consider dispersed copies. The correct answer usually involves comprehensive verification across all storage locations, not just primary storage deletion.
Securing Data Flows
The exam tests several mechanisms for securing data flows:
- TLS everywhere: All data flows should be encrypted, including internal cloud-to-cloud traffic. Do not assume the provider's internal network is secure.
- API gateways: Centralized control points for API traffic that enforce authentication, rate limiting, and input validation.
- Service mesh: Infrastructure layer that handles service-to-service communication, providing mutual TLS, observability, and traffic management.
- Data Loss Prevention (DLP): Monitors data flows for sensitive data leaving approved boundaries.
Cross-Border Data Transfers
Many regulations restrict data transfers across national borders. The exam expects you to know that technical controls alone are insufficient — legal mechanisms (Standard Contractual Clauses, adequacy decisions, consent frameworks) are required for lawful cross-border data transfers.
Key Takeaways
Map all data flows before applying security controls. Data dispersion creates jurisdictional, attack surface, and destruction challenges. Encrypt all data flows, including internal cloud traffic. Account for all data copies across all locations. Cross-border transfers require both technical and legal controls.