The security laws which are implemented to secure data in cloud are:
Processing: Control the data that is being processed correctly and completely in an application
File: It manages and control the data being manipulated in any of the file
Output reconciliation: It controls the data which has to be reconciled from input to output
Input Validation: Control the input data
Security and Backup: It provides security and backup it also controls the security breaches logs
Processing: Control the data that is being processed correctly and completely in an application
File: It manages and control the data being manipulated in any of the file
Output reconciliation: It controls the data which has to be reconciled from input to output
Input Validation: Control the input data
Security and Backup: It provides security and backup it also controls the security breaches logs