[5 min read]
When I talk to CEOs and security professionals about data security, the one question that continually trips them up is - do you know where your data is? They tend to stumble over this question because they initially focus on their production data locations, without thinking about the plethora of other places sensitive data may find itself. For a security professional this is a major problem because if you don’t protect your data you are at risk of a data breach. With data breaches on the rise, now is the time for organizations to build a data security program in which CEOs and security professionals can easily identify the location of their sensitive data and who has access to it.
This might seem like a simple question to answer, but the responses I get often focus on production systems only. It is understandable that people immediately think of their customer applications when asked about data security. The problem is that customer data isn’t only stored in production systems. Data is typically stored in some kind of “data container” such as an asset e.g. a computer, a server, a thumb drive, etc. What has changed today is that we don’t always manage these assets directly, instead we rely on third-party services managed by IaaS, PaaS, or SaaS providers. From cloud services providers, such as AWS, to productivity tools like Slack, our data now resides in the cloud. So, when thinking about where our data is, we need to expand our definitions to include everywhere and anywhere data may have transited. To properly protect your data, you need to know what type of data exists within each asset and who has access to that data.
Just as importantly, customer data isn’t the only valuable data you have. Consider the other types of valuable data that your company might store. You have employee data, trade secrets, proprietary source code, financial information, and many other sensitive data types that could be damaging to your organization should it be breached or become unavailable to you.
Reverting to my original question about knowing where your data is stored, my follow-up question is generally, do you have a full inventory of all “data-containers” being used? And as you guessed, the inevitable answer is “no”. So the overall challenge increases. How can you realistically protect data if you don’t have an inventory of all the places it is stored, and who has access to it?
Here are some of the key steps you can take to protect your data.
The importance of the role that employees play in data security is highlighted when you look at how data is most commonly breached today. Often, data breaches in today’s cloud-based environment are not the result of brute force attacks into physical infrastructure, but more commonly due to incorrect access by employees. This occurs either through misconfigured permissions or through the absence of an offboarding process where a user’s access role is changed when they either move to another role or leave the company. A recent report indicates “a grand total of 94% of organizations had an insider data breach in the past year, with 84% of the data breaches resulting from human error.” To demonstrate that you take data security seriously, an auditor will not only require that you show clear processes for who should have access to critical systems, but that you can also show who authorized the access rights. This kind of reporting is essential when undergoing security audits such as SOC 2 and HITRUST.
[Read more: How to prepare for a SOC 2 audit]
Ostendio MyVCM is a single, integrated Cybersecurity and Risk Management platform that works in conjunction with all business operations to deliver perpetual security that's always on, always secure, and always auditable.
To answer the question - do you know where your data is? - CEOs and security teams are turning to tools to help them build, operate and showcase their data security programs. For example, the Ostendio MyVCM platform puts its asset module at the core of the platform and we help companies build data security programs that meet the needs of their organizations. The asset module is a critical part of the data security process. By leveraging Ostendio MyVCM, companies have an organized way to track all asset types from hardware, software, SaaS, PaaS, IaaS and define the criticality of the asset, what type of data should be stored within the asset, and manage who has access to the asset. Using MyVCM, this essential information is easy to show when undergoing a data security audit such as SOC 2, FedRAMP, or HITRUST.
Last year, the Ostendio MyVCM platform was used by customers to handle over 1 million platform user activities and 1,300 assessments. To find out more about the asset module and how you can know where your data is, set up a time to talk to an expert at Ostendio.