Story image

Identity: The key to protecting sensitive data no matter where it resides

06 Mar 2017

Today’s adversaries know that one of the best ways to hit a business where it hurts is at the foundation – which in our digital age unequivocally means data. Mitigating the risk of modern data breaches requires special handling. If crucial data is not protected, an organisation ’s reputation and line of business are put in jeopardy, especially when it comes to priceless data like financials and personally identifiable information (PII).

Australian firms in particular need to start taking note. The much-anticipated Notifiable Data Breaches Bill will require any organisation that is accountable to the Privacy Act to inform the Australian Information Commissioner and members of the public about compromised data.

How can Australian companies protect sensitive data no matter where it resides?

Protecting sensitive business data can’t be achieved through physical means alone. Smart organisations leverage well-known processes and tools such as identity and data access governance solutions to help manage who has access to the critical information stored in structured applications like mainframes and databases.

Unfortunately, sensitive data often resides outside of structured systems. Unstructured data, or data stored in files outside of structured applications and databases, is a security concern for many firms. Often, unstructured data can originate from structured data in an application, but is then moved by an end user into a more convenient format. One example in which data may be compromised is if an employee is reviewing financial data pulled from an internal database and, to make it easier to share with other team members, exports it to Excel and uploads the file to a corporate Dropbox account. In this way, it’s easy to see how quickly data can move from secure, controlled environments to unsecured locations.

An integrated approach in three steps

Organisations can keep structured or unstructured data safe across all applications and file storage systems by taking an integrated approach to governing access. There are three steps to this integrated approach:

  • Track and secure sensitive data. In addition to the obvious applications and databases that store sensitive data, businesses must identify sensitive, unstructured data stored both within the data centre and in the cloud. Because of the sheer amount of unstructured data, the only realistic way to find and keep track of it is to leverage an automated solution to scan all systems and move sensitive data to secure storage environments.
  • Design preventive controls for real-time governance. Once sensitive data has been located and stored appropriately, firms must implement preventive controls to ensure the right people have access. Identity governance tools can help by collecting and analysing permissions to answer the question: “Who has access to what?” Identity governance can ensure that user access conforms to policy and job roles as access changes throughout a user’s lifecycle.
  • Implement detective controls. It’s not enough to define access controls and forget about them. Organisations also need detective controls to review and monitor ongoing user access and activity for anomalies. Defences must be maintained on a regular basis. Periodic access reviews and user activity monitoring can flag potentially dangerous situations and help prevent a data breach.

Identity governance: the foundation of a safe IT environment

Identity governance provides organisations with the solutions they need to address sensitive data in the enterprise before they become problems, all while balancing security with convenience. The answer for Australian organisations is to view identity not simply as a project, but as a company-wide initiative. We need this foundation to achieve a critical level of visibility, control and governance in data and applications in the region.

Article by Kevin Cunningham, president and co-founder at SailPoint.

WhatsApp users warned to change voicemail PINs
Attackers are allegedly gaining access to users’ WhatsApp accounts by using the default voicemail PIN to access voice authentication codes.
Swiss Post asks public to hack its e-voting system
Switzerland’s postal service Swiss Post is inviting keen-eyed security experts and white hats to hack its e-voting system.
Spoofs, forgeries, and impersonations plague inboxes
It pays to double check any email that lands in your inbox, because phishing attacks are so advanced that they can now literally originate from a genuine sender’s account – but those emails are far from genuine.
Flashpoint signs on emt Distribution as APAC partner
"Key use cases that we see greatly benefiting the region are bolstering cybersecurity, combating insider threats, confronting fraud, and addressing supply chain risk, to name a few."
The attack surface: 2019's biggest security threat
As businesses expand, so does their attack surface – and that may be the biggest cybersecurity risk of them all, according to Aon’s 2019 Cyber Security Risk Report.
Opinion: Cybersecurity as a service answer to urgent change
Alan Calder believes a CSaaS model can enable a company to build a cyber resilience strategy in a coherent and consistent manner.
Why SD-WAN is key for expanding businesses - SonicWall
One cost every organisation cannot compromise on is reliable and quick internet connection.
New threat rears its head in new malware report
Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware.