Introducing Data Security Posture Management (DSPM) Platform
Published 05/18/2022
This blog was originally published by Polar Security here.
Written by Nimrod Iny, Polar Security.
You’re a cloud-based company, your entire business model relies on cloud data and your cloud environment is VERY precious to you, correct? That’s why you invest all of your resources into protecting this environment from the outside world. You want to make sure that the perimeter between your cloud data and the outside world is 100% safe, I get it.
But what if I told you that your goal is to protect your crown jewels, a.k.a - the data itself?
Do you even know where your data is stored? Your sensitive data? Where it flows and who can access it? If you’re unaware of your sensitive data’s existence and can’t follow its actual and potential data flows, it simply cannot be protected. If you answered even one of the above questions with - ‘no’ or ‘maybe’, then you need to read on about DSPM, urgently.
Getting Familiar With Cloud Data Security Problems
Organized Data vs Data Chaos
Up until recently, most companies used to manage their data by utilizing a centralized data architecture. This architecture is usually coupled with the traditional approach where there's a single database shared across all services. This resulted in data being maintained and secured by one main entity within organizations, usually security or data governance teams, while all the data was ‘dumped’ into one place. Developers within the company who wanted to create new data stores needed to have the approval of that security/data entity to make sure nothing fell through the cracks. This methodology made the life of data, compliance and security teams much easier in terms of data management.
Centralized VS Decentralized Data Architecture
Shift Left in Data Creation
Fast-forward to a few years later, many companies, especially cloud-first companies with high data capacity, are now rapidly transitioning to the microservices approach - which is usually paired with a decentralized data architecture. What that means is - technically speaking, developers within the organization with the appropriate permissions can create their own data stores with very little supervision whatsoever. Essentially, the ownership of data management and security has shifted from one main entity (centralized) to each developer managing his/her own data store (decentralized). This creates a situation we define as - Data Chaos. Why chaos? Because developers can now create their own data stores (e.g. managed S3, RDS and unmanaged MySQL, PostgreSQL, MongoDB) so quickly that it’s becoming impossible to keep track of the full picture: data is flowing between different applications, services, cloud-native users, 3rd-party vendors and even countries. On top of that, cloud applications produce an incredible amount of byproduct data which also contributes to that Data Chaos phenomenon. Add the fact that developers are not trained to deal with data security and compliance and you get it - chaos.
Known Data vs Shadow Data
Nowadays, cloud service providers offer relatively basic data management solutions for data sources (e.g. RDS, S3, DynamoDB, etc.). While these solutions allow organizations to observe the amount of data stores they currently have, they do not provide any information on the types of data residing in them and whether that data is sensitive or not. This lack of visibility into your data creates shadowed areas within your data stores, resulting in unknown data that is unused or unavailable data created by devs and byproducts. This unknown data is what we define as - Shadow Data.
Shadow Data
The emergence of highly distributed cloud-native apps based on microservices, containers, and serverless functions has brought the issue of shadow data even more to the forefront, as decentralized workload-based data stores are a major contributor to data sprawl.
The problem here is - since no one within the company knows about the existence of this data - it isn’t monitored and this leaves a potential backdoor for hackers and compliance issues alike.
What is Data Security Posture Management And How Does It Address These Issues?
While Cloud Security Posture Management (CSPM) is usually looking at the security posture of the cloud infrastructure itself, focused on major public cloud providers; DSPM is diving into the data layer regardless of where it is located, including: Snowflake, Databricks, MongoAtlas and more.
Data Security Posture Management (DSPM) is essentially a set of security solutions and automation that enables the organization’s Security, IT and Data teams to get greater visibility and manage the data security posture of their datastores and applications. These solutions scan, track, follow, identify and classify the data within your organization so no shadow or unknown data will remain unmanaged.
Thanks to that X-Ray-like visibility, companies can now get an accurate picture of their overall data assets, allowing them to actually know their data, classify it and track its flows as it moves around. Knowing your data to that level, especially if your company handles sensitive information, will result in a much better security posture and compliance-readiness.
Related Articles:
The Lost Art of Visibility, in the World of Clouds
Published: 11/20/2024
Group-Based Permissions and IGA Shortcomings in the Cloud
Published: 11/18/2024
9 Tips to Simplify and Improve Unstructured Data Security
Published: 11/18/2024
How AI Changes End-User Experience Optimization and Can Reinvent IT
Published: 11/15/2024