One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Lab Blog
Identifiant 8421999
Date de publication 2023-12-13 11:00:00 (vue: 2023-12-13 11:07:26)
Titre Qu'est-ce que la sécurité centrée sur les données?
What is data-centric security?
Texte The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Data is the lifeblood of organizations. It drives decision-making, fosters innovation, and underpins business operations. However, this wealth of data is scattered across multiple cloud platforms, making it an attractive target for cybercriminals, and rendering traditional approaches to data protection obsolete. This is where data-centric security comes into play. This article will explore the concept of data-centric security, why businesses need it, and the benefits it offers. Understanding data-centric security Data-centric security is a comprehensive approach to safeguarding sensitive data by focusing on the data itself rather than the network or perimeter. It revolves around protecting data throughout its lifecycle, ensuring that even if security perimeters are breached, the data remains secure. Data-centric security comprises several key components and principles, including: Data discovery and classification: Identifying and categorizing data based on its sensitivity is the first step in protecting it. By knowing what data is most critical, you can allocate resources and protection measures accordingly. Access controls and permissions: Fine-grained access controls and role-based permissions are essential to restrict data access to authorized users and roles, reducing the risk of data exposure. Encryption: Encrypting data at rest and in transit adds an extra layer of protection, making data inaccessible to unauthorized individuals. Activity monitoring: Real-time activity monitoring and auditing capabilities help detect unusual data access or transfer patterns, allowing for immediate response to potential security incidents. Incident response and mitigation: Effective incident response is crucial in case of a breach or unauthorized access, enabling quick identification of the issue and mitigating any damage. Why businesses need data-centric security The amount of data being used by organizations for day-to-day operations is increasing rapidly. The importance of adopting a data-centric approach to data protection can be summarized into three main reasons: 1. Traditional security is insufficient. Businesses leverage multiple cloud environments, and sensitive data, such as personal information or intellectual property, are migrated and sprawled across these platforms, expanding the attack surface. Data vulnerabilities become increasingly common when network perimeters are hard to define in a hybrid work environment. Applying safeguards directly to data is needed to create more barriers that repel unauthorized data distribution. Data-centric security protects data from all kinds of threats, such as external attackers or negligent employees. 2. Apply granular access controls. Data-centric security is a vital approach to protect your data dynamically. It enables you to have more flexibility in managing your systems and networks by providing fine-grained access controls, which are more effective than traditional access controls. This framework is particularly critical in scenarios where not every user should have access to the entire data within their department. 3. Integrate with existing tech stack. Data-centric security is an effective way to protect a company\'s data from cyber threats. It can be added to existing infrastructure without disrupting normal operations or requiring drastic changes. This allows companies to gradually improve their security measures while freeing up resources for other purposes. Benefits of data-centric security As data becomes increasingly valuable as a competitive advantage, organizations have
Notes ★★
Envoyé Oui
Condensat about accelerated access accordance accordingly accurate across act activity added adds adhere administrators adopt adopting adoption advantage agnostic all allocate allowing allows along also amount any apply applying approach approaches are around article assessments asset: assets at&t attack attackers attractive auditing author authorized avoid barricades barriers based because become becomes before being below benefits best better breach breached breaches build business businesses but can capabilities case categorizing category centric chains changes classification classification: classify cloud comes common companies company competitive complexity compliance comply components comprehensive comprises compromise concept conclusion conduct content control controls corporate correctly cost costly costs create creating critical crucial cyber cybercriminals cybersecurity damage data day decision defense defenses define department dependence deploy depth deserves detect detecting device digital directly discovery disrupting distribution dlp document does drastic drastically drives dynamically each easier ecosystem edge effective emphasis employees enables enabling encloses encrypting encryption encryption: end endorse endpoints enforcement ensure ensuring entering entire environment environments equipment especially essential even every excels exfiltration existing expanding explore exposed exposure external extra failure file files fine first flexibility flexible focusing following fortify fosters framework freeing from gdpr genuine goal goes governance governmental gradually grained granular greater guidelines hands hard harm have help helps highlight highlighted hipaa how however hybrid iam identification identifying identity immediate impact implementation implementing importance improve inaccessible incident incidents including including: incorporate increased increases increasing increasingly individual individuals industry information infrastructure innovation insufficient integrate intellectual interconnected international inventory invest investing issue its itself just key kinds know knowing landscape layer layers leakages least level leverage lifeblood lifecycle located longer loss lower main maintain maintaining making manage management managing mandates many means measures mechanisms meets migrated minimize mitigating mitigation: model monitoring monitoring: more moreover most multiple must national need needed needs negligent network networks next normal not obsolete offers often one only operations organization organizations other outlined outside particular particularly patterns perimeter perimeters periodically permissions permissions: personal platform platforms play plays policy posed positions post potential practices preventing prevention prime principle principles prioritize prioritizing privilege proliferation property protect protecting protection protects provide provided provides providing purposes quick rapidly rather real reasons: reduce reduces reducing redundancies regulations relying remains remote rendering repel reports requires requiring resources response responsibility rest restrict revolves risk risks robust role roles safeguarding safeguards satisfy scattered scenarios secure securing security selecting sensitive sensitivity several shift should silos situation solely solution solutions specific spending sprawled stack step storage stored strategy strengthen strong successive such sufficient summarized supply surface system systemic systems target tech technological technology than then these threats three throughout time today tools towards tracking traditional transfer transit trends truly ultimately unauthorized underlying underpins understand understanding unusual updating used user users valuable value views vital vulnerabilities way ways wealth what when where wherever which why will within without work workforce world wrong yearly your
Tags Data Breach Tool Vulnerability Cloud
Stories
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: