BigID / SmallID- for Cloud Data Security Posture Management (DSPM)

BigID / SmallID- for Cloud Data Security Posture Management (DSPM)

Are you moving workloads to Azure and looking at how to address your Data Privacy Security Management (DPSM)? As part of the Microsoft Intelligent Security Association (MISA) BigID can help with that using our Certified integration!: https://azuremarketplace.microsoft.com/en-us/marketplace/apps/big-id.bigid-data-discovery-cataloging?tab=Overview

The massive migration of data to the cloud has made cloud data security posture management (DSPM) a top priority for security professionals. Today's organizations require a cloud-native data security solution that offers high accuracy in data discovery and classification, fast time-to-value, and flexibility in scale based on their data.BigID discovers, inventories, and catalogs data (and metadata) across the enterprise infrastructure, enabling customers to build and maintain a unified catalog for Azure data centers and Office 365 environments. BigID supports structured and unstructured data across Azure File Store, Azure Object Store, data lakes, relational databases like Microsoft SQL, and Office 365 services. This unified, privacy-aware view facilitates compliant data lake migration and de-risks broader adoption of Azure services, big data and analytics functionality.

Find, Classify, and Catalog Sensitive & Personal Data

BigID provides native integrations with industry leading data governance and security tools to enable additional enrichment with metadata inventory and data discovery insights. Customers can also build their own functionality to present custom perspectives of data, automate data processes, and complement existing tools through the BigID App Framework by leveraging the BigID Data Intelligence Platform.

Together with Microsoft Priva, BigID empowers our joint customers to easily manage data rights requests at scale by discovering, classifying, and connecting personal data to specific individuals across the tools our customers use most, from Microsoft 365 and other apps available through BigID. These requests can then be automatically fulfilled easily and accurately – from right to access to data deletion.

No alt text provided for this image

Through integration with Microsoft Purview Information Protection, BigID extends the ability of Microsoft customers to automatically apply labels and policies defined through MIP to all sensitive and personal data – including data outside of Microsoft infrastructure, such as Box or Google Drive.

BigID can apply labels based on risk scores and document classifiers that leverage machine learning for automated insight. Customers can further enrich policies and operationalize data minimization with capabilities for finding and labeling duplicate and similar data at scale. Integrating BigID discovery and classification with MIP policies enables customers to maintain consistent data protection and transfer & align policies across Office 365, OneDrive, SharePoint and MS SQL service in Azure and on premise.

Here are some best practices and areas of focus to assess your Cloud Data Security Posture Management (DSPM):

Know Your Data

No alt text provided for this image

If you don't know where your sensitive data is, how can you take steps to protect it? The first step in protecting your data is to understand what data you’re storing in the cloud in the first place.

  • Discover where all of your data is stored across different data sources in the cloud and SaaS
  • Identify what type of data you have to reduce dark and unknown data — structured databases, files, images, documents, and more
  • Classify all of your data to give accurate context to the data found and categorize sensitive data — passwords, SSNs, dates of birth, etc
  • Build an accurate data inventory to gain visibility in a unified view — what data you have, who it belongs to, how important it is, and where it is stored

Prioritize Your Data

After you discover and classify all of your data, you must prioritize protection for highly valuable and highly sensitive data. Different types of data require different security controls, handling methods, and urgency. You wouldn’t treat car model information the same as social security number information, right?

  • Determine what data you have that is considered sensitive — personal identifiable information (PII), security access tokens, ID numbers, etc
  • Determine what data you have that is regulated by policies — payment card information (PCI), protected health information (PHI), financial data
  • Define and evaluate risk level distribution across your data catalog based on sensitivity, risk, and regulations
  • Identify areas of focus for data protection based on the amount and the level of sensitive and regulated data contained

Minimize Your Attack Surface

Data minimization helps to reduce your attack surface so those with malicious intent have less data to target, making it more difficult for them to find the sensitive data they're looking for. Protecting cloud data and staying compliant becomes a faster and simpler process, saving you time and resources.

  • Limit the collection of data to only what is relevant and necessary to achieve your purpose
  • Pinpoint what sensitive data you have, where it is located, and how it is being used and accessed to find problem areas in data security
  • Retain any data for only as long as you need it and discard unused data
  • Identify and delete duplicate and similar data to maintain a clean data environment

Monitor Your Data

It's not only enough to have a current inventory of all of your data but also to maintain it and keep it up-to-date. New data is created every day and old data is constantly being modified, so it's important to have a system in place that can keep track of these changes.

  • Keep a current inventory of your data and schedule scans to monitor for changes and new data
  • Update your data inventory in real-time based on changes with an automated solution
  • Create automated policies to monitor 24/7 for potential violations in security and compliance
  • Review policy findings and proactively act on them to stop breaches and non-compliance before they happen

No alt text provided for this image

Using BigID, you will:

  • Get unmatched native coverage for data sources across cloud and SaaS for a centralized data inventory
  • Use patented machine learning to scan 95% faster across structured data, unstructured data, and data-in-motion
  • Classify your data using NLP technology with accurate context and fewer false positives
  • Leverage hundreds of out-of-the-box classifiers and policies based on regulations or create your own
  • Automate policy management and workflows to monitor your data and investigate findings

Let me know how we can help with your Cloud Data Security Posture Management.

要查看或添加评论,请登录

David H.的更多文章

社区洞察

其他会员也浏览了