CISOs Guide to DSPM - 4 components, 3 flavors, but there's 1 the CISO favors
Did you notice the little rhyme in the blog title? I am having some fun with this newsletter!
This issue of Titaniam's Data Security Blog is dedicated to the newest buzzword in data security - DSPM. DSPM stands for Data Security Posture Management and it is considered the hottest new category of solutions in the data security space. Terms such as DSPM are typically coined by industry analysts to help customers sort through hundreds of vendors and match them with an equally large number of enterprise use cases.
Data Security Posture Management, as the term implies, seeks to assist enterprises in reducing data compromises by actively monitoring the security and usage of their data assets. Practically speaking, this is a large and serious goal and given the sprawl of data and applications across the typical enterprise, this is not easily achieved. Also, as in the case of most other domains, different categories of vendors, tend to define this term in different ways, and much of the time, these definitions align with their specific offering in the area.
In this issue, I will cover the different ways in which I have encountered DSPM and also share how we define this at Titaniam. As always, these blogs are intended to provide simple frameworks and overviews of these topics without too much jargon. As we get to future blogs on specific use cases, I will honor the original intent of this newsletter and jump into technical details, reference architectures etc. Finally, a point of disclosure - Titaniam offers strong and comprehensive data security features that speak very elegantly to a portion of the DSPM challenge. I will highlight where appropriate but also acknowledge that there are currently more parts to the DSPM problem than offered by any single vendor regardless of their claims.
To have a look at Titaniam's offering you can schedule time here .
Before we look at the flavors of DSPM that we have encountered in conversing with CISOs and vendors, let us look at the four components of DSPM:
I. 4 Components of DSPM
(i) D for Data: Data discovery and classification solutions
The D in DSPM speaks to data and it is no surprise that the large number of solution providers that offer data discovery and classification solutions are staking a claim to the DSPM space. A few points that CISOs have brought forward in conversations -
(ii) S for Security: Data security solutions
The S is DSPM stands for security and it certainly makes sense to have data security solutions be part of the DSPM story. However, there are a very large number of solutions and they collectively offer at least ten types of security controls - so from a CISO standpoint, all DSPM solutions that form the basis of their claim in data security are definitely not created equal. Here are some of the questions that have come up from CISOs when looking at the data security aspects of DSPM:
The D and S together appear to be the minimum bar for inclusion into DSPM. A solution claiming DSPM should enable visibility to both the data as well as the security that has been applied to it. The rest of the acronym P and M add to the baseline.
The next two are the more nuanced and interesting aspects of DSPM.
(iii) P for Posture: Solutions showing risk posture for data
The P in DSPM stands for Posture and here is where things start to get interesting. With CSPM (Cloud Security Posture Management) having become a known category there is a bit of overlap and a lot of confusion among CSPM and DSPM.
CSPM is an overarching category covering the security posture of all cloud resources including but not limited to data. DSPM is a data specific concept and ideally should go beyond cloud data. One could think of CSPM as including lightweight DSPM, but it would not be right for CSPM solutions to claim the DSPM category without increased focus on data specific discovery as well as security enforcement.
Now that we are done with clarifying DSPM versus CSPM - let us look at what the P brings to DSPM beyond what the D and S already brought.
The word posture implies an evaluation of the quality of data security. In other words a solution that discovers data and exposes the security controls applied to it is just a visibility solution. It goes from a visibility-based solution to a posture-based solution if and when it can provide an assessment of how secure the organizations data is. Further, an assessment of security by definition must be against some sort of framework or baseline. There are a number of options for this such as -
As in other types of DSPM claims, CISOs are asking pertinent questions about the P in DSPM:
领英推荐
(iv) M for Management: Solutions that provide for the management i.e. improvement or remediation of data security posture
The M in DSPM stands for Management and is the most easily overlooked. However, it is one of the most important parts of DSPM because it is what sets the old data discovery, data security, and data mapping tools apart from true DSPM. Management of anything, including the management of data security posture, by definition, involves some sort of iteration where an aspect of poor posture i.e. risk can be remedied by taking action in the DSPM platform (or from the DSPM platform via integration) - and once remedied, the outcomes are reflected in the DSPM dashboard as an improvement in posture.
A key attribute to look for when evaluating the M is DSPM is automation. If it is indeed possible to add as element of automation towards improving data security posture in response to risk based triggers, then we would see a DSPM platform in its truest sense.
CISO questions we have encountered with respect to the management of security posture are the following:
The last question above is a great segue into the 3 flavors of DSPM we are seeing in the market today.
II. 3 Flavors of DSPM in the market today
A quick summary of everything that is included in DSPM for a truly complete solution:
A quick look at the list above and we can see why there is not a single solution that addresses all of DSPM in the strict sense. However there are several flavors of DSPM that do exist in the market today.
3 common flavors are:
(i) DSPM Lite
When CSPM vendors add some coverage for cloud dbs and repositories what you get is DSPM Lite. This is not the flavor of DSPM that CISOs are finding interesting based on our conversations thus far since it is viewed as more of a marketing stunt than anything real.
(ii) D+SPM via integration
When data discovery vendors include structured and unstructured dbs as well as add a dashboard for data maps what you get a solid take on one half of DSPM. When this is combined with a DSP (data security platform) via integration, you get the other half as well and together you have a very healthy DSPM solution. This version of a DSPM offering brings the best of data security and integrates it with the best of data protection. (Disclosure: Titaniam offers a solution along with a partner in this area. To schedule a briefing please visit us here )
(iii) DSPM without discovery
When a data security platform vendor includes comprehensive data security controls i.e. all ten categories of controls and has a mechanism to deploy these across the breadth and variety of data platforms, repositories and applications - and can also dashboard granular data security, movement in security posture over time, application and evolution of data security policies as well as application of data security controls in response to compliance or policy requirements, what you get is DSPM without data discovery. (Disclosure: Titaniam offers this solution. To schedule a briefing please visit us here ). The gap between this and a full DSPM is data discovery and these platforms take one of two approaches to bridge this gap:
III. The DSPM flavor that CISOs favor
With all these variations in the market, we checked in with CISOs to see what their thoughts were in this area.
With the threat landscape evolving to a point where we are basically losing the data security fight, 2023 is seeing CISOs that want to move decisively towards actually securing their data and not just be satisfied with visibility based dashboards.
So, in the end if budgets are limited or choices have to be made the order of preference for DSPM is:
First - True protection (DSPM focused on strong data security that leverages existing discovery investments)
Second - Discovery + Protection (DSPM via integration or leveraging existing data security investments)
Third - CSPM with a focus on data (DSPM Lite)
IV. Conclusion: DSPM is a grand idea
If you can have it all go for discovery, classification, all ten categories of data security controls, risk based posture management, and automated remediation. If you can't have it all opt for a DSPM with a strong focus on actual data security because when attackers strike, visibility alone will not help you.
Titaniam provides the industry's richest and most advanced data security platform with coverage for structured and unstructured data across all types of databases, object stores, search platforms and repositories. Titaniam provides all ten data security and privacy control categories in a single engine ranging from traditional encryption and tokenization to advanced searchable encryption and encryption-in-use. Rich dashboards provide data security posture information and granular visibility into security posture during attacks as well as evidence of security for auditors and regulators. To learn more please visit us here or to schedule a briefing please visit here .
Founder & CEO @ InstaSecure | Proactive Cloud Perimeter Protection - Defend your cloud against Credential Compromise and Zero-Day threats
1 年Very solid and comprehensive writing, thanks for putting it together.