WP What is Data Security | Threats, Risks & Solutions | Imperva

Data Security

154.4k views
Data Security

What is Data Security?

Data security is the process of protecting corporate data and preventing data loss through unauthorized access. This includes protecting your data from attacks that can encrypt or destroy data, such as ransomware, as well as attacks that can modify or corrupt your data. Data security also ensures data is available to anyone in the organization who has access to it.

Some industries require a high level of data security to comply with data protection regulations. For example, organizations that process payment card information must use and store payment card data securely, and healthcare organizations in the USA must secure private health information (PHI) in line with the HIPAA standard.

But even if your organization is not subject to a regulation or compliance standard, the survival of a modern business depends on data security, which can impact both the organization’s key assets and private data belonging to its customers.

Whitepaper: Meeting Data Security Challenges in the Age of Digital Transformation.

Why is Data Security Important?

The Ponemon Institute’s Cost of Data Breach Study found that on average, the damage caused by a data breach in the USA was $8 million. 25,575 user accounts were impacted in the average data incident, which means that beyond financial losses, most incidents lead to loss of customer trust and damage to reputation.

Average cost of data breaches is the highest in the USA.

Average cost of data breaches is the highest in the USA.

Lawsuits, settlements, and fines related to data breaches are also on the rise, with many governments introducing more stringent regulations around data privacy. Consumers have much more extensive rights, especially in the EU, California, and Australia, with the introduction of GDPR, CCPA, APP, and CSP234.

Companies operating in regulated industries are affected by additional standards, such as HIPAA for healthcare organizations in the USA, and PCI/DSS for organizations processing credit card data.

In the past decade, social engineering, ransomware and advanced persistent threats (APTs) are on the rise. These are threats that are difficult to defend against and can cause catastrophic damage to an organization’s data.

There is no simple solution to data security—just adding another security solution won’t solve the problem. IT and information security teams must actively and creatively consider their data protection challenges and cooperate to improve their security posture. It is also critical to evaluate the cost of current security measures, their contribution to data security, and the expected return on investment from additional investments.

Data Security vs Data Privacy

Data privacy is the distinction between data in a computer system that can be shared with third parties (non-private data), and data that cannot be shared with third parties (private data). There are two main aspects to enforcing data privacy:

  • Access control—ensuring that anyone who tries to access the data is authenticated to confirm their identity, and authorized to access only the data they are allowed to access.
  • Data protection—ensuring that even if unauthorized parties manage to access the data, they cannot view it or cause damage to it. Data protection methods ensure encryption, which prevents anyone from viewing data if they do not have a private encryption key, and data loss prevention mechanisms which prevent users from transferring sensitive data outside the organization.

Data security has many overlaps with data privacy. The same mechanisms used to ensure data privacy are also part of an organization’s data security strategy.

The primary difference is that data privacy mainly focuses on keeping data confidential, while data security mainly focuses on protecting from malicious activity. For example, encryption could be a sufficient measure to protect privacy, but may not be sufficient as a data security measure. Attackers could still cause damage by erasing the data or double-encrypting it to prevent access by authorized parties.

Learn more in our detailed guide to data privacy

Data Security vs. Cyber Security

Data security refers specifically to the protection of data, while cyber security is a broader term that encompasses the protection of any computing system, including networks, devices, and data. In other words, data security is a subset of cyber security.

The focus of data security is to ensure the confidentiality, integrity, and availability of data. It involves measures to protect data from unauthorized access and corruption throughout its lifecycle. On the other hand, cyber security involves protecting the entire digital environment from cyber threats.

Despite these differences, data security and cyber security are closely related. A robust cyber security strategy must include data security measures. Similarly, effective data security contributes to the overall cyber security posture of an organization.

Learn more in our detailed guide to cyber security

Data Security vs. Data Backup

Data security are two distinct yet interconnected facets of data management. Data security refers to the measures taken to prevent unauthorized access to databases and computer systems, data breaches, or any form of data corruption during a cyberattack. Data backup is the process of creating an exact copy of your data so that it can be restored in the event of data loss, which might result from a system crash, human error, or a natural disaster. Data backup is a preventive action that ensures data restoration in case of any mishap.

Data backup can actually protect your data from some cyber threats that seek to directly destroy or corrupt data, such as ransomware. But even aside from these threats, it is an important part of a data security strategy. If a system is compromised, having a backup can prevent data loss and help to recover faster. Popular data backup solutions include Veeam, Druva, and Acronis.

  • Learn more in our detailed guide to Veeam
  • Related product offering: backup server by Atlantic.net

Data Security Risks

Below are several common issues faced by organizations of all sizes as they attempt to secure sensitive data.

Accidental Exposure

A large percentage of data breaches are not the result of a malicious attack but are caused by negligent or accidental exposure of sensitive data. It is common for an organization’s employees to share, grant access to, lose, or mishandle valuable data, either by accident or because they are not aware of security policies.

This major problem can be addressed by employee training, but also by other measures, such as data loss prevention (DLP) technology and improved access controls.

Phishing and Other Social Engineering Attacks

Social engineering attacks are a primary vector used by attackers to access sensitive data. They involve manipulating or tricking individuals into providing private information or access to privileged accounts.

Phishing is a common form of social engineering. It involves messages that appear to be from a trusted source, but in fact are sent by an attacker. When victims comply, for example by providing private information or clicking a malicious link, attackers can compromise their device or gain access to a corporate network.

Insider Threats

Insider threats are employees who inadvertently or intentionally threaten the security of an organization’s data. There are three types of insider threats:

  • Non-malicious insider—these are users that can cause harm accidentally, via negligence, or because they are unaware of security procedures.
  • Malicious insider—these are users who actively attempt to steal data or cause harm to the organization for personal gain.
  • Compromised insider—these are users who are not aware that their accounts or credentials were compromised by an external attacker. The attacker can then perform malicious activity, pretending to be a legitimate user.

Ransomware

Ransomware is a major threat to data in companies of all sizes. Ransomware is malware that infects corporate devices and encrypts data, making it useless without the decryption key. Attackers display a ransom message asking for payment to release the key, but in many cases, even paying the ransom is ineffective and the data is lost.

Many types of ransomware can spread rapidly, and infect large parts of a corporate network. If an organization does not maintain regular backups, or if the ransomware manages to infect the backup servers, there may be no way to recover.

Learn more in the detailed guide to Ransomware protection

Data Loss in the Cloud

Many organizations are moving data to the cloud to facilitate easier sharing and collaboration. However, when data moves to the cloud, it is more difficult to control and prevent data loss. Users access data from personal devices and over unsecured networks. It is all too easy to share a file with unauthorized parties, either accidentally or maliciously.

SQL Injection

SQL injection (SQLi) is a common technique used by attackers to gain illicit access to databases, steal data, and perform unwanted operations. It works by adding malicious code to a seemingly innocent database query.

SQL injection manipulates SQL code by adding special characters to a user input that change the context of the query. The database expects to process a user input, but instead starts processing malicious code that advances the attacker’s goals. SQL injection can expose customer data, intellectual property, or give attackers administrative access to a database, which can have severe consequences.

SQL injection vulnerabilities are typically the result of insecure coding practices. It is relatively easy to prevent SQL injection if coders use secure mechanisms for accepting user inputs, which are available in all modern database systems.

Learn more in the detailed guide to SQL injection

Common Data Security Solutions and Techniques

There are several technologies and practices that can improve data security. No one technique can solve the problem, but by combining several of the techniques below, organizations can significantly improve their security posture.

Data Discovery and Classification

Modern IT environments store data on servers, endpoints, and cloud systems. Visibility over data flows is an important first step in understanding what data is at risk of being stolen or misused. To properly protect your data, you need to know the type of data, where it is, and what it is used for. Data discovery and classification tools can help.

Data detection is the basis for knowing what data you have. Data classification allows you to create scalable security solutions, by identifying which data is sensitive and needs to be secured. Data detection and classification solutions enable tagging files on endpoints, file servers, and cloud storage systems, letting you visualize data across the enterprise, to apply the appropriate security policies.

Data Masking

Data masking lets you create a synthetic version of your organizational data, which you can use for software testing, training, and other purposes that don’t require the real data. The goal is to protect data while providing a functional alternative when needed.

Data masking retains the data type, but changes the values. Data can be modified in a number of ways, including encryption, character shuffling, and character or word substitution. Whichever method you choose, you must change the values in a way that cannot be reverse-engineered.

Blog: The Benefits of Including Static Data Masking in Your Security Arsenal.

Incident Response

Incident response is a crucial aspect of data security. It involves preparing for, responding to, and learning from security incidents. An effective incident response plan can help you mitigate the damage of a data breach, recover from it quickly, and prevent it from happening again in the future.

At the heart of any incident response plan is a dedicated incident response team. This team should be made up of individuals with various skills and expertise, including IT, legal, PR, and HR. The team’s responsibilities should include detecting and analyzing security incidents, containing and eradicating threats, and communicating with stakeholders.

Learn more in the detailed guide to incident response

Vulnerability Assessment

Vulnerability assessment is the process of identifying, quantifying, and prioritizing vulnerabilities in your IT systems. It’s a proactive approach to data security that focuses on finding and fixing weaknesses before hackers can exploit them.

Vulnerability assessment tools can help you automate the process and provide detailed reports on your system’s vulnerabilities. They can also suggest remedial actions to address the identified vulnerabilities. Regular vulnerability assessments can go a long way in strengthening your data security posture.

Learn more in the detailed guide to vulnerability assessment

Identity Access Management

Identity and Access Management (IAM) is a business process, strategy, and technical framework that enables organizations to manage digital identities. IAM solutions allow IT administrators to control user access to sensitive information within an organization.

Systems used for IAM include single sign-on systems, two-factor authentication, multi-factor authentication, and privileged access management. These technologies enable the organization to securely store identity and profile data, and support governance, ensuring that the appropriate access policies are applied to each part of the infrastructure.

Data Encryption

Data encryption is a method of converting data from a readable format (plaintext) to an unreadable encoded format (ciphertext). Only after decrypting the encrypted data using the decryption key, the data can be read or processed.

In public-key cryptography techniques, there is no need to share the decryption key – the sender and recipient each have their own key, which are combined to perform the encryption operation. This is inherently more secure.

Data encryption can prevent hackers from accessing sensitive information. It is essential for most security strategies and is explicitly required by many compliance standards.

Data Loss Prevention (DLP)

To prevent data loss, organizations can use a number of safeguards, including backing up data to another location. Physical redundancy can help protect data from natural disasters, outages, or attacks on local servers. Redundancy can be performed within a local data center, or by replicating data to a remote site or cloud environment.

Beyond basic measures like backup, DLP software solutions can help protect organizational data. DLP software automatically analyzes content to identify sensitive data, enabling central control and enforcement of data protection policies, and alerting in real-time when it detects anomalous use of sensitive data, for example, large quantities of data copied outside the corporate network.

Learn more in the detailed guide to DLP

Governance, Risk, and Compliance (GRC)

GRC is a methodology that can help improve data security and compliance:

  • Governance creates controls and policies enforced throughout an organization to ensure compliance and data protection.
  • Risk involves assessing potential cybersecurity threats and ensuring the organization is prepared for them.
  • Compliance ensures organizational practices are in line with regulatory and industry standards when processing, accessing, and using data.

Learn more in the detailed guide to data governance

Password Hygiene

One of the simplest best practices for data security is ensuring users have unique, strong passwords. Without central management and enforcement, many users will use easily guessable passwords or use the same password for many different services. Password spraying and other brute force attacks can easily compromise accounts with weak passwords.

A simple measure is enforcing longer passwords and asking users to change passwords frequently. However, these measures are not enough, and organizations should consider multi-factor authentication (MFA) solutions that require users to identify themselves with a token or device they own, or via biometric means.

Another complementary solution is an enterprise password manager that stores employee passwords in encrypted form, reducing the burden of remembering passwords for multiple corporate systems, and making it easier to use stronger passwords. However, the password manager itself becomes a security vulnerability for the organization.

Learn more in the detailed guide to passwordless authentication

Authentication and Authorization

Organizations must put in place strong authentication methods, such as OAuth for web-based systems. It is highly recommended to enforce multi-factor authentication when any user, whether internal or external, requests sensitive or personal data.

In addition, organizations must have a clear authorization framework in place, which ensures that each user has exactly the access rights they need to perform a function or consume a service, and no more. Periodic reviews and automated tools should be used to clean up permissions and remove authorization for users who no longer need them.

Data Security Audits

The organization should perform security audits at least every few months. This identifies gaps and vulnerabilities across the organizations’ security posture. It is a good idea to perform the audit via a third-party expert, for example in a penetration testing model. However, it is also possible to perform a security audit in house. Most importantly, when the audit exposes security issues, the organization must devote time and resources to address and remediate them.

Cloud Security

In an enterprise environment, cloud security should be a critical part of the organization’s security strategy. An effective strategy  involves protecting cloud infrastructure, cloud workloads, and the data itself.

Cloud computing is composed of three types of environments: public clouds (e.g. infrastructure as a service (IaaS)), private clouds hosted by an individual organization, and hybrid clouds which are a mixture of both.

Cloud security technologies are commonly divided into two types – security solutions and best practices provided by the cloud provider, such as Amazon Web Services (AWS) and Microsoft Azure, and security tools procured and managed by the customer. In the public cloud, cloud security is a shared responsibility. The cloud provider takes responsibility for securing the infrastructure, and the customer is responsible for securing data and workloads.

Some traditional security tools can be used in a cloud environment, such as identity and access management (IAM), data loss prevention (DLP), web application firewalls, and intrusion detection and prevention (IDS/IPS).

In addition, there are several cloud-specific security tools:

  • Cloud access security brokers (CASBs) – a cloud resource deployed between cloud customers and cloud services, acting as a gatekeeper to enforce the organization’s security policies and improve visibility into cloud usage.
  • Cloud workload protection platforms (CWPPs) – protects cloud workloads like VMs, applications, and data consistently across hybrid environments.
  • Cloud security posture management (CSPM) – a platform that can monitor cloud systems for security and compliance problems, primarily cloud misconfigurations such as improper permissions or authentication. CSPM not only alerts about these problems but can also remediate many of them automatically.

Learn more in the detailed guides to:

See related product offering: Cloud backup server

IoT Security

The Internet of Things (IoT) is a vast network of interconnected devices, ranging from simple household items to complex industrial machines. As these devices increasingly become a part of our daily lives, securing them against cyber threats has become paramount. IoT security involves protecting these devices and the networks they are connected to, from unauthorized access, misuse, and damage.

With the proliferation of IoT devices, the surface for potential cyberattacks has expanded significantly. These devices often collect and transmit sensitive data, making them attractive targets for hackers. A compromised IoT device can serve as a gateway for attackers to infiltrate home networks or corporate systems, leading to data breaches, privacy violations, and significant financial losses.

Key strategies for enhancing IoT security:

  • Device authentication and authorization: Ensuring that only authorized devices can connect to a network is crucial. Implementing strong authentication mechanisms, such as digital certificates or biometric verification, can help in verifying the identity of devices and users.
  • Data encryption: Encrypting data transmitted to and from IoT devices protects it from being intercepted and read by unauthorized parties. Both data at rest and in transit should be encrypted using strong encryption algorithms.
  • Regular software updates: Manufacturers should provide regular firmware and software updates to address vulnerabilities and enhance security features. Users must be encouraged or, if possible, required to install these updates promptly.
  • Network segmentation: Separating IoT devices from critical network segments can limit the potential impact of a compromised device. This practice involves creating separate network zones for IoT devices, which are isolated from the rest of the network.

Learn more in the detailed guide to IoT security

Zero Trust

Zero trust is a security model introduced by Forrester analyst John Kindervag, which has been adopted by the US government, several technical standards bodies, and many of the world’s largest technology companies. The basic principle of zero trust is that no entity on a network should be trusted, regardless of whether it is outside or inside the network perimeter.

Zero trust has a special focus on data security, because data is the primary asset attackers are interested in. A zero trust architecture aims to protect data against insider and outside threats by continuously verifying all access attempts, and denying access by default.

Zero trust security mechanisms build multiple security layers around sensitive data—for example, they use microsegmentation to ensure sensitive assets on the network are isolated from other assets. In a true zero trust network, attackers have very limited access to sensitive data, and there are controls that can help detect and respond to any anomalous access to data.

Penetration Testing

Penetration testing, also known as pen testing, is a method of evaluating the security of a computer system or network by simulating an attack on it. The goal of pen testing is to identify vulnerabilities in the system that an attacker could exploit, and to determine the effectiveness of the system’s defenses against these vulnerabilities.

Penetration testers use a variety of tools and techniques to test the security of a system. These may include network scanners, vulnerability scanners, and other specialized software tools. They may also use manual methods such as social engineering or physical access to the system.

Penetration testing is an important part of an organization’s overall security strategy. It helps organizations identify and fix vulnerabilities before they can be exploited by malicious actors, and it can help organizations improve their defenses against future attacks.

Endpoint Security and Protection

Endpoint security and protection refers to technologies used to secure and protect devices (such as desktops, laptops, mobile devices, and servers) that connect to an organization’s network. The goal of endpoint security is to prevent unauthorized access, detect and respond to security threats, and ensure the confidentiality, integrity, and availability of sensitive data.

There are several common endpoint security solutions used by organizations to secure and protect their endpoints. Some of these tools include:

  • Endpoint detection and response (EDR): EDR tools are designed to detect and respond to advanced threats on endpoints. These tools use behavioral analysis and machine learning to identify suspicious activity and respond to threats in real-time.
  • Endpoint protection platform (EPP): EPP solutions provide antivirus and anti-malware protection, as well as other security features such as firewalls, intrusion prevention, and data encryption. These tools help prevent malware and other threats from infecting endpoints.
  • Extended detection and response (XDR): XDR solutions expand on EDR by integrating data from multiple sources, including endpoints, networks, and cloud environments. This provides a more comprehensive view of the organization’s security posture and enables more effective threat detection and response.
  • Managed detection and response (MDR): MDR solutions provide a combination of technology and human expertise to monitor and respond to security incidents. These solutions can detect and respond to threats more quickly and effectively than traditional endpoint security tools.

Learn more in the detailed guides to:

Database Security

Database security involves protecting database management systems such as Oracle, SQL Server, or MySQL, from unauthorized use and malicious cyberattacks.

The main types of databases organizations need to protect are:

The main elements protected by database security are:

  • The database management system (DBMS).
  • Data stored in the database.
  • Applications associated with the DBMS.
  • The physical or virtual database server and any underlying hardware.
  • Any computing and network infrastructure used to access the database.

A database security strategy involves tools, processes, and methodologies to securely configure and maintain security inside a database environment and protect databases from intrusion, misuse, and damage.

Big Data Security

Big data security involves practices and tools used to protect large datasets and data analysis processes. Big data commonly takes the form of financial logs, healthcare data, data lakes, archives, and business intelligence datasets. Within the big data perimeter there are three primary scenarios that require protection: inbound data transfers, outbound data transfers, and data at rest.

Big data security aims to prevent accidental and intentional breaches, leaks, losses, and exfiltration of large amounts of data. Let’s review popular big data services and see the main strategies for securing them.

AWS Big Data

AWS offers analytics solutions for big data implementations. There are various services AWS offers to automate data analysis, manipulate datasets, and derive insights, including Amazon Simple Storage Service (S3), Amazon Kinesis, Amazon Elastic Map/Reduce (EMR), and Amazon Glue.

AWS big data security best practices include:

  • Access policy options—use access policy options to manage access to your S3 resources.
  • Data encryption policy—use Amazon S3 and AWS KMS for encryption management.
  • Manage data with object tagging—categorize and manage S3 data assets using tags, and apply tags indicating sensitive data that requires special security measures.

Azure Big Data

Microsoft Azure cloud offers big data and analytics services that can process a high volume of structured and unstructured data. The platform offers elastic storage using Azure storage services, real-time analytics, database services, as well as machine learning and data engineering solutions.

Azure big data security best practices include:

  • Monitor as many processes as possible.
  • Leverage Azure Monitor and Log Analytics to gain visibility over data flows.
  • Define and enforce a security and privacy policy.
  • Leverage Azure services for backup, restore, and disaster recovery.

Google Cloud Big Data

The Google Cloud Platform offers multiple services that support big data storage and analysis. BigQuery is a high-performance SQL-compatible engine, which can perform analysis on large data volumes in seconds. Additional services include Dataflow, Dataproc, and Data Fusion.

Google Cloud big data security best practices include:

  • Define BigQuery access controls according to the least privilege principle.
  • Use policy tags or type-based classification to identify sensitive data.
  • Leverage column-level security to check if a user has the right to view specific data at query time.

Snowflake

Snowflake is a cloud data warehouse for enterprises, built for high performance big data analytics. The architecture of Snowflake physically separates compute and storage, while integrating them logically. Snowflake offers full relational database support and can work with structured and semi-structured data.

Snowflake security best practices include:

  • Define network and site access through IP allow/block lists.
  • Use SCIM to manage user identities and groups.
  • Leverage key pair authentication and rotation to improve client authentication security.
  • Enable multi-factor authentication.

Elasticsearch

Elasticsearch is an open-source full-text search and analytics engine that is highly scalable, allowing search and analytics on big data in real-time. It powers applications with complex search requirements. Elasticsearch provides a distributed system on top of Lucene StandardAnalyzer for indexing and automatic type prediction, and utilizes a JSON-based REST API to Lucene features.

Elasticsearch security best practices include:

  • Use strong passwords to protect access to search clusters
  • Encrypt all communications using SSL/TLS
  • Leverage role-based access control (RBAC)
  • Use IP filtering for client access
  • Turn on auditing and monitor logs on an regular basis

Learn more in the detailed guide to Elasticsearch

Splunk

Splunk is a software platform that indexes machine data, makes it searchable and turns it into actionable intelligence. It pulls log files from applications, servers, mobile devices, and websites, aggregates them, and provides rich analysis features.

Splunk security best practices include:

  • Preventing unauthorized access by defining RBAC, data encryption, and obfuscation of credentials.
  • Using SSL/TLS encryption for data ingestion and internal Splunk communications.
  • Hardening Splunk instances by ensuring they are physically secure and do not store secrets in plaintext.
  • Using audit events to track any changes to Splunk system configuration.

Learn more in the detailed guide to Splunk Architecture

Data Lake

A data lake is a centralized repository that allows you to store all your structured and unstructured data at any scale. It is a way to store a massive amount of data in its raw and granular form. Data lakes are often used to store data that will be used for big data analytics, machine learning, and other advanced analytics applications.

Data lakes are designed to store large amounts of data in a cost-effective and scalable way. They can store data from a variety of sources, such as log files, sensor data, and social media feeds, as well as structured data from relational databases. Data lakes can store data in its raw form, or it can be transformed and cleaned before it is stored.

Here are some common data lake security best practices:

  • Implement access controls: Data lakes should have strict access controls in place to ensure that only authorized users can access the data. This can include authentication, authorization, and data encryption.
  • Use data masking: Data masking is the process of obscuring sensitive data in a way that makes it unreadable to unauthorized users. This can help protect against data breaches and ensure that sensitive data is not accidentally leaked.
  • Monitor data access: It’s important to monitor who is accessing data in the data lake and what they are doing with it. This can help identify any potential security issues and prevent unauthorized access to sensitive data.
  • Implement data classification: Data classification is the process of categorizing data based on its sensitivity and value. This can help organizations understand which data is most important to protect and prioritize their security efforts accordingly.
  • Use data encryption: Data encryption is the process of encoding data so that it can only be accessed by those with the proper decryption key. Encrypting data in a data lake can help protect against data breaches and ensure that sensitive data remains secure.
  • Use data governance frameworks: Data governance frameworks provide a set of policies and procedures for managing data within an organization. They can help ensure that data is properly classified, protected, and used in an appropriate manner.
  • Regularly review and update security measures: It’s important to regularly review and update data lake security measures to ensure that they are effective and aligned with the latest security threats. This may include implementing new technologies or modifying existing security protocols.

Learn more in the detailed guide to data lake

Securing Data in Enterprise Applications

Enterprise applications power mission critical operations in organizations of all sizes. Enterprise application security aims to protect enterprise applications from external attacks, abuse of authority, and data theft.

Email Security

Email security is the process of ensuring the availability, integrity, and reliability of email communications by protecting them from cyber threats.

Technical standards bodies have recommended email security protocols including SSL/TLS, Sender Policy Framework (SPF), and DomainKeys Identified Mail (DKIM). These protocols are implemented by email clients and servers, including Microsoft Exchange and Google G Suite, to ensure secure delivery of emails. A secure email gateway helps organizations and individuals protect their email from a variety of threats, in addition to implementing security protocols.

ERP Security

Enterprise Resource Planning (ERP) is software designed to manage and integrate the functions of core business processes such as finance, human resources, supply chain, and inventory management into one system. ERP systems store highly sensitive information and are, by definition, a mission critical system.

ERP security is a broad set of measures designed to protect an ERP system from unauthorized access and ensure the accessibility and integrity of system data. The Information Systems Audit and Control Association (ISACA) recommends regularly performing security assessments of ERP systems, including software vulnerabilities, misconfigurations, separation of duties (SoD) conflicts, and compliance with vendor security recommendations.

DAM Security

Digital Asset Management (DAM) is a technology platform and business process for organizing, storing, and acquiring rich media and managing digital rights and licenses. Rich media assets include photos, music, videos, animations, podcasts, and other multimedia content. Data stored in DAM systems is sensitive because it often represents company IP, and is used in critical processes like sales, marketing, and delivery of media to viewers and web visitors.

Security best practices for DAM include:

  • Implement the principle of least privilege.
  • Use an allowlist for file destinations.
  • Use multi-factor authentication to control access by third parties.
  • Regularly review automation scripts, limit privileges of commands used, and control the automation process through logging and alerting.

Learn more in the detailed guide to Digital Asset Management (DAM)

CRM Security

Customer Relationship Management (CRM) is a combination of practices, strategies, and technologies that businesses use to manage and analyze customer interactions and data throughout the customer lifecycle. CRM data is highly sensitive because it can expose an organization’s most valuable asset—customer relationships. CRM data is also personally identifiable information (PII) and is subject to data privacy regulations.

Security best practices for CRM include:

  • Perform period IT risk assessment audits for CRM systems.
  • Perform CRM activity monitoring to identify unusual or suspicious usage.
  • Encourage CRM administrators to follow security best practices.
  • Educate CRM users on security best practices.
  • If you operate CRM as SaaS, perform due diligence of the SaaS provider’s security practices.

Data Security with Imperva

Imperva’s data security solution protects your data wherever it lives—on-premises, in the cloud, and in hybrid environments. It also provides security and IT teams with full visibility into how the data is being accessed, used, and moved around the organization.

Our comprehensive approach relies on multiple layers of protection, including:

  • Database firewall—blocks SQL injection and other threats, while evaluating for known vulnerabilities.
  • User rights management—monitors data access and activities of privileged users to identify excessive, inappropriate, and unused privileges.
  • Data masking and encryption—obfuscates sensitive data so it would be useless to the bad actor, even if somehow extracted.
  • Data loss prevention (DLP)—inspects data in motion, at rest on servers, in cloud storage, or on endpoint devices.
  • User behavior analytics—establishes baselines of data access behavior, uses machine learning to detect and alert on abnormal and potentially risky activity.
  • Data discovery and classification—reveals the location, volume, and context of data on-premises and in the cloud.
  • Database activity monitoring—monitors relational databases, data warehouses, big data, and mainframes to generate real-time alerts on policy violations.
  • Alert prioritization—Imperva uses AI and machine learning technology to look across the stream of security events and prioritize the ones that matter most.

See Additional Guides on Key Data Security Topics

Cyber Security

Authored by Imperva

Vulnerability Assessment

Authored by Imperva

Backup Server

Authored by Atlantic

DLP

Authored by Exabeam

Splunk Architecture

Authored by Cloudian

Data Lake

Authored by Cloudian

Object Storage

Authored by Cloudian

Veeam

Authored by Cloudian

EDR

Authored by Cynet

Endpoint Protection

Authored by Cynet

Endpoint Security

Authored by Cynet

Incident Response

Authored by Cynet

Ransomware Protection

Authored by Cynet

TSDB

Authored by EMQX

SQL Injection

Authored by Bright Security

Data Governance

Authored by NetApp

Data Migration

Authored by NetApp

Elasticsearch 

Authored by NetApp

Cloud Backup Services

Authored by NetApp

Digital Asset Management

Zero Trust Security

Authored by Cato

IoT Security

Authored by Sternum

Additional Data Security Resources