Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Database
    • Database

    Nine Best Practices for Keeping Bad Actors Out of a Database

    By
    Chris Preimesberger
    -
    April 16, 2018
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Nine Best Practices for Keeping Bad Actors Out of a Database

      Nine Best Practices for Keeping Bad Actors Out of a Database

      CIOs are facing a data security problem that continues to snowball. Cyber-attacks show no signs of stopping, forcing organizations to scramble to figure out how to best protect mission-critical data, particularly when it’s spread across silos in disconnected databases. And it’s not enough to protect from external threats with perimeter security; CIOs also need to handle the increasing number of insider threats. At the same time that they are being pressed to lock down their data, they are also under pressure to drive business innovation by sharing and leveraging their data at a scale never seen before. Locking up the data and never sharing it would bring innovation to a halt. In this eWEEK slide show, based on industry information from Joe Pasqua, executive vice president of products at enterprise NoSQL database provider MarkLogic, we prescribe best practices for securing data without hindering data sharing.

      2Know What You’re Protecting

      Know What You're Protecting

      The first step to ensuring the security of your data is knowing what data needs to be secured, MarkLogic Executive Vice President Joe Pasqua said. Organizations need to catalog and understand all the data they have, whether in the cloud or on-premises. This includes everything from internet of things (IoT) data, click streams and other big data to the most sensitive personally identifiable information (PII).

      3Know the Value of What You’re Protecting

      Know the Value of What You're Protecting

      Once an organization knows what data it has in its care, it needs to determine its value—and its sensitivity. Or, to put another way, what would the consequences be if certain data was lost, stolen or misused? Only then can appropriate security and access control measures be put into place that balance risk, consequences and value.

      4Know Who Has Access to the Data and Who Needs Access

      Know Who Has Access to the Data and Who Needs Access

      Do the right people have access to the right data for the right amount of time? What if their roles change? What if the nature of the data or governing regulations change? This information is key to appropriately assigning (and, in some cases, revoking) access. It’s also important to ensuring that maximum value can be derived from the data. Yes, you need to keep the wrong people out, but you also need to let the right people in. 

      5Take a Multi-Model Approach

      Take a Multi-Model Approach

      Many database systems can only store a single kind of data. That means data needs to be split up and stored across many different systems. This makes the security problem much harder. Taking a multi-model approach to database security enables organizations to more effectively govern data, managing high-level business concepts from multiple silos and materializing them as entities and relationships. By keeping data and metadata together, details and relationships between data can be effectively tracked over time.

      6Focus on Standards

      Focus on Standards

      You aren’t starting from scratch. There are strong standards that provide a security benchmark and ensure that all players are on the same page. The Common Criteria Certification, for example, mandates strict access controls and authentication that work with the organization’s existing IT infrastructure. Ensure that your software suppliers are also following these standards.

      7Implement Anonymization Capabilities

      Implement Anonymization Capabilities

      Anonymization enables enterprises to safely share the right views of data with the right audiences for the right amount of time by removing, replacing or blocking out sensitive information in order to prevent leakage or the violation of laws and regulations. There are different types of anonymization that suit different circumstances. Use a system that provides powerful options and a way to customize the anonymization.

      8Get Granular

      Get Granular

      Don’t take an all-or-nothing approach. This limits the usefulness of your data by restricting it based on the most sensitive data it contains. For example, an employee record (or document) may have lots of data that is visible by several different roles but some that is much more sensitive. If access is determined at the record level, then access to the entire record would be blocked because of just one or two sensitive items. Use a system that allows you to specify, in a very flexible, very granular way, which items are visible to which roles. Once again, this enables more sharing with less risk.

      9Use an External Key Management System

      Use an External Key Management System

      Encrypting your data at rest is a must these days, especially as organizations move to the cloud. One of the most crucial parts of any encryption system is how it manages keys, and the best practice is to use an external, third-party key management system (KMS) that is deployed and managed independently from other systems. An external KMS securely stores keys and provides them on demand to authorized systems. This separation of concerns enables an additional level of security and consistency across all systems performing encryption.   

      10Put It All Together With Comprehensive and Flexible Data Policies

      Put It All Together With Comprehensive and Flexible Data Policies

      To protect against data breaches and insider threats while at the same time having the ability to easily and securely share information, organizations must implement strong, flexible and comprehensive data policies across the entire organization. These policies are often based on key metadata about the information being stored such as: where the data came from, who touched it last, how it can be used, whether it is bound to a regulation, and which employees are allowed to see it and for how long. It is impossible to implement business-level policies without knowing these sorts of facts about your data. Most database systems don’t do this, which puts the burden back on the organization.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.