Data security and privacy, Part 2

3
Man using computer at night, contemplating his company's data privacy and security policies
Read how SAS for Personal Data Protection can identify, govern and protect personal data

In Part 1 of this series, I defined data security and privacy, explaining that data privacy is the act of allowing access and use of any data – based on privacy requirements, guidelines or procedures. In Part 2, I'll focus on data security.

I see data security as the physical act of implementing the data privacy policies, procedures or guidelines, and securing the data over time. This, of course, includes reporting and a variety of auditing activities that are required by laws like the General Data Protection Regulation.

You may have experienced the continued demand for analysis of data on other platforms (Hadoop, cloud, MongoDB, etc.). This requires you to think about the flow of the data within your environment and how it is used. Each platform can experience its own types of security issues. For example, let's say you're going to stream live data from an online application onto your big data platform for immediate analysis. This data also ends up in the data warehouse further down the data flow from the application system. Besides the source system, you now have two other systems to secure – the big data platform and the data warehouse. Chances are these are all different database management systems, which may not necessarily have the same mechanisms for securing data.

Secure the data – everywhere

Securing data on your big data platform may require you to create views for access. Not a bad way to secure access to the data. However, what really stops a process from reading the data on the big platform and propagating the data to another platform? For that matter, the same issue can happen in a relational database or any other database. This is the reason we have to know how, where and when the data is used, and who used it – and be able to report on it.

There is a certain amount of automation that you can apply to auditing the data on any of these platforms. Seeing who or what process READS the data may be the most troublesome. But without the right people – who understand access patterns and have the authority to escalate issues – the process won't be as effective as you thought it would be upon implementation.

With the data secure at the lowest level (the database), how do you allow people to update and secure their own data? For example, what if one of the requirements is to allow me to update my own data or decide who gets access to my data? Designing this type of data access will not be an easy task. I would suggest that you don’t allow direct updates to the enterprise database directly, but instead allow updates to an alternate database. This enables you to update the enterprise database later, after validation and rules have been applied to consumers' data access requests. Another option would be to copy the data that's going to be updated to another database before allowing the update process to occur. Either way, you have to be able to report on how, where and when the data got changed, updated, accessed or copied – and who was involved in those processes.

Obviously, it's important to have a process to help govern your data – but you also need to make sure the right people are involved. Those people should understand the importance of identifying the data and data flows, as well as protecting the data. You need a team that understands today’s needs while always keeping future needs in mind. Data security and privacy will continue to be an issue in our fast-moving world. It's up to us to keep the data that has been entrusted to us as secure and private as possible.

Read a paper to learn how SAS Data Management can help protect your data
Share

About Author

Joyce Norris-Montanari

President of DBTech Solutions, Inc

Joyce Norris-Montanari, CBIP-CDMP, is president of DBTech Solutions, Inc. Joyce advises clients on all aspects of architectural integration, business intelligence and data management. Joyce advises clients about technology, including tools like ETL, profiling, database, quality and metadata. Joyce speaks frequently at data warehouse conferences and is a contributor to several trade publications. She co-authored Data Warehousing and E-Business (Wiley & Sons) with William H. Inmon and others. Joyce has managed and implemented data integrations, data warehouses and operational data stores in industries like education, pharmaceutical, restaurants, telecommunications, government, health care, financial, oil and gas, insurance, research and development and retail. She can be reached at jmontanari@earthlink.net.

Related Posts

3 Comments

  1. Thanks Joyce for your blog posts on data security and privacy. Your closing statement is an important one... "It's up to us to keep the data that has been entrusted to us as secure and private as possible." With auditing and adherence to data-related regulations on the rise, how do you know it's secure if you don't test it? We've recently been presenting in Europe how we can help SAS customers with three aspects of testing: Implementation testing – how has it been secured?; Outcome testing – what is the effective result of the implementation? and Best practice testing – how well does the implementation align with best practices such as the well-known Golden Rules? https://communities.sas.com/t5/Nordic-Events-and-Presentations/FANS-Conference-2018-Testing-SAS-9-Metadata-Security/ba-p/467118

    • Cindy Turner
      Cindy Turner on

      You are SO right! It has to be tested, and those tests need to be executed more than once. Maybe consider hourly, daily, weekly or monthly depending on the data you are addressing.

      Thank you for the comment, Michelle.

      • My pleasure Cindy and we agree with you with regular testing... the Metacoda metadata security testing can be scheduled as frequently as you want to ensure data security is adhered to and alerts sent when changes have been made. It's an area where you can't afford to "set and forget"...

Leave A Reply

Back to Top