Humans tend to process data in a visual format more readily than other communication forms, such as oral or text-based. This is true not only for processing, but also for assessing the accuracy of the information presented. Noteworthy studies indicate that visual data or imagery is the most trusted resource for consumers. Therefore, if you want your presentation to be understood and trusted, liberally use graphs, charts, and other visual representations.
Does this preference for format or type also extend to data security? Unencrypted data is easier to read and presents a “soft target” to those seeking unauthorized access to information. Consequently, virtually all data is encrypted during transfer through cyberspace. However, data sensitivity varies, which means that some data warrants higher security measures. Let’s take a look at data prioritization and then the best measures to ensure that adequate protection is afforded to the most important data.
Before determining how to best protect your data in the cloud, it is helpful to know what data is most at risk in cyberspace. From an operational perspective, most of an organization’s data can be considered sensitive or privileged to some degree. After all, it is typical for data to be inaccessible to all employees unless it is necessary to perform their job functions. From a security standpoint, the priority that should be placed on an organization’s data is more complex, layered, and based on privileges.
Access to data within an organization, whether at rest or in process, is determined by privilege.
Privilege is the level of access given to a user or user account within a computing system or network.
It follows that privileged data is available only to an authorized user of a privileged account. Although it is true that all accounts—for example, regular users or guests—have privileges associated with them, from an IT security vantage point a privileged account most often refers to accounts with “elevated” access or privileges. Types of privileged accounts include:
Obviously, access to restricted data for the privileged accounts above can pose significant risks to an organization’s ability to operate, and they require heightened security and dedicated oversight to avoid breaches in the cloud. The same is true for the credentials that provide access to these accounts. Therefore, good secrets management must be a major part of any successful privileged data security plan.
Protecting data in the cloud is best viewed as an identity and access management (IAM) issue. That is, data protection is achieved by controlling access to privileged accounts or privilege access management (PAM). And this is accomplished by securely managing the secrets that contain access information. Adopting a security plan that adheres to the following guidelines will enable you to best secure your data in the cloud.
Level up your Salesforce DevOps skills with our resource library.