Key concepts
Common processes in a data-centric security model include: * Discover: the ability to know what data is stored where including sensitive information. * Manage: the ability to define access policies that will determine if certain data is accessible, editable, or blocked from specific users, or locations. * Protect: the ability to defend against data loss or unauthorized use of data and prevent sensitive data from being sent to unauthorized users or locations. * Monitor: the constant monitoring of data usage to identify meaningful deviations from normal behavior that would point to possible malicious intent. From a technical point of view, information (data)-centric security relies on the implementation of the following: * Information (data) that is self-describing and defending. * Policies and controls that account for business context. * Information that remains protected as it moves in and out of applications and storage systems, and changing business context. * Policies that work consistently through the different data management technologies and defensive layers implemented.Technology
Data access controls and policies
DataEncryption
Encryption is a proven data-centric technique to address the risk of data theft in smartphones, laptops, desktops and even servers, including the cloud. One limitation is that encryption is not always effective once a network intrusion has occurred and cybercriminals operate with stolen valid user credentials.Data masking
Data Masking is the process of hiding specific data within a database table or cell to ensure that data security is maintained and that sensitive information is not exposed to unauthorized personnel. This may include masking the data from users, developers, third-party and outsourcing vendors, etc. Data masking can be achieved multiple ways: by duplicating data to eliminate the subset of the data that needs to be hidden, or by obscuring the data dynamically as users perform requests.Auditing
Monitoring all activity at the data layer is a key component of a data-centric security strategy. It provides visibility into the types of actions that users and tools have requested and been authorized to on specific data elements. Continuous monitoring at the data layer combined with precise access control can contribute significantly to the real-time detection of data breaches, limits the damages inflicted by a breach and can even stop the intrusion if proper controls are in place. A 2016 survey shows that most organizations still do not assess database activity continuously and lack the capability to identify database breaches in a timely fashion.Privacy-enhancing technologies
A privacy-enhancing technology (PET) is a method of protecting data. PETs allow online users to protect the privacy of their personally identifiable information (PII) provided to and handled by services or applications. PETs use techniques to minimize possession of personal data without losing the functionality of an information system.Cloud computing
Cloud computing is an evolving paradigm with tremendous momentum, but its unique aspects exacerbate security and privacy challenges. Heterogeneity and diversity of cloud services and environments demand fine-grained access control policies and services that should be flexible enough to capture dynamic, context, or attribute-based access requirements and data protection.See also
* Data masking * Data security * Defense in depth (computing) * Information security * Information security policies * Raz-LeeReferences
{{Reflist Computer security Big data