Keeping Data Safe - The Complete Guide To Data Security
Keeping Data Safe - The Complete Guide To Data Security
–
The Complete Guide
to Data Security
TABLE OF CONTENTS
9. CONCLUSION 21
1
INTRODUCTION
TO DATA SECURITY
In this guide, we’ll look at how to develop 4. Categorize your data according
an effective data security strategy. The key to sensitivity.
elements to bear in mind are to: 5. Control access to data.
1. Management buy-in to support a security- 6. Use a trusted ETL partner to protect data
first culture. in transit and during transformation.
2. Create a data security policy. If you’d like to learn more about how Xplenty
3. Understand your compliance can protect data in transit, you can jump
requirements. ahead to chapter six.
2
DEVELOPING YOUR
DATA SECURITY POLICY
C
Confidentiality: Sensitive
information must be safe
from prying eyes.
I
Integrity: Data must
be free from corruption
or loss.
A
Availability: Data must always
be available for legitimate
business purposes.
Have you clarified the DSP with Have you clarified rules about
all major stakeholders, including permissions and access roles?
your executive team, I.T., H.R. (see chapter 5)
and compliance?
Data security practices are closely related to Here are a few of the primary laws you need
the legal concept of data protection. Under to be aware of:
data protection rules, organizations have an 1. General Data Protection Regulation (GDPR)
obligation to protect individual confidentiality.
This means that you have to keep data safe, 2. Bundesdatenschutzgesetz (BDSG)
prevent unauthorized access and only use 3. Health Insurance Portability
data for legitimate purposes. and Accountability Act (HIPAA)
Data protection laws vary across countries 4. California Consumer Privacy Act (CCPA)
and even between states. However, many
5. Australian Privacy Act of 1988
laws have an extra-territorial effect, which
means that authorities will punish foreign 6. Lei Geral de Proteção de Dados (LGPD)
companies for breaches.
1 2
4 3
6
5
General Data Protection Regulation California Consumer Privacy Act
(GDPR) (CCPA)
Primary jurisdiction: European Union Primary jurisdiction: California
Data covered: Any data that could potentially Data covered: Personal Identifiable
identify an E.U. citizen Information (PII) of Californian consumers
Website: https://gdpr-info.eu/ Website: https://oag.ca.gov/privacy/ccpa
Notes: GDPR is one of the most stringent Notes: CCPA grants consumers more power
data protection regimes in the world. over their PII, including the right to know
Companies must allow users to opt out what’s on file, the right to request deletion
of data collection, and they can only and the right to opt out of the sale of PII. In
capture PII for essential business purposes. the event of a compliance breach, consumers
Organizations face severe restrictions on can directly sue the company. This law is
transporting PII out of Europe, even when currently unique in the U.S., but it is the
using a third party service. The E.U. has template for forthcoming legislation in other
successfully fined a number of American firms states 6.
for GDPR breaches, including Google 5.
Data classification hinges on one question: Companies can use this system to create a
What would be the consequences if this data classification taxonomy for data. Some of the
leaked? more common systems use Public, Internal,
Confidential, and Restricted. You can create
If you consider this question in terms of
further compartments within these general
your company’s data, you see three main
accepted categories as well.
categories:
• High Impact
This category includes personal
information that could breach data
protection laws or expose people to
the risk of identity fraud. It also includes
sensitive corporate documents such
as confidential reports and strategy
documents.
• Moderate Impact
This includes information that you’d
rather keep private, but which poses no
immediate risk. For example, B2B invoices
and supplier agreements may fall into this
category, as well as personal information
that doesn’t identify an individual.
• Low Impact
This information won’t hurt your business
if leaked, and much of it may already be
available to the public. Press releases,
white papers, and non-proprietary
corporate information all fall into this
category.
How to classify personal data Expanding your data classifications
Most privacy laws define PII as information The system above describes an outcome-
that could potentially reveal someone’s based data classification system. Some
identity. Clearly, this includes unique organizations may choose to add extra
identifiers such as: layers of detail to create a more expressive
taxonomy that describes multiple types of risk.
• Name
Some of the extra factors to consider are:
• Address
• Frequency of movement
• Date of birth
Data is at risk when it keeps moving
• Login credentials between locations. Conversely, the
risk decreases when the data remains
• Social security
encrypted in a secure repository and
• IP address rarely moves.
Local ETL Install Purchase an ETL solution and Control over configuration Difficult to upscale and may
install it on your on-premise without needing to develop the not integrate securely with
infrastructure software from scratch cloud-based warehouses
Cloud ETL A third-party service manages Simple, no-code integration Works best with other cloud
your ETL needs across the with cloud and on-premise services, such as AWS,
cloud services, with a trusted partner Salesforce, and cloud-based
guaranteeing security analytics tools
In a global, digital world, the most important Data security isn’t easy. Cyberthreats are
currency for any business is trust. constantly evolving, and employees struggle
to keep up with ever-changing protocols. The
Trust is something you earn over many years
new normal of remote work has added another
by diligently safeguarding your customer’s
layer of risk to an already challenging world.
personal data. They trust you with a lot of
essential information – their address, their This is why it’s more important than ever to
payment details, their preferences, even their get data security right. It starts with strategy,
biometric data. with people and with education. But the most
important part is getting the infrastructure
But trust is something you can lose in an
right. A good ETL vendor can help you build
instant. All it takes is one lapse in data
a secure data pipeline that keeps sensitive
security, and nobody will ever trust you
information out of the wrong hands. Your
again. They’ll switch to a rival that takes data
customers will rest easy knowing their
security seriously, someone that always
personal data is safe.
protects customer confidentiality.
Get Started