November 17, 2016 By Gregg Barrow 3 min read

Big data has become a critical business tool and a transformative force for enterprises across multiple industries and geographies. Vast amounts of data are now organized, available and ready to be analyzed, leading to advanced tactics and strategies that were previously impossible.

But prior to adopting a big data and analytics solution, business leaders should answer a few fundamental questions: How will big data solutions affect my organization’s security profile? What governance is needed? Are my existing technology solutions sufficient?

Big Data Solutions: Handy Tools and Juicy Targets

Data proliferation has led to greater amounts of data passing through networks. Through big data solutions, organizations can aggregate, index and analyze many types of data. These solutions allow organizations to find patterns and correlations in the data that can potentially reveal new business insights.

The ability to consume and process this data makes big data solutions appealing to many organizations. However, what makes these solutions attractive to business leaders also makes them attractive to bad actors. Think of big data as a digital library that provides organizations with an index to easily locate and access files. If a cybercriminal were to gain access to this index, he or she would have a direct line to the organization’s most sensitive information.

Big data environments are tempting targets, and defending them puts additional stress on the security personnel and systems tasked with data protection. In addition, the exponential growth of data is leading to challenges beyond security, including governance issues related to data accuracy, accessibility, completeness and consistency. Organizations can avoid feeling overwhelmed when implementing a big data solution by effectively managing and protecting their environments with an integrated governance and technology strategy.

Governance and Data Reservoirs

With respect to governance, big data solutions call for an agile approach to profiling and understanding data as it is ingested. This enables organizations to implement appropriate controls as the data is profiled without inhibiting the speed and flexibility of technologies.

Data lakes, for example, present a unique security challenge since they allow organizations to access and process many types of data within a distributed environment. To address these challenges, organizations can utilize enhanced, agile governance to better organize data lakes, creating what is known as a data reservoir.

Within a data reservoir, organizations ensure that data is properly cataloged and protected as it is ingested by the data lake. To do so, a data owner classifies the information sources that feed the reservoir and determines how the data should be managed, including access control, quality control, masking of sensitive data and data retention periods. No data should enter the reservoir without being cataloged upfront, which enables the immediate application of appropriate security controls. This agile governance approach should be applied across all big data solutions.

Technology Considerations

From a technology standpoint, organizations should leverage existing platforms where possible and supplement with additional tools as required. At a minimum, organizations should consider coverage of the following areas:

  • Configuration and vulnerability management: Are traditional security tools sufficient to protect and secure the data?
  • Identity and access management (IAM): Are the requests for sensitive information authorized and valid?
  • Network traffic encryption: Are attackers able to intercept and access the data in motion?
  • Metadata management: Is your metadata sufficient to let you know where and how that information came into existence? Is your data usable?
  • Encryption and masking for structured data and redaction for unstructured data: Are the sensitive information assets protected from unprivileged users?
  • Data activity monitoring: Are there unusual error patterns indicating a possible attack?
  • Blocking and prevention: Are there new requests for analysis that were not scheduled or known?

The effort to strike the right balance of governance and technology is a continuous process and will be unique to each organization. However, by focusing first on governance and fundamental security components, an enterprise will be well on its way to securing its big data solution.

Read the solution brief: Top tips for Big Data Security

More from Data Protection

The cybersecurity skills gap contributed to a $1.76 million increase in average breach costs

4 min read - Understaffing in cybersecurity — the "skills gap" — is driving up the cost of data breaches in recent years, according to a decade of reports by IBM.The 2024 IBM Data Breach Report found that more than half of breached organizations experienced severe security staffing shortages, a 26.2% increase from the previous year. They found this through a statistical analysis of the data gathered from in-depth interviews of more than 600 organizations that suffered data breaches in the prior year.The 2024…

How governance, risk and compliance (GRC) addresses growing data liability concerns

4 min read - In an era where businesses increasingly rely on artificial intelligence (AI) and advanced data capabilities, the effectiveness of IT services is more critical than ever. Yet despite the advancements in technology, business leaders are increasingly dissatisfied with their IT departments.According to a study by IBM's Institute for Business Value, confidence in the effectiveness of basic IT services among top executives has significantly declined. While AI promises transformational capabilities, particularly generative artificial intelligence (gen AI), the road to realizing these benefits…

Access control is going mobile — Is this the way forward?

2 min read - Last year, the highest volume of cyberattacks (30%) started in the same way: a cyber criminal using valid credentials to gain access. Even more concerning, the X-Force Threat Intelligence Index 2024 found that this method of attack increased by 71% from 2022. Researchers also discovered a 266% increase in infostealers to obtain credentials to use in an attack. Family members of privileged users are also sometimes victims.“These shifts suggest that threat actors have revalued credentials as a reliable and preferred…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today