As an IT leader in charge of database engineering and database audit and compliance for a Fortune 50 American company with millions of customers, I know that there are potential risks and vulnerabilities inherent in every aspect of data management. Companies like ours store and change terabytes of operational and customer data on a constant basis. There are databases that host sensitive data. There are numerous levels of access to the data. The data is replicated in many forms. Therefore, it is increasingly difficult to manage the volume, complexity and security of all this data.

With all this data and the responsibility to keep it viable, safe and secure, there are plenty of reasons to worry. Here are three potential scenarios that top the list of things that keep me up thinking about work when I should be in a peaceful slumber.

A Massive Public Data Breach

A breach of protected data is likely the ultimate concern for anyone who has responsibility for keeping data secure as part of their job, whether they are a database administrator, a chief information officer, or anyone in between. This is likely because such exposure could result in severe damage, including financial penalties, unplanned compensation, compromised brand reputation and even a personal feeling of failure.

A data breach is probably one of the most difficult things to prevent because many people potentially have a legitimate need to access data as part of their job. They may need to access it for customers, they may need to analyze it for data science or they may need to apply business logic to it.

Here are some suggestions for helping to mitigate these access risks:

  1. Implement strong access controls.
  2. Identify, classify and prioritize sensitive data, including payment card data, protected health information, personally identifiable information and other data types.
  3. Recertify access regularly.

Watch the on-demand webinar for a panel discussion with our expert IBM Security Guardium Champions to hear how they are using Guardium to address their data security challenges.

Register for the on-demand webinar replay

Accidental Deletion or Editing

The next thought that keeps me wide awake is the idea of a developer with inappropriate access in production inadvertently deleting or changing the wrong data. Data integrity and recoverability are essential for any data steward. Business applications are designed to update data in a manner consistent with normal operation. However, manual manipulation of the data in a production database is all too common. This could be a result of poor system design or the inheritance of a legacy system or process with antiquated capabilities.

When manual attempts to ‘fix’ data in a production database occur, the likelihood of human error rises. If you don’t enforce separation of duties and if application developers have elevated access in production, a simple alter or delete with an improper predicate can result in a very unexpected and inappropriate change.

Here are some suggestions for helping to mitigate these risks:

  1. Implement a thoughtful and reliable backup strategy.
  2. Utilize tools that will aid in the analysis and recovery of changed data (like the Log Analysis Tool, IBM Security Guardium).

How to Manage the Move to the Cloud

Data is moving to the cloud, and we can’t keep pace with location tracking and risk management. It was not too long ago that the three-year plans in major IT organizations were super conservative with any movement of company assets to the public cloud. That strategy seems to be changing rapidly. In a large organization where a move to the cloud is growing, the assets may be difficult to trace. There could even be multiple initiatives and programs led by different areas that don’t necessarily align.

You may have an infrastructure cloud enablement team, or a third-party consulting initiative, or business areas may be leading their own efforts to move assets to the cloud. How do you protect data if you don’t have a complete view of what is where?

Here are some suggestions for managing the move to the cloud from a data perspective:

  1. Invest in a robust application and asset inventory system.
  2. Classify the data moving to the cloud and implement the appropriate protection and controls.
  3. Implement a consistent database vulnerability management tool.

At the end of the day, investment in the proper process and tooling will help you build a world-class IT organization where data security and protection are paramount — and where sleepless nights are few and far between.

Watch the on-demand webinar for a panel discussion with our expert IBM Security Guardium Champions to hear how they are using Guardium to address their data security challenges.

Register for the on-demand webinar replay

More from CISO

Emotional Blowback: Dealing With Post-Incident Stress

Cyberattacks are on the rise as adversaries find new ways of creating chaos and increasing profits. Attacks evolve constantly and often involve real-world consequences. The growing criminal Software-as-a-Service enterprise puts ready-made tools in the hands of threat actors who can use them against the software supply chain and other critical systems. And then there's the threat of nation-state attacks, with major incidents reported every month and no sign of them slowing. Amidst these growing concerns, cybersecurity professionals continue to report…

Moving at the Speed of Business — Challenging Our Assumptions About Cybersecurity

The traditional narrative for cybersecurity has been about limited visibility and operational constraints — not business opportunities. These conversations are grounded in various assumptions, such as limited budgets, scarce resources, skills being at a premium, the attack surface growing, and increased complexity. For years, conventional thinking has been that cybersecurity costs a lot, takes a long time, and is more of a cost center than an enabler of growth. In our upcoming paper, Prosper in the Cyber Economy, published by…

Reporting Healthcare Cyber Incidents Under New CIRCIA Rules

Numerous high-profile cybersecurity events in recent years, such as the Colonial Pipeline and SolarWinds attacks, spurred the US government to implement new legislation. In response to the growing threat, President Biden signed the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) in March 2022.While the law has passed, many healthcare organizations remain uncertain about how it will directly affect them. If your organization has questions about what steps to take and what the law means for your processes,…

Charles Henderson’s Cybersecurity Awareness Month Content Roundup

In some parts of the world during October, we have Halloween, which conjures the specter of imagined monsters lurking in the dark. Simultaneously, October is Cybersecurity Awareness Month, which evokes the specter of threats lurking behind our screens. Bombarded with horror stories about data breaches, ransomware, and malware, everyone’s suddenly in the latest cybersecurity trends and data, and the intricacies of their organization’s incident response plan. What does all this fear and uncertainty stem from? It’s the unknowns. Who might…