As an IT leader in charge of database engineering and database audit and compliance for a Fortune 50 American company with millions of customers, I know that there are potential risks and vulnerabilities inherent in every aspect of data management. Companies like ours store and change terabytes of operational and customer data on a constant basis. There are databases that host sensitive data. There are numerous levels of access to the data. The data is replicated in many forms. Therefore, it is increasingly difficult to manage the volume, complexity and security of all this data.

With all this data and the responsibility to keep it viable, safe and secure, there are plenty of reasons to worry. Here are three potential scenarios that top the list of things that keep me up thinking about work when I should be in a peaceful slumber.

A Massive Public Data Breach

A breach of protected data is likely the ultimate concern for anyone who has responsibility for keeping data secure as part of their job, whether they are a database administrator, a chief information officer, or anyone in between. This is likely because such exposure could result in severe damage, including financial penalties, unplanned compensation, compromised brand reputation and even a personal feeling of failure.

A data breach is probably one of the most difficult things to prevent because many people potentially have a legitimate need to access data as part of their job. They may need to access it for customers, they may need to analyze it for data science or they may need to apply business logic to it.

Here are some suggestions for helping to mitigate these access risks:

  1. Implement strong access controls.
  2. Identify, classify and prioritize sensitive data, including payment card data, protected health information, personally identifiable information and other data types.
  3. Recertify access regularly.

Watch the on-demand webinar for a panel discussion with our expert IBM Security Guardium Champions to hear how they are using Guardium to address their data security challenges.

Register for the on-demand webinar replay

Accidental Deletion or Editing

The next thought that keeps me wide awake is the idea of a developer with inappropriate access in production inadvertently deleting or changing the wrong data. Data integrity and recoverability are essential for any data steward. Business applications are designed to update data in a manner consistent with normal operation. However, manual manipulation of the data in a production database is all too common. This could be a result of poor system design or the inheritance of a legacy system or process with antiquated capabilities.

When manual attempts to ‘fix’ data in a production database occur, the likelihood of human error rises. If you don’t enforce separation of duties and if application developers have elevated access in production, a simple alter or delete with an improper predicate can result in a very unexpected and inappropriate change.

Here are some suggestions for helping to mitigate these risks:

  1. Implement a thoughtful and reliable backup strategy.
  2. Utilize tools that will aid in the analysis and recovery of changed data (like the Log Analysis Tool, IBM Security Guardium).

How to Manage the Move to the Cloud

Data is moving to the cloud, and we can’t keep pace with location tracking and risk management. It was not too long ago that the three-year plans in major IT organizations were super conservative with any movement of company assets to the public cloud. That strategy seems to be changing rapidly. In a large organization where a move to the cloud is growing, the assets may be difficult to trace. There could even be multiple initiatives and programs led by different areas that don’t necessarily align.

You may have an infrastructure cloud enablement team, or a third-party consulting initiative, or business areas may be leading their own efforts to move assets to the cloud. How do you protect data if you don’t have a complete view of what is where?

Here are some suggestions for managing the move to the cloud from a data perspective:

  1. Invest in a robust application and asset inventory system.
  2. Classify the data moving to the cloud and implement the appropriate protection and controls.
  3. Implement a consistent database vulnerability management tool.

At the end of the day, investment in the proper process and tooling will help you build a world-class IT organization where data security and protection are paramount — and where sleepless nights are few and far between.

Watch the on-demand webinar for a panel discussion with our expert IBM Security Guardium Champions to hear how they are using Guardium to address their data security challenges.

Register for the on-demand webinar replay

More from CISO

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Boardroom cyber expertise comes under scrutiny

3 min read - Why are companies concerned about cybersecurity? Some of the main drivers are data protection, compliance, risk management and ensuring business continuity. None of these are minor issues. Then why do board members frequently keep their distance when it comes to cyber concerns?A report released last year showed that just 5% of CISOs reported directly to the CEO. This was actually down from 8% in 2022 and 11% in 2021. But even if board members don’t want to get too close…

The CISO’s guide to accelerating quantum-safe readiness

3 min read - Quantum computing presents both opportunities and challenges for the modern enterprise. While quantum computers are expected to help solve some of the world’s most complex problems, they also pose a risk to traditional cryptographic systems, particularly public-key encryption. To ensure their organization’s data remains secure now and in the future, chief information security officers (CISOs) should educate themselves about quantum computing, proactively address the coming quantum risks to cybersecurity and work to establish cryptographic agility in their enterprise.A future cryptographically…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today