BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Data Governance

Post by Morgan Holm July 15, 2011

Hi my name is Morgan Holm and I am the director of product management. For my first blog post I will focus on a hot button topic for many of our customers and prospects, data governance. A significant portion of the data held by many organizations is in the form of unstructured data in files. There has been explosive growth in the amount of data organizations need to retain largely driven by regulatory compliance. One of our customers has over 2 petabytes worth of data today and as they continue to acquire other organizations, this amount will only increase going forward. This post will focus on some of the challenges that data stored in files poses to data governance initiatives.

Once an organization puts into place the rules around data governance (policies, compliance requirements, data definitions, organizational rules) there needs to be both accountability and proof of compliance. With file system resources this can prove very difficult if not impossible attempting to leverage native file system auditing to understand what changes are occurring on the file servers in the environment. The first big challenge is that you need to ensure the appropriate auditing is set and stays set on all of the servers in the environment to even capture the information. The next issue is that these event logs are then stored on each individual server. There are simply not enough resources or time for organizations to go to each server to analyze the information. Given the volume of events that could be generated, most likely by the time someone goes to look for the events on the server, the logs will have rolled over wiping out the events they were interested in.

BeyondTrust is addressing the need to understand file system changes with our upcoming PowerBroker Auditor for File System module. This solution is not dependant on the native event logs so there no need to manage native auditing or worry if a log is cleared before it could be collected. The file system events are forwarded to a SQL database as they happen. Centralization of the event data provides the means to view the changes or have schedule reports sent to data owners and managers of who is making what changes. This ensures that the data owners and managers know what is happening and can quickly resolve issues to conform to their data governance rules. Understanding changes to the file system is critical to maintaining data governance. Proving and maintaining compliance along with accountability are critical aspects to ensure the rules defined for data governance are continually enforced. Understanding the complete picture of file system permissions to minimize your risk is also critical, but I will save that for another post.

Tags:
, ,

Leave a Reply

Additional articles

BI-Qualys-Connector-IMG1

Getting More Value from QualysGuard Vulnerability Data with BeyondInsight v5.1

If your vulnerability assessment scans can’t produce meaningful and actionable reports, performing a scan does no good for anyone. If you’ve read my other blog posts, you know I have no qualms about stating that BeyondTrust provides the best vulnerability reporting in the industry. Ask your favorite analyst and they’ll tend to agree. Of course,…

Post by Morey Haber April 18, 2014
Tags:
, , , , , , , ,
insider-threat-fed

Mitigating Inside Threats to U.S. Federal IT Environments

Recent high-profile cases have increased the perceived risks that go along with disclosure and usage of confidential information. One of the most difficult security threats to mitigate is an attack from the inside. When an over-privileged user, such as an unhappy current or former employee, contractor, or consultant, begins navigating your network, how will you…

Post by BeyondTrust Software April 17, 2014
Tags:
, , , , ,

Are you a Target? Investigating Security Breaches with Kevin Johnson

Last week, over 1,000 IT security professionals watched as Kevin Johnson, CEO of Secure Ideas, presented his expert opinion on lessons learned from recent, high-profile retail breaches. Here’s a summary of key takeaways from the webcast plus an on-demand recording of the full, 60-minute presentation. Understanding the “why” behind attacks According to Kevin, the primary…

Post by Chris Burd April 17, 2014
Tags:
, , , , ,