BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Data Governance

Posted July 15, 2011    Morgan Holm

Hi my name is Morgan Holm and I am the director of product management. For my first blog post I will focus on a hot button topic for many of our customers and prospects, data governance. A significant portion of the data held by many organizations is in the form of unstructured data in files. There has been explosive growth in the amount of data organizations need to retain largely driven by regulatory compliance. One of our customers has over 2 petabytes worth of data today and as they continue to acquire other organizations, this amount will only increase going forward. This post will focus on some of the challenges that data stored in files poses to data governance initiatives.

Once an organization puts into place the rules around data governance (policies, compliance requirements, data definitions, organizational rules) there needs to be both accountability and proof of compliance. With file system resources this can prove very difficult if not impossible attempting to leverage native file system auditing to understand what changes are occurring on the file servers in the environment. The first big challenge is that you need to ensure the appropriate auditing is set and stays set on all of the servers in the environment to even capture the information. The next issue is that these event logs are then stored on each individual server. There are simply not enough resources or time for organizations to go to each server to analyze the information. Given the volume of events that could be generated, most likely by the time someone goes to look for the events on the server, the logs will have rolled over wiping out the events they were interested in.

BeyondTrust is addressing the need to understand file system changes with our upcoming PowerBroker Auditor for File System module. This solution is not dependant on the native event logs so there no need to manage native auditing or worry if a log is cleared before it could be collected. The file system events are forwarded to a SQL database as they happen. Centralization of the event data provides the means to view the changes or have schedule reports sent to data owners and managers of who is making what changes. This ensures that the data owners and managers know what is happening and can quickly resolve issues to conform to their data governance rules. Understanding changes to the file system is critical to maintaining data governance. Proving and maintaining compliance along with accountability are critical aspects to ensure the rules defined for data governance are continually enforced. Understanding the complete picture of file system permissions to minimize your risk is also critical, but I will save that for another post.

Tags:
, ,

Leave a Reply

Additional articles

webinar_ondemand

On Demand Webinar – Why You Still Suck at Patching

Posted March 27, 2015    Lindsay Marsh

On Demand Webinar: Dave Shackleford recounts some of his personal experiences in patch management failure, and breaks down the most critical issues holding many teams back from patching more effectively.

Tags:
,
dave-shackleford-headshot

Why You Still Suck at Patching…and How to Turn Your Life Around

Posted March 25, 2015    Dave Shackleford

Live webinar | March 26, 2015 | 10am PT/1pm ET | Dave Shackleford, SANS Instructor | Why You Still Suck at Patching…and How to Turn Your Life Around

Tags:
, ,
infographic

Privilege Gone Wild 2: Over 25% of Organizations Have No Privileged Access Controls

Posted March 24, 2015    Scott Lang

BeyondTrust recently conducted a survey, with over 700 respondents, to explore how organizations view the risk of misuse from privileged account misuse, as well as trends in addressing and mitigating those risks.

Tags:
,