This story is from October 18, 2023
How to get ready for this new era of data protection
Data protection is becoming crucial for organisations. Governments are also stepping in to ensure organisations put in place necessary safeguards. In India, one such instance is the DPDP (Digital Personal Data Protection) Act passed by Parliament in August. All of these require organisations to reevaluate their data security and privacy strategies.
One mistake that a lot of organisations make is to directly jump onto a data protection or DLP (data loss prevention) solution, says Vikram Jeet Singh, partner for digital trust, and national leader for data security services at KPMG, says. “That will fail. DLP, for instance, is an engine, which you are coaching that this is what you need to look for. Typically, it will throw you a lot of data, and tonnes and tonnes of that would be false positives. You cannot derive any meaningful inference out of it, it just creates more problems because you now have to handle so many alerts,” he says.
Organisations, he says, must first understand the compliances and regulations they need to meet, and then get into the data governance layer. “That is about understanding what your business functions, departments are, who would be the data custodian. And don’t expect that the IT or CISO office will manage all data. The first line of defence has to be the businesses or functions which have data, collate data. The CISO organisation, and external partners will bring the solutions,” he says.
In data governance, the first step is to discover and classify data. And that’s the most difficult step, says Pradeep Vasudevan, country leader for security software at IBM India & South Asia. That’s also, he says, because data is today spread across on-premise data centres and multiple clouds. Ranjith Purushothaman, CISO at Dhanlaxmi Bank, says it took them two months to complete this process.
The next step, Vasudevan says, is to analyse the data and assess the risk associated with different kinds of data. After that comes frameworks and controls around protecting the sensitive data. “It could be controls, such as encryption, or access policies, and even real-time database activity monitoring – who is accessing what, what kind of actions have been performed on the data,” he says.
Finally, keeping in mind that a breach is likely to happen, Vasudevan says, there must be a strategy and execution plan around how to respond to threats in real-time and send actionable alerts to whoever is supposed to take remedial action.
Purushothaman says it’s useful to look at data in its different states – data in rest, data in transit, and data in use. For sensitive data in rest, one could have storage layer encryption, and even database level encryption. For data in transit, Dhanlaxmi Bank has defined all the areas where data is shared with, for instance, third-party service providers. “And we have ensured that there is encryption and also DLP, to monitor or block if the sensitive data is shared without any business-asusual case,” he says.
For data in use, there should be classification around who should have rights to what data. “If I am generating a credit card number, the database administrator or a normal user may not require the full master data. So, we have to segregate, ensure that a person gets to see only the data that he or she needs to see,” he says.
Vasudevan says a platform-based approach to security is necessary today, where you address the complete data security lifecycle, from discovery to classification to protection to response, and at the same time be compliant with regulations.
KPMG’s Singh emphasises that this whole process of building a security and privacy architecture is an “infinite game.” “Don’t assume that you will reach a Nirvana state at some point. You will need to keep at it and continually improve (the system) on an everyday basis,” he says.
Assembly Election Results
Organisations, he says, must first understand the compliances and regulations they need to meet, and then get into the data governance layer. “That is about understanding what your business functions, departments are, who would be the data custodian. And don’t expect that the IT or CISO office will manage all data. The first line of defence has to be the businesses or functions which have data, collate data. The CISO organisation, and external partners will bring the solutions,” he says.
In data governance, the first step is to discover and classify data. And that’s the most difficult step, says Pradeep Vasudevan, country leader for security software at IBM India & South Asia. That’s also, he says, because data is today spread across on-premise data centres and multiple clouds. Ranjith Purushothaman, CISO at Dhanlaxmi Bank, says it took them two months to complete this process.
Finally, keeping in mind that a breach is likely to happen, Vasudevan says, there must be a strategy and execution plan around how to respond to threats in real-time and send actionable alerts to whoever is supposed to take remedial action.
Purushothaman says it’s useful to look at data in its different states – data in rest, data in transit, and data in use. For sensitive data in rest, one could have storage layer encryption, and even database level encryption. For data in transit, Dhanlaxmi Bank has defined all the areas where data is shared with, for instance, third-party service providers. “And we have ensured that there is encryption and also DLP, to monitor or block if the sensitive data is shared without any business-asusual case,” he says.
For data in use, there should be classification around who should have rights to what data. “If I am generating a credit card number, the database administrator or a normal user may not require the full master data. So, we have to segregate, ensure that a person gets to see only the data that he or she needs to see,” he says.
Vasudevan says a platform-based approach to security is necessary today, where you address the complete data security lifecycle, from discovery to classification to protection to response, and at the same time be compliant with regulations.
KPMG’s Singh emphasises that this whole process of building a security and privacy architecture is an “infinite game.” “Don’t assume that you will reach a Nirvana state at some point. You will need to keep at it and continually improve (the system) on an everyday basis,” he says.
Popular from Business
- Adani setback 2.0: US indictment sends shockwaves across India and world
- Stock market today: BSE Sensex ends 1,961 points up; Nifty50 above 23,900 - top reasons bulls are back
- Now, airlines to provide beverages, snacks or meals to passengers of delayed flights
- Elon Musk takes witty dig at Jaguar's new logo, asks 'Do you sell cars?' - here's how Jaguar responded
- US indicts Gautam Adani for bribing officials in India, misleading investors; issues arrest warrants
end of article
Trending Stories
- Will banks open only for 5 days a week? Here’s what you should know about IBA’s proposal
- India set to be third largest economy, says S&P Global
- Dalal Street bull run continues! BSE Sensex crosses 69,000 for the first time; Nifty above 20,800
- Byju’s reduces notice period for employees as troubles mount
03:08 Sensex surges over 900 points, Nifty above 20,550 as BJP state election wins bolster Modi's Lok Sabha 2024 prospects- UltraTech to buy building materials business of Kesoram in 7,600 crore deal
- Tata Technologies stock debuts at a bumper 140% premium; share price at Rs 1200 on BSE
Visual Stories
- NEET UG 2024 result awaited: Top 10 NIRF-ranked medical colleges of India
- 7 New Expected Bullet Train Routes in India
- 10 Upcoming High-Speed Expressways That Will Change Highway Travel In India
- 8 Transformational Indian Railways Projects You Shouldn’t Miss
- Why Sensex, Nifty50 Hit New Highs, M-Cap At $5 Trillion: Top Reasons
TOP TRENDS
UP NEXT
Start a Conversation
Post comment