Learning Library

← Back to Library

Six Pillars of Data Security

Key Points

  • Data is the most valuable asset for modern IT systems, making robust security essential to protect everything from intellectual property to actual money.
  • Effective data security governance starts with a clear policy that defines classification tiers, catalogs critical data locations, and outlines resilience plans for recovery.
  • Accurate data discovery is required to reconcile assumed data inventories with reality, scanning both structured and unstructured sources and monitoring network traffic for hidden or exfiltrating information.
  • Protection measures must include strong encryption paired with reliable key management, strict access controls such as multi‑factor authentication, and regular backups to ensure data remains usable even if compromised.
  • The overall security framework is built on six pillars—governance, discovery, protection, compliance, detection, and response—each critical for a comprehensive defense strategy.

Full Transcript

# Six Pillars of Data Security **Source:** [https://www.youtube.com/watch?v=N8xEgSe5RwE](https://www.youtube.com/watch?v=N8xEgSe5RwE) **Duration:** 00:07:15 ## Summary - Data is the most valuable asset for modern IT systems, making robust security essential to protect everything from intellectual property to actual money. - Effective data security governance starts with a clear policy that defines classification tiers, catalogs critical data locations, and outlines resilience plans for recovery. - Accurate data discovery is required to reconcile assumed data inventories with reality, scanning both structured and unstructured sources and monitoring network traffic for hidden or exfiltrating information. - Protection measures must include strong encryption paired with reliable key management, strict access controls such as multi‑factor authentication, and regular backups to ensure data remains usable even if compromised. - The overall security framework is built on six pillars—governance, discovery, protection, compliance, detection, and response—each critical for a comprehensive defense strategy. ## Sections - [00:00:00](https://www.youtube.com/watch?v=N8xEgSe5RwE&t=0s) **Six Pillars of Data Security** - The speaker outlines six key components—governance, discovery, protection, compliance, detection, and response—detailing how policies, classification, cataloging, and resilience form the foundation for safeguarding critical data. - [00:03:05](https://www.youtube.com/watch?v=N8xEgSe5RwE&t=185s) **Comprehensive Data Protection Strategy** - The speaker outlines the need for backup, compliance reporting, retention policies, and monitoring—including user‑behavior analytics—to safeguard data and reduce organizational risk. - [00:06:10](https://www.youtube.com/watch?v=N8xEgSe5RwE&t=370s) **Building a Holistic Data Security Ecosystem** - The speaker emphasizes a structured, organization‑wide strategy that integrates people, processes, technologies, and architecture to protect both structured and unstructured data while ensuring access only for authorized users. ## Full Transcript
0:00Data is the lifeblood of a modern IT system. 0:02It's the crown jewels. 0:04It's the secret sauce. 0:05Intellectual property. 0:07It's sensitive customer information. 0:09It's important business plans. 0:12It's even money itself. 0:14So the bad guys want to get it. 0:16It means the good guys need to protect it. 0:18How do you do that? 0:19Well, I'm going to go through six points in data security and talk about what are the things that we have to do. 0:25I'm going to discuss governance, discovery, protection, compliance, detection and response. 0:31Those are the things that go into it. 0:33So let's start off with this business of governance. 0:37So what do I need to do in order to govern data security? 0:41It starts with a policy. 0:42A policy is basically our plan for how we want to protect information. 0:47If I don't have that, it's like running a race and not telling anyone where the finish line is. 0:51So we have to have a data security policy in place. 0:54And in that policy we describe this kind of data needs this level of sensitivity 0:59and this level of sensitivity needs this kind of protection protection. 1:03Now, we're going to under that add classification and have a scheme for what those different layers would be. 1:10Unclassified, internal use, confidential, things like that. 1:16So we need to have those tiers defined. 1:18Then a catalog that says, where's all the important data that I'm trying to protect? 1:22If I don't know where it is, I can't really protect it. 1:24Then resilience. That is, I need the ability to recover this data once it's gone away. 1:30And what are my plans in place for that? 1:34Then from governance, I'm going to move over to discovery. 1:39I need to be able to see where all of that information is. 1:44This is the plan--before I apply it, I need to know where it all is. 1:48The catalog is the preconceived notion of where it all is, then there's reality. 1:53I have to go out and discover where all this stuff is. 1:56I need to look in my databases. 1:58I need to look in my files. 1:59That's structured sources and unstructured sources of data. 2:04Also, I want to look across my network. 2:06Sometimes information is flying around and I'm not aware that that might be sensitive stuff that's leaving my network. 2:13That becomes particularly important. 2:15Then what's next? 2:16Well, then I need to do some protection. 2:20How am I going to protect the information that I've just talked about here? 2:26I need to be able to encrypt the information so that if it leaks out of my organization, the bad guys can't read it. 2:33I need to also have key management. 2:36If I encrypt the data and lose the keys, then I lose the data. 2:40So I have to have a key management system that generates keys securely and randomly, 2:45that stores them and keeps them secure, that tells me when I need to rotate keys and put new keys in place. 2:53So that key management system is particularly important. 2:56I also need access controls-- the ability to say who gets access to this and who doesn't. 3:01We could use things like multi-factor authentication, which I've talked about in other videos. 3:05And then backup-- the ability to take a copy of all the data 3:10and keep it in some secure place and then be able to recover from that. 3:15Those are the protections that I need to put in place. 3:18Then after I've done all of that, I need to ensure that I comply. 3:24We may have internal regulations that we put in place, there may be governmental regulations, 3:29there may be industry regulations that I have to follow. 3:33In some cases, I need to report on those things, I need to say, 3:37so the auditors will see this, that in fact, I have done what I said I was going to do. 3:43That means logging a lot of information and then being able to to do reporting from that. 3:47It also means retention. 3:49It turns out that we like to keep all the information that we ever get, but that increases our risk as an organization. 3:57It's best once the information is no longer needed to get rid of it. 4:01So we need a policy and an enforcement that says this is how long I'm going to retain records, 4:06and this is when I get rid of them, so that they're no longer a risk to me and the organization. 4:12Then I need an ability to detect. 4:16Do I have a problem? 4:18Is someone using the data or misusing the data in a way that I didn't expect, 4:23in a way that is unapproved? So I need a monitoring capability that lets me know that that's the case. 4:29I did a previous video on User Behavior Analytics, which is an example of one of those technologies 4:35that will go in and look and see when users are using data in anomalous ways and they deviate from the norm. 4:41That would be a good trigger point. 4:43Using analytics is another way of doing this kind of analysis and then ultimately alerts 4:49that go up and tell someone we need to take action, someone has violated, or we think there's been a violation. 4:55And then once we have that, well, ultimately, I need to be able to get up to a point where I can respond. 5:04When I respond, then, I need an ability to create cases. 5:09So with those cases, I can assign those to individuals to go do investigations, 5:13I can attach information to those, I can track them through to completion. 5:19Dynamic playbooks allow us to guide the analyst through what the steps should be 5:25and tell them based upon this step [and] what the outcome was, then you will do certain things to follow up against that. 5:34And it's dynamic in the sense that what you do in the second step depends on what happened as the result in the first step. 5:40We do orchestration. 5:42We'd love to automate everything, but we can't. 5:44So we have to orchestrate the things that we've never seen before: the first-of-a-kind situations. 5:49And then we automate as much as we can of the other responses. 5:53Ultimately, all of this leads back to a kind of ecosystem. 5:57Think of this as a virtuous cycle. 5:58I take the information that I've learned in each of these stages and feed it into the other stages. 6:04My response tells me, here's where we failed, maybe we need to change the way we govern, 6:08maybe we need to change our policies. 6:10Maybe this changes the way we discover information, protect it, and so forth. 6:15So ultimately, what we're trying to do is create this ecosystem that allows us to protect the information, 6:20that is, as I said before, the lifeblood of the organization. 6:25The good news is there is a way to do this. 6:27It requires a structured approach. 6:30It requires a holistic view, not just looking at individual pieces, only the databases, 6:34but not the files, only the structured data and ignoring the unstructured data. 6:38A holistic view is going to be critical here. 6:41Also, the right architecture. 6:43Building the data security components in place, using the right technologies, having them all integrate is going to be critical. 6:50And ultimately, the good people, process and technologies. 6:56Those are the things that will ultimately implement a data security policy 7:00that makes that information available only to the people that need it, and the unauthorized users don't have access. 7:08Thanks for watching. 7:09If you found this video interesting and would like to learn more about cybersecurity, 7:12please remember to hit like and subscribe to this channel.