Data is in more places than ever before and
Whether from insider threats or outsider attacks, a layered data security solution is critical since many traditional perimeter-based data protection mechanisms have been proven to fail when employed alone.
Data in Transit and Data at Rest are both described within security best practices which suggest encrypting such files, but what about their mutual and often overlooked counterpart: Data in Use?
Data in Use is essentially any data in computer memory or any similar form of active data while it works through an IT infrastructure. It is any data in the process of being generated, in the midst of an updating or amending process, being viewed through various endpoints or even being deleted or erased. It is not explicitly static nor travelling, but measurable and real. Because of its tangible yet transient nature, Data in Use has recently been recognized as an increasing security concern for businesses and their information assets.
In today’s business landscape, more and more employees are telecommuting or working from home. The initial or most basic data security steps include: identifying which data is sensitive and requires privacy, setting up user access rights for
Security ought to be applied throughout all three data states, but securing Data In Use presents unique technical and logical challenges while begging the question: “Can data ever be secure while end users have access to it?”
Data in Use encounters different vulnerabilities depending on where it is exposed in a given IT Infrastructure or environment and most commonly, end-points are among the biggest exposure threats. Since the prevalence of recent “Bring your own device” trends where an employee will use a personal device to access protected data, companies need to be
As far as successful techniques go, data encryption has been proven as a reliable and effective tool for protecting sensitive data. Just like with perimeter-based protection, however, using strong encryption alone is no silver bullet and cannot be expected to stop cyber-criminals or safeguard your information assets. The strongest and most secure encryption tools and standards are publicly scrutinized … but they are therefore also publicly available to any hackers who would want to search for
Encryption in and of itself is really just a means of synergising and enhancing other security practices, and the debate about just how reliably Data in Use can be secured is ongoing. Developing, maintaining and enforcing policies and procedures for end users while using strong encryption techniques throughout the full data lifecycle and using a layered security approach is the only way to truly elevate data security and protect your information.
Instead of trying to block unauthorized access, or deploying alert/monitor solutions that tell you after an intrusion has already occurred,