Let’s say you’re planning a train robbery in the Old West. Your posse can jump on board at the station, on the route or at the last stop. The same is true of today’s data robbers. There are three main states in which data exists across an enterprise: at rest, in motion and in use. As defenders, we need to ensure data security from creation to disposal and everything in between.

While most of us know how to protect data at rest (i.e., inactive data in storage, such as in databases), the other two states require more complex strategies. Let’s take a look at how to provide data security along the whole journey.

Tension Between Data Security and Governance

Organizations collect a tremendous amount of data from a lot of sources. Any of these sources might contain sensitive data. We often relocate data for warehousing, reporting, analytics, storage, testing and application use. Therefore, that data or artificial intelligence (AI) models might be copied multiple times, resulting in misuse. Gartner estimates that backup and archiving of personal data represents the largest area of privacy risk for 70% of businesses, up from 10% in 2018.

The rise of newer platforms, such as cloud and data lakes, can make the issue even worse. Organizations often feel a natural tension between data governance, data security and innovation. A well-governed, secure environment can spur innovation and make people more productive.

Learn about IBM Security Guardium Insights

Data Security in Motion: Leaving the Station

The first data ‘location’ we need to worry about is when the data is in motion. When data is in motion, it travels within or between information systems. Using the cloud, big data tech and disparate tools from multiple vendors can all make this step more complex.

Data in motion is at risk from ransomware attacks and data breaches. Most likely, you’re already using encryption in this stage to help make sure they can’t use that data if someone steals it. Think of encryption as the first and last line of defense.

You can take several steps to protect data in motion. A good place to start is knowing what data you need to protect and where it is located. Customer and financial data are obvious choices for encryption, but many companies fail to realize that even older, seemingly less important data can contain sensitive information. This is partly because what constitutes personally identifiable information (PII) has broadened a lot in the last decade.

Controlling and monitoring data access and activity is an important part of any data security strategy. Find out more about how to balance data security with frictionless access to data.

Data in Use: The Journey and the Arrival

In our train metaphor, data is in use when it arrives at the station. Data is in use when applications process it, when it’s transformed or changed and when enterprise users view it. The primary goal in governing data in use is to minimize the likelihood of data misuse across the enterprise.

More and more departments may express the need to manage and access data. So, leaders need to focus on streamlining data operations to be more efficient and improving data quality, findability and governance. That allows them to provide an efficient, self-service data pipeline to the right people at the right time from any source.

At the heart of a strategy for data in motion often lies a data catalog. The tool creates and automates policies for enterprise-wide categorizing and classifying all company data, no matter where it resides. This means the right data security measures are in place while data remains at rest. Other defenses might be triggered when people access, use or transfer sensitive data. The modern data catalog should also include other functions such as data masking, user-based access controls for discovery and risk assessment of unstructured data.

Learn More About Data Security and Governance

In truth, you aren’t the train robber in this metaphor: you’re the one installing the locks. Data security and governance are your tickets to not only speed up analytical processing and insights but also to meet compliance needs. While the data volumes are extensive, machine learning and AI practices are helping to overcome the limits of human scale with such tasks as data mapping, activity monitoring, cataloging, matching large data volumes and sustaining data quality. Customers can deliver these operations at scale to cover millions of data assets with a unified privacy framework.

Want to learn more? Register for the workshop “Build your Business Case for Data Privacy” here.

More from Data Protection

Defense in depth: Layering your security coverage

2 min read - The more valuable a possession, the more steps you take to protect it. A home, for example, is protected by the lock systems on doors and windows, but the valuable or sensitive items that a criminal might steal are stored with even more security — in a locked filing cabinet or a safe. This provides layers of protection for the things you really don’t want a thief to get their hands on. You tailor each item’s protection accordingly, depending on…

What is data security posture management?

3 min read - Do you know where all your organization’s data resides across your hybrid cloud environment? Is it appropriately protected? How sure are you? 30%? 50%? It may not be enough. The Cost of a Data Breach Report 2023 revealed that 82% of breaches involved data in the cloud, and 39% of breached data was stored across multiple types of environments. If you have any doubt, your enterprise should consider acquiring a data security posture management (DSPM) solution. With the global average…

Cost of a data breach: The evolving role of law enforcement

4 min read - If someone broke into your company’s office to steal your valuable assets, your first step would be to contact law enforcement. But would your reaction be the same if someone broke into your company’s network and accessed your most valuable assets through a data breach? A decade ago, when smartphones were still relatively new and most people were still coming to understand the value of data both corporate-wide and personally, there was little incentive to report cyber crime. It was…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today