Cloud Data Protection: How DSPM Helps You Discover, Classify and Secure All Your Data Assets

In this fourth installment of Tenable’s “Stronger Cloud Security in Five” blog series, we turn our attention to securing cloud data, a complex endeavor as data grows exponentially and threats become more sophisticated. Check out five DSPM best practices to sharpen your cloud data security and compliance.

As the volume of data stored and processed in your cloud environments grows, so does the complexity of protecting it from cyber thieves and of complying with strict regulations.

While on-premises data centers offer a more controlled environment, data generated in the cloud can be less structured and is often stored in a more diverse array of repositories, increasing the risk that it will be improperly secured.

As GigaOm Analyst Paul Stringfellow tells us, cloud repositories are often deployed outside of normal controls due to their ease of use and their perceived low cost.

“Often, they are used for specific tasks and then discarded and forgotten by original project owners,” he writes. “This leads to shadow data repositories that exist outside of established data storage and security controls.”

The solution? Data security posture management (DSPM) systems, which offer unified visibility of all your cloud data — even if your organization uses multiple cloud service providers (CSPs) — along with other data protection capabilities.

“A key element of data resilience is understanding where sensitive data stores are located and what is inside them. You can’t secure something you don’t know about, and DSPM helps identify and categorize data stores,” Enterprise Strategy Group Analyst Todd Thiemann indicates.

At Tenable, we believe a key element for securing your cloud data is to have your DSPM tool integrated as part of a comprehensive cloud native application protection platform (CNAPP)

Combining DSPM functionality with other CNAPP components gives you holistic cloud security<
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Security Boulevard

Read the original article: