Do you know who can access your data?

Publish date:

Many organizations do not have a full insight into who is accessing their data. There is a big challenge with ensuring that databases and data stores are creating the correct audit trail across the IT landscape.

As I have been recently engaging with clients discussing protection of Personal Data related to the GDPR and other privacy regulation compliance, I have come to understand that many organizations do not have a full insight into who is accessing their data. There is a big challenge with ensuring that databases and data stores are creating the correct audit trail across the IT landscape, and that the audit trail is stored in a sufficiently secure manner and periodically reviewed for unauthorized or unexpected access.

To be ready for the GDPR, Data Controllers and Processors needs to have a clear and reliable insight into who is accessing Personal Data. This will enable them to discover potential breaches before they cause real damage.

During a pre-study where I was engaged to look at ISO 27001 requirements in order for a client to get ready for GDPR, we concluded that a Data-Centric Audit and Protection Solution would be a good way of ensuring that an audit trail is created when users access Personal Data in both databases and files.

A Data-Centric Audit and Protection Solution can

  • assist in finding and classifying data to protect
  • assess the security of the database where the data is stored
  • assist in minimizing who is authorized to access the data
  • create audit trail of who is accessing data and store it separated from the system that is monitored
  • identify unwanted and abnormal access using automated advanced analytics
  • block future access if misuse is discovered to ensure that the data is safe
  • help data owners getting insights into who is accessing the data and assists in the upholding of compliance

Unlike native database logging, Data-Centric Audit and Protection Solutions has a low impact on database and application performance as creation of audit trails are offloaded to external appliances. This can lower the cost of running database servers and improve the user experience for your business users.

In addition, Data-Centric Audit and Protection can track the application end user which is accessing data through enterprise applications.

Get in touch if you would like to know who is accessing your data.

Capgemini is partnering with the leading global vendors and can assist you in finding and implementing the solution that is the best fit your organizations need.

Related Posts

blockchain

Will blockchain survive data privacy regulations such as the GDPR in the long run?

Sumit Kumar
Date icon January 9, 2019

Can blockchain survive amidst data privacy regulations? Read this blog to find out.

Data Privacy

Impact of GDPR on digital channels

Chetna Dwivedi
Date icon December 4, 2018

How does GDPR impact individuals who use digital channels such as online shopping, social...

cookies.

By continuing to navigate on this website, you accept the use of cookies.

For more information and to change the setting of cookies on your computer, please read our Privacy Policy.

Close

Close cookie information