Securing and Governing Data at Rest

Reading time: 7 mins

Meet the Authors

Key Takeaways

⇨ Data at rest, both in production and non-production environments, is often overlooked as an area of cybersecurity concern.

⇨ Obfuscating financial and personal data does not thoroughly protect data at rest, it challenges hackers to correlate data and infer or recover the content through other sources.

⇨ Using a methodical approach to security data will bring data at rest into the holistic data security model.

Data at rest is a high-value target for hackers. It is a source of people, banking, product, and intellectual property information that is highly valuable for resale or creating counterfeit products. It includes quality assurance systems, development environments, client copies, disaster recovery sites, archives, and online backups.
In this article, SAPinsider cybersecurity expert Julie Hallet runs through the best ways to protect this vital data. This start with awareness and policy solutions, ensuring that all parties are on the same page regarding what data should be included in a copy for testing or development environments, how all non-production environments should be monitored and what the user provisioning and access review processes should include.
This article will also delve into how to categorize data to best protect it, how to use automation in GRC practices, and how to use a methodical approach in securing and governing data at rest.

Membership Required

You must be a member to access this content.

View Membership Levels

Already a member? Log in here

More Resources

See All Related Content