{"id":31480,"date":"2021-04-27T09:13:58","date_gmt":"2021-04-27T12:13:58","guid":{"rendered":"https:\/\/conversys.global\/como-sua-arquitetura-de-dados-pode-sobreviver-as-ameacas-modernas\/"},"modified":"2024-09-12T16:21:05","modified_gmt":"2024-09-12T19:21:05","slug":"como-sua-arquitetura-de-dados-pode-sobreviver-as-ameacas-modernas","status":"publish","type":"post","link":"https:\/\/conversys.global\/en\/como-sua-arquitetura-de-dados-pode-sobreviver-as-ameacas-modernas\/","title":{"rendered":"How can your data architecture survive modern threats?"},"content":{"rendered":"
<\/p>\n
In response to the new challenges of information security and data protection and privacy, we have seen the emergence of entirely new types of network structure - what most people call data architectures.<\/p>\n
Only in recent years, for example, has there been talk of application-based network architectures and the growing popularity of new cloud-based architectures.<\/p>\n
All these architectures are great if used correctly. But network and security engineers must also recognize that no matter how contemporary and sophisticated their data architecture is, there are some cyber security threats that are just as dangerous today as they were a decade ago.<\/a><\/p>\n The first and most important point to see here is that, although the last decade has seen the emergence of many different types of data architecture<\/a>The basic signature, vector and mechanism for cyber attacks remain the same.<\/p>\n An attacker tries to gain unauthorized access to your systems through a weak point in your authentication protocols, moves laterally through the system, increases the level of access they have and then steals valuable data.<\/p>\n Thus, regardless of the cloud computing architecture used, you need to be able to do three things:<\/p>\n Defining exactly how you do this depends on your data architecture, but it's worth a little secret - no data architecture will automatically defend you against cyber attacks<\/a>.<\/p>\n In fact, in many cases, the more complex the architecture, the more likely you are to see a successful attack and the more complicated it will be to clean up afterwards. With more moving parts, you have more things to control, and that can be a big challenge.<\/p>\n This is particularly true when databases have three main attributes:<\/p>\n A classic example here is worker databases, which are generally used by various agencies and companies, all of which assume that others are responsible for safety.<\/p>\n This \"nebulous\" architecture is one of the reasons why databases with workers' personal data are hacked so regularly and one of the reasons why it is important to have a well-defined data architecture.<\/p>\n There are some emerging approaches that make it easier to protect modern data architectures. So let's take a look at them.<\/p>\n You can't protect a territory you don't know. That's why the first step in protecting any system is to map its landscape. This used to be a fairly simple job that an intern could do in a week.<\/p>\n Now, the complexity of contemporary architecture means that you will have to use automation to map data flows and authentication structures<\/a>.<\/p>\n Fortunately, there are tools that can help you do this. Data security solutions support the evolving data landscape across a variety of entities - databases (DBs), database as a service (DBaaS), files and data services - and are particularly useful when it comes to securing hybrid and multi-cloud.<\/p>\n Protecting complex data architectures can only be done efficiently by recognizing that users are likely to need equally complex access profiles in the various parts of their systems.<\/p>\n Secondly, you must recognize that access in itself is not a negative thing - what matters is protecting your data.<\/p>\n For this reason, complex architectures may require you to switch to data-centric management<\/a>. This means assigning security controls to individual data storage structures, not just the systems that access them, and making access to this data one of your key performance indicators.<\/p>\n The dynamism involved with contemporary data architectures can make them very difficult to protect, but it can also provide security analysts with a much richer picture of how their systems are actually working.<\/p>\nNew architectures, old challenges<\/h2>\n
\n
\n
Protecting your architecture<\/h2>\n
Mapping the landscape<\/h3>\n
Data-centric controls<\/h3>\n
Real-time analysis<\/h3>\n