Created by Materia for OpenMind Recommended by Materia
4
Start Managing Data Security for Business Intelligence Tools
22 October 2019

Managing Data Security for Business Intelligence Tools

Estimated reading time Time 4 to read

Data is simultaneously an advantage and a risk for any organization. Horror stories about colossal data breaches make headlines faster than murders and can cause significant drops in market value, loads of negative publicity, and considerable distrust in the company.

Some of the biggest scandals involving compromised data were the attack on Yahoo in 2013 (3 billion user accounts compromised), Mariott’s ongoing data breach between 2014 and 2018 affecting 500 million customers, and the more recent Sephora problem in South East Asia with unknown magnitude.

No organization is safe; there is no magic formula to ensure 100% data protection. Yet, since the advantages outweigh the disadvantages, data-rich Business Intelligence and CRM systems are here to stay, and organizations need to find reasonable ways of ensuring their security.

Here are a few implications to consider when thinking about data security management at scale.

Identify Vulnerabilities

A rule of thumb is that any data flow is vulnerable by definition, as it can be hijacked and used as a loophole into the system. Even just reading information from a database or being able to copy it to an outside repository is a significant concern. Successful exploits can modify, delete, or create new records. While some attacks require human consent, others are more subversive.

One of the easiest ways to secure your data systems against such problems is to keep the software updated as soon as a new version is released. Compared to content management systems, for example, most versions for Business Intelligence suites don’t necessarily offer new features but patch observed vulnerabilities, making the systems safer.

Encrypt Communications

Data encryption incurs more costs and requires additional resources, but it is money well spent. Business Intelligence tools are primary targets for hackers, since this is where competitive advantages reside, and controlling data would mean controlling an entire company.

Without going paranoid, you should always consider the possibility of the man-in-the-middle attack, which means that any communication segment could be intercepted by hackers and deciphered. Once on the server, data is not safe in plain text; it is best to keep it encrypted at all times and protected by two-factor authentication.

Managing Data Security for Business Intelligence Tools
Once on the server, data is not safe in plain text; it is best to keep it encrypted at all times.

An additional protection layer would be to segment the data storage and distribute it over several servers, with some redundancy to protect yourself from any central attack. Your data should be like a puzzle that only you have the map to put together.

Securing BYOD Policies

Another reason to enforce end-to-end encryption is the growing trend of installing Business Intelligence tools on employee’s own devices, such as smartphones and tablets. These are frequently used in unsecured contexts such as public Wi-Fi networks and thus can expose corporate data to theft opportunities.

Set Permissions and Hierarchies

Since knowledge is power, it needs to be restricted by roles. Always create a set of permission rules for each user in your organization or design user groups with specified rights. Make sure each user has enough permissions to do their daily tasks without external input yet with enough restrictions in place to protect sensitive information.

It is also a wise idea to track changes to each file and have a log showing the authors of such changes. Also, you can restrict access to sensitive data to your institutional network based on IP, although this could be challenging for organizations allowing employee mobility.

An innovative way of restricting access is using image recognition technology to grant permissions based on biometrics like retina or fingerprint scanning or even face recognition. This is an idea derived and used by law enforcement to scan crowds for suspects.

One last tip: for sensitive data, ensure there are at least two managers who can grant access in case something goes wrong as this will save you considerable efforts in the long run.

Password Protection and Access Control

While essential, the problem of setting strong passwords and keeping them private is the primary failure point of most Business Intelligence systems. One human error can compromise your entire network faster than any hacker attack.

Managing Data Security for Business Intelligence Tools-password
Be sure to conduct a suitable training regarding password management and set clear rules on changing passwords every few months.

Consider Tarpitting

Tarpitting is a method of deliberately slowing down the server when it detects an abnormal volume of operations, like in the case of spam mail. This buys the organization time to detect the attack and potentially discourages the attacker.

Cloud-ready?

Business Intelligence solutions and the cloud are complementary technologies that work seamlessly together.

If you are keeping your Business Intelligence data in the cloud, your service provider is responsible for the security of the entrusted information. This is why you need to choose a reputable service, like those offered by industry giants: Amazon, Google, or IBM, among others. They have the necessary infrastructure, know-how, and financial resources to ensure state-of-the-art security with minimal downtime. Keep in mind that having an on-premises server means being exposed to the same risks but with far higher costs to get the same level of protection.

Use Business Intelligence for Security

Last but not least, you can use a Business Intelligence system itself to enhance the security of your company’s data. Create a “security view” in your Business Intelligence dashboard and look at the number of e-mails sent, the size of  uploaded/downloaded data, and the locations of the IPs accessing data. Of course, if this is too much trouble for your in-house team, you can always find external help.

Business Intelligence and Security: A checklist

There are three levels of security for a Business Intelligence tool, and each of them should be of a world-class quality.

Managing Data Security for Business Intelligence Tools-1-the DREAD risk assessment model to scan for vulnerabilities and run external penetration tests
DREAD risk assessment model (Damage, Reproducibility, Exploitability, Affected users, Discoverability)

At the process level, you need to use the DREAD risk assessment model to scan for vulnerabilities and run external penetration tests. When it comes to system/object level, be sure to ask for integrations with your current systems and a clear user hierarchy. Finally, at the data level, ask for row-level security to protect your internal data assets.

Comments on this publication

Name cannot be empty
Write a comment here…* (500 words maximum)
This field cannot be empty, Please enter your comment.
*Your comment will be reviewed before being published
Captcha must be solved