Towards the end of 2023, National Public Data discovered a breach where a hacker accessed names, email addresses, phone numbers, social security numbers, and mailing addresses of some 1.3 million U.S. citizens. Only later did the company, whose main service is the provision of background checks, realize that some of this data was leaked, in April and August of 2024.
As they work with law enforcement agencies to trace the hacker and to reinforce their security systems, National Public Data also must deal with the reputational fallout — including a class action lawsuit for its failure to properly secure and safeguard the PII it collected and maintained.
This is just one of the many cybersecurity cases afflicting people organizations today.
Data is the currency of the digital age. And as currency, many want to get their hands on this. That’s why protecting data has become a strategic imperative for every government, corporation, or NGO.
So how does an enterprise put in place mechanisms to protect the data it holds on behalf of consumers and other stakeholders? Data protection is how, of course, but protecting data is not an easy task for any organization.
Data protection is an encompassing term for all the ways and processes used to protect and safeguard your data. There’s no “one way” to protect your data. Indeed, many ways and approaches are better than a singular path.
Data protection is important because of the risks involved for unprotected data. Failure to properly secure your data doesn’t only threaten the very existence of an organization — it also may expose your org to hefty regulatory fines and penalties, lawsuits, and other reputational issues.
With that understanding of data protection, throughout this article, we will look at risk assessment and treatment, the two main pillars of a robust cybersecurity posture that can aid organizations secure information be it at-rest, in-transit or in-use:
At the heart of data protection is the management of risks to its confidentiality, availability, and integrity — what’s known as the CIA triad of cybersecurity.
So, to protect your data, you must first assess the risk to your data, according to the ISO/IEC 27005:2022 guidance on managing information security risks. Perform a risk assessment. That is, identify, analyze, and evaluate threats to your data.
This assessment should be conducted systematically, iteratively, and collaboratively, drawing on the knowledge and views of stakeholders within and outside the organization. In addition, it should use the best available information, supplemented by further enquiry as necessary.
Your risk assessment is informed by the environmental context that the organization operates in and where data is created, used, and managed. The context may include:
For example, the threat landscape of a social media company is probably significantly different from a learning institution or a government agency. That context matters in determining how you’ll assess risks to the data from these varied organizations.
The activities involved in risk assessment are as follows:
Identifying the risk involves finding, recognizing, and describing risks to data. How? By considering events and sources by which such threats materialize from. Organizations will consider strategic and operational scenarios, including:
Log the risks you identify in a risk register and assign an accountable owner who has the authority to address the risk.
In this step, you’ll analyze the identified risks. The goal here is to understand the characteristics of each risk including, where appropriate, the level of risk.
Analysis techniques can be qualitative (e.g. high, medium, low), quantitative (using a scale with numerical values e.g. monetary cost, users impacted, frequency of occurrence) or a combination of the two.
The two must common analysis factors used are:
a) Impact. This considers the potential consequences resulting from the failure to adequately preserve confidentiality, integrity, or availability of data. For example, an incident where a hacker has breached the network but failed to access encrypted data might be considered low impact, while a denial-of-service (DoS) attack that brings down the e-commerce website for an entire Black Friday will be deemed critical.
b) Probability. This considers the likelihood of occurrence of possible or actual scenarios that affect data security. There is high probability for a phishing attack being successful if an organization has not trained its staff or invested in anti-phishing solutions. Conversely, there may be low probability of data loss when an organization has implemented a 3-2-1 backup strategy.
The risk level is usually computed as a function of impact and probability, then mapped using a risk matrix:
Example of a risk matrix. (Image source)
Other factors you can incorporate to determine the risk level include:
(Related reading: analyze risk using Splunk Enterprise Security.)
Here, you evaluate the analyzed risks based on pre-determined criteria, with the goal of making informed decisions on the way forward for protecting data. Prioritize, or score, the risks to data by considering:
Should the risk levels be low compared to acceptance criteria (the risk appetite your organization has), then no further action is required. Otherwise, the risk levels will determine the approach to treatment or further analysis.
Risk treatment involves using the output of the risk assessment phase, above, to select and implement options for protecting data to address the prioritized risks.
The selection decision involves balancing the potential benefits derived in relation to the achieving those objectives against the costs, effort, or disadvantages of implementation.
For example, an option that involves processing and storing data in platforms hosted by different cloud service providers (CSPs) may reduce the risk of data loss, but result in increased architectural complexity and cost overruns. These options are not necessarily mutually exclusive or appropriate in all circumstances.
The ISO 31000 risk management guidelines suggest the following options:
(Related reading: risk management frameworks to use and TPRM third-party risk management.)
Finally, you can and should deploy information security controls — to decrease risk likelihood or risk consequence — and thereby protect the data you manage
Resources such as ISO 27002 guidance and cybersecurity frameworks, like NIST, are useful references for choosing data security controls. These controls can be:
A long-time best practice for all organizations is to implement a mix of such controls to ensure they can compensate for each other — especially where an intrusion is successful on one level, i.e. defense-in-depth.
As data privacy regulations become stricter, and cyberattacks more potent, data protection has to be an ever-evolving practice that involves the input of all stakeholders to ensure that the enterprise remains vigilant and prepared to face all sorts of risks.
Splunk is an industry leader in observability, cybersecurity, and data management solutions for enterprise organizations. With Splunk solutions, you can safeguard your data and maximize its full value. That means enhancing visibility, uncovering insights, and finding and fixing issues faster — all while reducing costs. Learn more about data management with Splunk.
See an error or have a suggestion? Please let us know by emailing ssg-blogs@splunk.com.
This posting does not necessarily represent Splunk's position, strategies or opinion.
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.