Data privacy requires a multi-pronged data protection approach

21st September 2021

     

Font size: - +

By Gary Allemann, Managing Director at Master Data Management

The introduction of the Protection of Personal Information Act (PoPIA) has put the spotlight on data security for many organisations, which has prompted many Chief Information Officers (CIO) and Chief Information Security Officers (CISO) to invest in data encryption.

Ensuring that sensitive data is encrypted is one way to reduce the risk of a breach, particularly from an external source. Yet, data encryption by itself is not sufficient to manage risk. Data encryption is a blunt instrument – it either protects all the data, or allows access to all the data.

PoPIA Condition 7 – Security Safeguards covers the requirements for data protection under the Act. It requires that organisations must secure the integrity and confidentiality of personal information by applying appropriate and reasonable organisational and technical measures.

But, Condition 7 cannot be implemented in isolation. The context of personal data is critical to ensuring protection. For example, a bank manager may require access to your credit history, but the teller does not.

More and more frequently, reports of internal abuses of protected data are being picked up. Most recently, Absa advised that an employee had “unlawfully made selected customer data available to a small number of external parties”. They are not alone. Internal threats – illegitimate use of data by authorised personnel are a key risk that must be managed.

Data privacy requires a multi-pronged data protection approach

Data is typically stored in relational database tables that are structured according to subject matter. Giving access to a table shares all data, whether sensitive or not.  

For example, an organisation is implementing a new enterprise data warehouse as an enabler for self-service BI. They have defined policies for dealing with both classifying and accessing sensitive data and have taken steps to identify and classify sensitive data elements. Building the data warehouse in such a way as to restrict access to various levels of sensitive data is where their challenges have come in, as sensitive data is spread throughout the warehouse.

Encryption cannot help.

One approach is to try and design the warehouse in such a way that sensitive data is separated into separate views. This means creating multiple views of the same data, each including data of various classifications. As one can imagine, this is non-trivial.

There has to be a better way.

Dynamic access management provides role-based access at an attribute level

1. What does this mean? Policies define access. By leveraging data governance principles, we can identify sensitive data in context and apply different access permissions based on factors like the role of the person accessing the data, the location of the person accessing the data, and the classification of individual data elements.

2. Visibility of each attribute is dynamically adjusted. Rather than (simply) encrypting all data we can apply dynamic tokens or masks to individual attributes. For example, one user may see a complete telephone number, another may see only the last 4 digits, and a third may not see telephone number at all. This nuanced approach allows us to limit access to data according to the processing requirement, minimising the risk of abuse.

Key to the value is the ability to apply policies and access rules across multiple systems and attributes automatically.

By applying dynamic access management, organisations can share one data set across multiple users and geographies with a single design.

When organisations only have a hammer, every problem looks like a nail. Dynamic access management frees analytics teams to focus on value, without adding risk.

Edited by Creamer Media Reporter

Comments

The content you are trying to access is only available to subscribers.

If you are already a subscriber, you can Login Here.

If you are not a subscriber, you can subscribe now, by selecting one of the below options.

For more information or assistance, please contact us at subscriptions@creamermedia.co.za.

Option 1 (equivalent of R125 a month):

Receive a weekly copy of Creamer Media's Engineering News & Mining Weekly magazine
(print copy for those in South Africa and e-magazine for those outside of South Africa)
Receive daily email newsletters
Access to full search results
Access archive of magazine back copies
Access to Projects in Progress
Access to ONE Research Report of your choice in PDF format

Option 2 (equivalent of R375 a month):

All benefits from Option 1
PLUS
Access to Creamer Media's Research Channel Africa for ALL Research Reports, in PDF format, on various industrial and mining sectors including Electricity; Water; Energy Transition; Hydrogen; Roads, Rail and Ports; Coal; Gold; Platinum; Battery Metals; etc.

Already a subscriber?

Forgotten your password?

MAGAZINE & ONLINE

SUBSCRIBE

RESEARCH CHANNEL AFRICA

SUBSCRIBE

CORPORATE PACKAGES

CLICK FOR A QUOTATION