Protecting PII Today
Protecting against misuse or leakage of PII is challenging and raises many questions: Where is the PII? Who should have access to it and for what purpose? Should PII data sets be quarantined? Should they be anonymized? Did I mention that this is a challenging process? For most organizations, protecting PII borders is impossible. That’s why organizations take on a step-by-step approach: deploy a classification solution to identify the location of the PII, funnel data store query logs to a security information and event management (SIEM) software, scan those logs to correlate queries about the PII’s location, and so forth.A Much Simpler Approach
Satori’s secure data access platform allows organizations to transcend the challenges described above by using a different, unique approach—identifying PII in motion, as it’s being accessed, and making a decision on whether to allow access in real-time. By shifting the data classification task from an ongoing background process to a real-time activity, correlating data access logs to where PII resides becomes redundant. This modification increases protection accuracy and reduces the effort required in deploying enterprise data protection. Setting a policy to monitor unauthorized access to PII with Satori is as simple as it gets. For example, the following straightforward policy would generate an alert when users that are not the Snowflake administrators try to access PII:rules: - name: "Alert on access to PII" action: alert data_tags: - c12n.pii identity_tags: - "NOT identity.datastore.role:ACCOUNTADMIN" priority: 1 |
To learn more about Satori schedule a demo here. {{cta('e315dd43-c247-41ee-bcfd-04fb837b6b66','justifycenter')}}