SlideShare a Scribd company logo
1 of 11
Download to read offline
Protecting sensitivepersonal
data in the enterprise
Powered by TCSAWS business unit
24 August2021
RajiKrishnamoorthy
Head, AWS Security and Compliance
AWS Business Unit, TCS
2
Challenges in protecting PII data on cloud
*Source: Cyware.com
Nearly 80-90% of the data breaches involve personally identifiable
information (PII); ransomwareattackswitnessed a rise of 57%.*
Enterprises storing PII data on the cloud need to secure data at
rest and in transit from intruders. They needto:
• Set-upcomplex monitoringsystemsto identifyandthwart
maliciousor unauthorizedaccess
• Track complex and sensitive dataexchangesforsource,
structure, quality,lineage andusage
• Ensure compliance to global privacyregulations
• Choose a combinationof native servicesand third-partytools
to protect data
3
Five critical aspects for protecting PII
Data classification
Leveragedata classification toolsandpre-defined criteria
to categorizedata
Data security controls
Protectdata and infrastructurewith in-builtfraud
detection controls
Data encryption
Cipher dataatrestandinmotion makingdata
unintelligibleto eavesdroppers
Data loss prevention
Preventdata loss,leakageor misuseof datathrough
breaches,ex-filtration transmissions andunauthorized use
Regulatory compliance
Equip organizationsto continueoperationsandmeet
obligationsdespitedisruption
In a world of ever-increasing
compliance andprivacyconcerns,
building PII guardrails helps enterprises
uphold customertrust and adhere to
regulatory standards. We recommenda
five-foldapproachto build guardrails
forenterprise PII data.
4
Data classification | First step to protect PII data
TCS Confidential
Categorize data basedon predefined
criteria to efficientlymanage and
protect data
Combine manual and automated
techniquesto optimallyclassifydata
Leverage cloud service providersto
search for storage volumesand match
data against pre-definedpatterns
Implementthe right securitymeasures
based on data sensitivityusing
data classificationstools
5
Data security controls | Using domain and configurability
TCS Confidential
Applythe rightidentityand access
management(IAM) mechanisms to manage
and log accesses across users and groups
Detect unauthorizedtrafficproactively,
monitor deviationinconfigurationand
facilitate auditsof databases
Secure cloud environmentsagainstattacks
such as distributeddenial of service,prevent
threats to applicationlayerand bring-in
secure networksegmentation
Enable layeringof multiple controlsfor
securityredundancy and eliminate single
pointsecurity failure
6
Data encryption | Making PII data indecipherable
TCS Confidential
• Enforcesecurity measures that comply
with dataprivacy laws
• Prevent datafrombeing manipulated
by unauthorizedusers
• Protect databoth at rest and in transit
• File/folder encryption
• Full-disk encryption for cloud workload
storagevolumes
• Specialized encryption (database,email)
• Cloud-nativestorageencryption
• Encrypting the data before transmission;
authenticatingtheendpoints;and
decryptingand verifyingthe data on
arrival
Data at rest Data intransit
7
Data loss prevention | Prevent PII data leakage
TCS Confidential
Classify PII databased on natureof business and
regulatory standards
Implement monitoringatthe boundary of network
egress,on all internetdevices
Install a data lossprevention (DLP) agent on hosts
that process production data
Enforce security policies rules -- based on the
content and context of the data classification --
when certain types of data is accessed or leaked
8
Regulatory compliance | Establish user trust
TCS Confidential
Assessthe regulatoryrisks by identifying
the gaps inthe existingsecuritysetup
Enforce securitypoliciesto meetthe
compliance requirements
Buildauto-remediationcompliance
capabilities
Remediate the identifiedweaknessbased
on the risk assessment
9
The combined synergy of TCS Cloud Foundation Designer and
AWS Security Services
TCS Confidential
• PII data security design
patternsfor five elements of
sensitive user information
• 40% reduced efforts to build
security guardrails
• Aligned with AWS well-
architectedframework
principles
• Compliant with Center for
Internet Security (CIS) AWS
foundation benchmark
• Role-based access control to
workloads on AWS cloud
• Advanced encryption
engines
• End-to-end, AI-driven data
protection
Amazon Macie AWS IAM AWS KMS AWS Security Hub AWS Certificate
Manager (ACM)
AWS CloudHSM
AWS Secrets
Manager
AWS Shield
10
A quick recap on protecting PII data
TCS Confidential
Protectingdata onAWScloudis easier witha host of security services at
organization’s disposal
MonitoringPII data access andstorage canbe achievedusinga combination
of AWS-native security services,AI services andthird-party tools
Compliance to industry standards is paramount to continue business and
privacy assurance to customers
Building security foundations forAWScloudis supportedby an
automatedparadigm
By minimizing storage anduse of PII,enterprises cansignificantly reduce the
risk for data breaches andmisuse of data,andlower compliance costs.
Thank you
Copyright © 2021 Tata ConsultancyServices Limited
TCS Confidential
Write to us @ BusinessAndTechnologyServices.Marketing@TCS.COM
to know more about protectingPII data

More Related Content

What's hot

QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk M sharifi
 
Understanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iUnderstanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iPrecisely
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examInfosec
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI TechnologySylvain Maret
 
Going Passwordless with Microsoft
Going Passwordless with MicrosoftGoing Passwordless with Microsoft
Going Passwordless with MicrosoftFIDO Alliance
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityCentrify Corporation
 
Zero Knowledge Proofs: What they are and how they work
Zero Knowledge Proofs: What they are and how they workZero Knowledge Proofs: What they are and how they work
Zero Knowledge Proofs: What they are and how they workAll Things Open
 
CHINA PIP LAW ppt.pptx
CHINA PIP LAW ppt.pptxCHINA PIP LAW ppt.pptx
CHINA PIP LAW ppt.pptxfarewelldump
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesGreenway Health
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
Knowledge for the masses: Storytelling with ATT&CK
Knowledge for the masses: Storytelling with ATT&CKKnowledge for the masses: Storytelling with ATT&CK
Knowledge for the masses: Storytelling with ATT&CKMITRE ATT&CK
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
ISO 27001 In The Age Of Privacy
ISO 27001 In The Age Of PrivacyISO 27001 In The Age Of Privacy
ISO 27001 In The Age Of PrivacyControlCase
 
External collaboration with Azure B2B
External collaboration with Azure B2B External collaboration with Azure B2B
External collaboration with Azure B2B Sjoukje Zaal
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Imperva
 

What's hot (20)

RSA SecurID Access
RSA SecurID AccessRSA SecurID Access
RSA SecurID Access
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
Understanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iUnderstanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM i
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the exam
 
Threat Modeling Using STRIDE
Threat Modeling Using STRIDEThreat Modeling Using STRIDE
Threat Modeling Using STRIDE
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Going Passwordless with Microsoft
Going Passwordless with MicrosoftGoing Passwordless with Microsoft
Going Passwordless with Microsoft
 
Splunk-Presentation
Splunk-Presentation Splunk-Presentation
Splunk-Presentation
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
 
Zero Knowledge Proofs: What they are and how they work
Zero Knowledge Proofs: What they are and how they workZero Knowledge Proofs: What they are and how they work
Zero Knowledge Proofs: What they are and how they work
 
CHINA PIP LAW ppt.pptx
CHINA PIP LAW ppt.pptxCHINA PIP LAW ppt.pptx
CHINA PIP LAW ppt.pptx
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best Practices
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Knowledge for the masses: Storytelling with ATT&CK
Knowledge for the masses: Storytelling with ATT&CKKnowledge for the masses: Storytelling with ATT&CK
Knowledge for the masses: Storytelling with ATT&CK
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
ISO 27001 In The Age Of Privacy
ISO 27001 In The Age Of PrivacyISO 27001 In The Age Of Privacy
ISO 27001 In The Age Of Privacy
 
External collaboration with Azure B2B
External collaboration with Azure B2B External collaboration with Azure B2B
External collaboration with Azure B2B
 
Cybersecurity Essentials
Cybersecurity EssentialsCybersecurity Essentials
Cybersecurity Essentials
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense
 

Similar to Protecting Sensitive Personal Data in the Enterprise

Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...Ulf Mattsson
 
Seven steps for improving cloud security with business integration
Seven steps for improving cloud security with business integrationSeven steps for improving cloud security with business integration
Seven steps for improving cloud security with business integrationVijilan IT Security solutions
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...Ulf Mattsson
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfCiente
 
Practical advice for cloud data protection ulf mattsson - bright talk webin...
Practical advice for cloud data protection   ulf mattsson - bright talk webin...Practical advice for cloud data protection   ulf mattsson - bright talk webin...
Practical advice for cloud data protection ulf mattsson - bright talk webin...Ulf Mattsson
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...Ulf Mattsson
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxalex hincapie
 
Azure Fundamentals Part 3
Azure Fundamentals Part 3Azure Fundamentals Part 3
Azure Fundamentals Part 3CCG
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITMarketingArrowECS_CZ
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewAlert Logic
 
Rackspace: Best Practices for Security Compliance on AWS
Rackspace: Best Practices for Security Compliance on AWSRackspace: Best Practices for Security Compliance on AWS
Rackspace: Best Practices for Security Compliance on AWSAmazon Web Services
 

Similar to Protecting Sensitive Personal Data in the Enterprise (20)

Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...
 
Seven steps for improving cloud security with business integration
Seven steps for improving cloud security with business integrationSeven steps for improving cloud security with business integration
Seven steps for improving cloud security with business integration
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
Practical advice for cloud data protection ulf mattsson - bright talk webin...
Practical advice for cloud data protection   ulf mattsson - bright talk webin...Practical advice for cloud data protection   ulf mattsson - bright talk webin...
Practical advice for cloud data protection ulf mattsson - bright talk webin...
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
Azure Fundamentals Part 3
Azure Fundamentals Part 3Azure Fundamentals Part 3
Azure Fundamentals Part 3
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Will your cloud be compliant
Will your cloud be compliantWill your cloud be compliant
Will your cloud be compliant
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
CC ss.pptx
CC ss.pptxCC ss.pptx
CC ss.pptx
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
 
Biznet Gio Presentation - Database Security
Biznet Gio Presentation - Database SecurityBiznet Gio Presentation - Database Security
Biznet Gio Presentation - Database Security
 
Rackspace: Best Practices for Security Compliance on AWS
Rackspace: Best Practices for Security Compliance on AWSRackspace: Best Practices for Security Compliance on AWS
Rackspace: Best Practices for Security Compliance on AWS
 

More from Tata Consultancy Services

TCS Global Cloud Study – Continental Europe
TCS Global Cloud Study – Continental EuropeTCS Global Cloud Study – Continental Europe
TCS Global Cloud Study – Continental EuropeTata Consultancy Services
 
TCS Global Cloud Study – United Kingdom & Ireland
TCS Global Cloud Study – United Kingdom & Ireland TCS Global Cloud Study – United Kingdom & Ireland
TCS Global Cloud Study – United Kingdom & Ireland Tata Consultancy Services
 
TCS Retail Consumer Survey: US Key Findings Report
TCS Retail Consumer Survey: US Key Findings ReportTCS Retail Consumer Survey: US Key Findings Report
TCS Retail Consumer Survey: US Key Findings ReportTata Consultancy Services
 
TCS Retail Consumer Survey: UK Key Findings Report
TCS Retail Consumer Survey: UK Key Findings ReportTCS Retail Consumer Survey: UK Key Findings Report
TCS Retail Consumer Survey: UK Key Findings ReportTata Consultancy Services
 
Make risk and cybersecurity a boardroom agenda
Make risk and cybersecurity a boardroom agendaMake risk and cybersecurity a boardroom agenda
Make risk and cybersecurity a boardroom agendaTata Consultancy Services
 
Outlook for the mid-2020s - TCS 2021 Global Leadership Study
Outlook for the mid-2020s - TCS 2021 Global Leadership StudyOutlook for the mid-2020s - TCS 2021 Global Leadership Study
Outlook for the mid-2020s - TCS 2021 Global Leadership StudyTata Consultancy Services
 
TCS 2021 Global Financial Leadership Study - The Next Era in Financial Planni...
TCS 2021 Global Financial Leadership Study - The Next Era in Financial Planni...TCS 2021 Global Financial Leadership Study - The Next Era in Financial Planni...
TCS 2021 Global Financial Leadership Study - The Next Era in Financial Planni...Tata Consultancy Services
 
TCS 2021 Global Leadership Study: Key Findings Report
TCS 2021 Global Leadership Study: Key Findings ReportTCS 2021 Global Leadership Study: Key Findings Report
TCS 2021 Global Leadership Study: Key Findings ReportTata Consultancy Services
 
Leadership in the digital era: new mandates, mindsets, and mind melts
Leadership in the digital era: new mandates, mindsets, and mind meltsLeadership in the digital era: new mandates, mindsets, and mind melts
Leadership in the digital era: new mandates, mindsets, and mind meltsTata Consultancy Services
 
The digital capabilities of the most resilient retailers
The digital capabilities of the most resilient retailersThe digital capabilities of the most resilient retailers
The digital capabilities of the most resilient retailersTata Consultancy Services
 
Mastering the Post-Pandemic Logistics Revolution
Mastering the Post-Pandemic Logistics RevolutionMastering the Post-Pandemic Logistics Revolution
Mastering the Post-Pandemic Logistics RevolutionTata Consultancy Services
 
How the CFO Can be an Effective Partner to the CEO in Navigating the Pandemic...
How the CFO Can be an Effective Partner to the CEO in Navigating the Pandemic...How the CFO Can be an Effective Partner to the CEO in Navigating the Pandemic...
How the CFO Can be an Effective Partner to the CEO in Navigating the Pandemic...Tata Consultancy Services
 
Today’s Digital Imperatives Demand C-Suite Reinvention
Today’s Digital Imperatives Demand C-Suite ReinventionToday’s Digital Imperatives Demand C-Suite Reinvention
Today’s Digital Imperatives Demand C-Suite ReinventionTata Consultancy Services
 
A new CMO role: leveraging an organization’s purpose for strategic advantage
A new CMO role: leveraging an organization’s purpose for strategic advantageA new CMO role: leveraging an organization’s purpose for strategic advantage
A new CMO role: leveraging an organization’s purpose for strategic advantageTata Consultancy Services
 
Digital Readiness and the Pandemic: Assessing the Impact
Digital Readiness and the Pandemic: Assessing the ImpactDigital Readiness and the Pandemic: Assessing the Impact
Digital Readiness and the Pandemic: Assessing the ImpactTata Consultancy Services
 
Reduce cost, improve coverage, and enhance effectiveness by using UAVs/Drones...
Reduce cost, improve coverage, and enhance effectiveness by using UAVs/Drones...Reduce cost, improve coverage, and enhance effectiveness by using UAVs/Drones...
Reduce cost, improve coverage, and enhance effectiveness by using UAVs/Drones...Tata Consultancy Services
 

More from Tata Consultancy Services (20)

TCS Survey: The future of operations
TCS Survey:  The future of operationsTCS Survey:  The future of operations
TCS Survey: The future of operations
 
TCS Global Cloud Study – Key Findings
TCS Global Cloud Study – Key Findings TCS Global Cloud Study – Key Findings
TCS Global Cloud Study – Key Findings
 
TCS Global Cloud Study – North America
TCS Global Cloud Study – North AmericaTCS Global Cloud Study – North America
TCS Global Cloud Study – North America
 
TCS Global Cloud Study – Continental Europe
TCS Global Cloud Study – Continental EuropeTCS Global Cloud Study – Continental Europe
TCS Global Cloud Study – Continental Europe
 
TCS Global Cloud Study – United Kingdom & Ireland
TCS Global Cloud Study – United Kingdom & Ireland TCS Global Cloud Study – United Kingdom & Ireland
TCS Global Cloud Study – United Kingdom & Ireland
 
TCS Global Cloud Study – Asia-Pacific
TCS Global Cloud Study – Asia-Pacific TCS Global Cloud Study – Asia-Pacific
TCS Global Cloud Study – Asia-Pacific
 
TCS Retail Consumer Survey: US Key Findings Report
TCS Retail Consumer Survey: US Key Findings ReportTCS Retail Consumer Survey: US Key Findings Report
TCS Retail Consumer Survey: US Key Findings Report
 
TCS Retail Consumer Survey: UK Key Findings Report
TCS Retail Consumer Survey: UK Key Findings ReportTCS Retail Consumer Survey: UK Key Findings Report
TCS Retail Consumer Survey: UK Key Findings Report
 
Make risk and cybersecurity a boardroom agenda
Make risk and cybersecurity a boardroom agendaMake risk and cybersecurity a boardroom agenda
Make risk and cybersecurity a boardroom agenda
 
Outlook for the mid-2020s - TCS 2021 Global Leadership Study
Outlook for the mid-2020s - TCS 2021 Global Leadership StudyOutlook for the mid-2020s - TCS 2021 Global Leadership Study
Outlook for the mid-2020s - TCS 2021 Global Leadership Study
 
TCS 2021 Global Financial Leadership Study - The Next Era in Financial Planni...
TCS 2021 Global Financial Leadership Study - The Next Era in Financial Planni...TCS 2021 Global Financial Leadership Study - The Next Era in Financial Planni...
TCS 2021 Global Financial Leadership Study - The Next Era in Financial Planni...
 
TCS 2021 Global Leadership Study: Key Findings Report
TCS 2021 Global Leadership Study: Key Findings ReportTCS 2021 Global Leadership Study: Key Findings Report
TCS 2021 Global Leadership Study: Key Findings Report
 
Leadership in the digital era: new mandates, mindsets, and mind melts
Leadership in the digital era: new mandates, mindsets, and mind meltsLeadership in the digital era: new mandates, mindsets, and mind melts
Leadership in the digital era: new mandates, mindsets, and mind melts
 
The digital capabilities of the most resilient retailers
The digital capabilities of the most resilient retailersThe digital capabilities of the most resilient retailers
The digital capabilities of the most resilient retailers
 
Mastering the Post-Pandemic Logistics Revolution
Mastering the Post-Pandemic Logistics RevolutionMastering the Post-Pandemic Logistics Revolution
Mastering the Post-Pandemic Logistics Revolution
 
How the CFO Can be an Effective Partner to the CEO in Navigating the Pandemic...
How the CFO Can be an Effective Partner to the CEO in Navigating the Pandemic...How the CFO Can be an Effective Partner to the CEO in Navigating the Pandemic...
How the CFO Can be an Effective Partner to the CEO in Navigating the Pandemic...
 
Today’s Digital Imperatives Demand C-Suite Reinvention
Today’s Digital Imperatives Demand C-Suite ReinventionToday’s Digital Imperatives Demand C-Suite Reinvention
Today’s Digital Imperatives Demand C-Suite Reinvention
 
A new CMO role: leveraging an organization’s purpose for strategic advantage
A new CMO role: leveraging an organization’s purpose for strategic advantageA new CMO role: leveraging an organization’s purpose for strategic advantage
A new CMO role: leveraging an organization’s purpose for strategic advantage
 
Digital Readiness and the Pandemic: Assessing the Impact
Digital Readiness and the Pandemic: Assessing the ImpactDigital Readiness and the Pandemic: Assessing the Impact
Digital Readiness and the Pandemic: Assessing the Impact
 
Reduce cost, improve coverage, and enhance effectiveness by using UAVs/Drones...
Reduce cost, improve coverage, and enhance effectiveness by using UAVs/Drones...Reduce cost, improve coverage, and enhance effectiveness by using UAVs/Drones...
Reduce cost, improve coverage, and enhance effectiveness by using UAVs/Drones...
 

Recently uploaded

Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxAbhayThakur200703
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 

Recently uploaded (20)

Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptx
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 

Protecting Sensitive Personal Data in the Enterprise

  • 1. Protecting sensitivepersonal data in the enterprise Powered by TCSAWS business unit 24 August2021 RajiKrishnamoorthy Head, AWS Security and Compliance AWS Business Unit, TCS
  • 2. 2 Challenges in protecting PII data on cloud *Source: Cyware.com Nearly 80-90% of the data breaches involve personally identifiable information (PII); ransomwareattackswitnessed a rise of 57%.* Enterprises storing PII data on the cloud need to secure data at rest and in transit from intruders. They needto: • Set-upcomplex monitoringsystemsto identifyandthwart maliciousor unauthorizedaccess • Track complex and sensitive dataexchangesforsource, structure, quality,lineage andusage • Ensure compliance to global privacyregulations • Choose a combinationof native servicesand third-partytools to protect data
  • 3. 3 Five critical aspects for protecting PII Data classification Leveragedata classification toolsandpre-defined criteria to categorizedata Data security controls Protectdata and infrastructurewith in-builtfraud detection controls Data encryption Cipher dataatrestandinmotion makingdata unintelligibleto eavesdroppers Data loss prevention Preventdata loss,leakageor misuseof datathrough breaches,ex-filtration transmissions andunauthorized use Regulatory compliance Equip organizationsto continueoperationsandmeet obligationsdespitedisruption In a world of ever-increasing compliance andprivacyconcerns, building PII guardrails helps enterprises uphold customertrust and adhere to regulatory standards. We recommenda five-foldapproachto build guardrails forenterprise PII data.
  • 4. 4 Data classification | First step to protect PII data TCS Confidential Categorize data basedon predefined criteria to efficientlymanage and protect data Combine manual and automated techniquesto optimallyclassifydata Leverage cloud service providersto search for storage volumesand match data against pre-definedpatterns Implementthe right securitymeasures based on data sensitivityusing data classificationstools
  • 5. 5 Data security controls | Using domain and configurability TCS Confidential Applythe rightidentityand access management(IAM) mechanisms to manage and log accesses across users and groups Detect unauthorizedtrafficproactively, monitor deviationinconfigurationand facilitate auditsof databases Secure cloud environmentsagainstattacks such as distributeddenial of service,prevent threats to applicationlayerand bring-in secure networksegmentation Enable layeringof multiple controlsfor securityredundancy and eliminate single pointsecurity failure
  • 6. 6 Data encryption | Making PII data indecipherable TCS Confidential • Enforcesecurity measures that comply with dataprivacy laws • Prevent datafrombeing manipulated by unauthorizedusers • Protect databoth at rest and in transit • File/folder encryption • Full-disk encryption for cloud workload storagevolumes • Specialized encryption (database,email) • Cloud-nativestorageencryption • Encrypting the data before transmission; authenticatingtheendpoints;and decryptingand verifyingthe data on arrival Data at rest Data intransit
  • 7. 7 Data loss prevention | Prevent PII data leakage TCS Confidential Classify PII databased on natureof business and regulatory standards Implement monitoringatthe boundary of network egress,on all internetdevices Install a data lossprevention (DLP) agent on hosts that process production data Enforce security policies rules -- based on the content and context of the data classification -- when certain types of data is accessed or leaked
  • 8. 8 Regulatory compliance | Establish user trust TCS Confidential Assessthe regulatoryrisks by identifying the gaps inthe existingsecuritysetup Enforce securitypoliciesto meetthe compliance requirements Buildauto-remediationcompliance capabilities Remediate the identifiedweaknessbased on the risk assessment
  • 9. 9 The combined synergy of TCS Cloud Foundation Designer and AWS Security Services TCS Confidential • PII data security design patternsfor five elements of sensitive user information • 40% reduced efforts to build security guardrails • Aligned with AWS well- architectedframework principles • Compliant with Center for Internet Security (CIS) AWS foundation benchmark • Role-based access control to workloads on AWS cloud • Advanced encryption engines • End-to-end, AI-driven data protection Amazon Macie AWS IAM AWS KMS AWS Security Hub AWS Certificate Manager (ACM) AWS CloudHSM AWS Secrets Manager AWS Shield
  • 10. 10 A quick recap on protecting PII data TCS Confidential Protectingdata onAWScloudis easier witha host of security services at organization’s disposal MonitoringPII data access andstorage canbe achievedusinga combination of AWS-native security services,AI services andthird-party tools Compliance to industry standards is paramount to continue business and privacy assurance to customers Building security foundations forAWScloudis supportedby an automatedparadigm By minimizing storage anduse of PII,enterprises cansignificantly reduce the risk for data breaches andmisuse of data,andlower compliance costs.
  • 11. Thank you Copyright © 2021 Tata ConsultancyServices Limited TCS Confidential Write to us @ BusinessAndTechnologyServices.Marketing@TCS.COM to know more about protectingPII data