1
The New Framework for Modern Data Privacy and Security
2
Agenda
Dealing with data security at scale
A new framework: Discover, Classify, Segment, Enforce
How Cyral can help
Q&A
Online Retail App Example
Introductions
3
4
Introductions
Nishant Bhajaria
Head of Technical Privacy, Engineering & Architecture
Uber
Srini Vadlamani
Chief Technology Officer, Co-Founder
Cyral
The Data Cloud Security Challenge
5
6
Digital Growth Initiatives are Driving Adoption of the Data Cloud
Continuous Development
• Quickly deliver new experiences
• Exponential increase in data
Data Democratization
• Become a data driven business
• IT not the single gateway to data
Infrastructure as Code
• Platform interoperability
• Heterogenous data services
7
Data is growing at an unprecedented rate
8
Personalization leads to massive incremental increase in data
Transactions
Web Behavior
Mobile Activity
Email Behavior
Social Behavior
Preferences
Demographics
1% User Growth
DataVolume
2-3X Data Growth
9
Data is now everywhere
10
Data is now everywhere
I don’t know where my data is
Am I collecting the same data
many times over?
Am I collecting the wrong data?
3rd party data sharing
How do legal and product
teams work together?
How/when to leverage AI/ML
and automation?
What is one to do?
11
12
Managing data security and privacy at scale
DISCOVER
CLASSIFY
SEGMENT
ENFORCE
13
Step 1: Discover
1 Tribal knowledge-based AI/ML based2
• Lack of a priori models
• Training datasets hard to find
• Tribal knowledge to get started
LESSONS LEARNED
• Co-opt both data platform and data science teams
Backend
Team
Frontend
Team
14
Step 2: Classify
Classify Minimize
Collect
Analyze
LESSONS LEARNED
• Use differential controls for sensitive data (e.g. location data)
• Calibrate data collection
• Is it the right amount?
• Is it the right quality?
• Get backend / frontend teams to collaborate
15
Step 3: Segment
Policy as Code Engine
LESSONS LEARNED
• Decouple application code from policy engine
• Policy as Code simplifies collaboration, versioning
• Compliance / privacy teams own policies
• Dictate data collection, storage, retention,
access
16
Step 4: Enforce
LESSONS LEARNED
• Find a happy medium between complete lockdown and the wild west
• Build classification/tagging first before enforcing using AI
• Rotate / revoke / recertify encryption keys
periodically
• Time box sensitive data access
• Anonymize / aggregate for analytics teams
Applying the Framework
17
18
Online Retail App Example
Compliance Needs
• Retention capped to order lifetime
• Access limited to order fulfillment
Business Analysis Needs
• Buying patterns
• Seasonality
• App vs Website traffic
19
Online Retail App Example
How Cyral can help
20
21
Managing data security and privacy at scale
DISCOVER
CLASSIFY
SEGMENT
ENFORCE
22
Technology: Stateless Interception for Data Endpoint Requests
Sidecars Deployed locally
• Stateless interception of data requests
• All data and logs remain private
• Deployed by DevOps, no change to apps
STRUCTURED AND SEMI-STRUCTURED DATA STORES
TOOLS, USERS, APPS, SERVICES
SaaS Control Plane
Observe Protect
Control
23
Security as Code Model
1
Deployment as Code
Use existing workflows
• DevOps deployment
• Infra-as-Code model
3
Policies as Code
Use existing source code tools
• CI/CD integration
• ChatOps model
2
Automated observability
Use existing dashboards
• API-first architecture
• No learning curve
• The four-pillar framework to build trust and reduce risk
• Discover: Identify where all your sensitive data is
• Classify: Calibrate, analyze and minimize data being collected
• Segment: Identify rules of access by co-opting compliance, product and business teams
• Enforce: Control access using time-boxing, data anonymization and key rotation
• Remember to
• Exhaust tribal knowledge before starting with AI/ML and automation
• Decouple writing and enforcing of security policies
• Find a happy medium between complete lockdown and the wild west
24
Summary & Key Takeaways
Q&A
25
26
Q&A
Nishant Bhajaria
Head of Technical Privacy, Engineering & Architecture
Uber
Srini Vadlamani
Chief Technology Officer, Co-Founder
Cyral

The New Framework for Modern Data Privacy and Security

  • 1.
    1 The New Frameworkfor Modern Data Privacy and Security
  • 2.
    2 Agenda Dealing with datasecurity at scale A new framework: Discover, Classify, Segment, Enforce How Cyral can help Q&A Online Retail App Example
  • 3.
  • 4.
    4 Introductions Nishant Bhajaria Head ofTechnical Privacy, Engineering & Architecture Uber Srini Vadlamani Chief Technology Officer, Co-Founder Cyral
  • 5.
    The Data CloudSecurity Challenge 5
  • 6.
    6 Digital Growth Initiativesare Driving Adoption of the Data Cloud Continuous Development • Quickly deliver new experiences • Exponential increase in data Data Democratization • Become a data driven business • IT not the single gateway to data Infrastructure as Code • Platform interoperability • Heterogenous data services
  • 7.
    7 Data is growingat an unprecedented rate
  • 8.
    8 Personalization leads tomassive incremental increase in data Transactions Web Behavior Mobile Activity Email Behavior Social Behavior Preferences Demographics 1% User Growth DataVolume 2-3X Data Growth
  • 9.
    9 Data is noweverywhere
  • 10.
    10 Data is noweverywhere I don’t know where my data is Am I collecting the same data many times over? Am I collecting the wrong data? 3rd party data sharing How do legal and product teams work together? How/when to leverage AI/ML and automation?
  • 11.
    What is oneto do? 11
  • 12.
    12 Managing data securityand privacy at scale DISCOVER CLASSIFY SEGMENT ENFORCE
  • 13.
    13 Step 1: Discover 1Tribal knowledge-based AI/ML based2 • Lack of a priori models • Training datasets hard to find • Tribal knowledge to get started LESSONS LEARNED • Co-opt both data platform and data science teams
  • 14.
    Backend Team Frontend Team 14 Step 2: Classify ClassifyMinimize Collect Analyze LESSONS LEARNED • Use differential controls for sensitive data (e.g. location data) • Calibrate data collection • Is it the right amount? • Is it the right quality? • Get backend / frontend teams to collaborate
  • 15.
    15 Step 3: Segment Policyas Code Engine LESSONS LEARNED • Decouple application code from policy engine • Policy as Code simplifies collaboration, versioning • Compliance / privacy teams own policies • Dictate data collection, storage, retention, access
  • 16.
    16 Step 4: Enforce LESSONSLEARNED • Find a happy medium between complete lockdown and the wild west • Build classification/tagging first before enforcing using AI • Rotate / revoke / recertify encryption keys periodically • Time box sensitive data access • Anonymize / aggregate for analytics teams
  • 17.
  • 18.
    18 Online Retail AppExample Compliance Needs • Retention capped to order lifetime • Access limited to order fulfillment Business Analysis Needs • Buying patterns • Seasonality • App vs Website traffic
  • 19.
  • 20.
  • 21.
    21 Managing data securityand privacy at scale DISCOVER CLASSIFY SEGMENT ENFORCE
  • 22.
    22 Technology: Stateless Interceptionfor Data Endpoint Requests Sidecars Deployed locally • Stateless interception of data requests • All data and logs remain private • Deployed by DevOps, no change to apps STRUCTURED AND SEMI-STRUCTURED DATA STORES TOOLS, USERS, APPS, SERVICES SaaS Control Plane Observe Protect Control
  • 23.
    23 Security as CodeModel 1 Deployment as Code Use existing workflows • DevOps deployment • Infra-as-Code model 3 Policies as Code Use existing source code tools • CI/CD integration • ChatOps model 2 Automated observability Use existing dashboards • API-first architecture • No learning curve
  • 24.
    • The four-pillarframework to build trust and reduce risk • Discover: Identify where all your sensitive data is • Classify: Calibrate, analyze and minimize data being collected • Segment: Identify rules of access by co-opting compliance, product and business teams • Enforce: Control access using time-boxing, data anonymization and key rotation • Remember to • Exhaust tribal knowledge before starting with AI/ML and automation • Decouple writing and enforcing of security policies • Find a happy medium between complete lockdown and the wild west 24 Summary & Key Takeaways
  • 25.
  • 26.
    26 Q&A Nishant Bhajaria Head ofTechnical Privacy, Engineering & Architecture Uber Srini Vadlamani Chief Technology Officer, Co-Founder Cyral