What your Data Warehouse is?
Some questions to ponder across three key areas of focus for data warehouse security.
-
As data moves into the warehouse, how can you ensure integrity?
-
Is a data classification policy in place? How is it applied to data entering the data warehouse?
-
Does this data need to live in the data warehouse at this level (or aggregated)?
-
Is data exported from the warehouse to other applications, for example for reporting? If so, how is the data secured?
-
How do you know that only authorized recipients are able to obtain the output?
-
How do you know the right recipients receive the right information – and nothing more?
-
Have user access rights been determined and documented?
-
Are they based on roles, for example through Active Directory groups?
-
Are administrator and super-user accounts carefully controlled and audited?
-
Is the supporting database appropriately configured and hardened for maximum security?
-
Is access to data restricted according to its sensitivity?
-
Do you sufficiently monitor and audit the data warehouse?
This Article Was Written & published by Meena R, Senior Manager - IT, at Luminis Consulting Services Pvt. Ltd, India.
Over the past 16 years, Meena has built a following of IT professionals, particularly in Cybersecurity, Cisco Technologies, and Networking...
She is so obsessed with Cybersecurity domain that she is going out of her way and sharing hugely valuable posts and writings about Cybersecurity on website, and social media platforms.
34,000+ professionals are following her on Facebook and mesmerized by the quality of content of her posts on Facebook.
If you haven't yet been touched by her enthusiastic work of sharing quality info about Cybersecurity, then you can follow her on Facebook:
Click Here to follow her: Cybersecurity PRISM