Home Data Engineering Data Media Cloud Native Data Security As Code

Cloud Native Data Security As Code

Audio version of the article

Summary

One of the most challenging aspects of building a data platform has nothing to do with pipelines and transformations. If you are putting your workflows into production, then you need to consider how you are going to implement data security, including access controls and auditing. Different databases and storage systems all have their own method of restricting access, and they are not all compatible with each other. In order to simplify the process of securing your data in the Cloud Manav Mital created Cyral to provide a way of enforcing security as code. In this episode he explains how the system is architected, how it can help you enforce compliance, and what is involved in getting it integrated with your existing systems. This was a good conversation about an aspect of data management that is too often left as an afterthought.

Interview

  • Introduction
  • How did you get involved in the area of data management?
  • What is Cyral and what motivated you to build a business focused on addressing data security in the cloud?
  • Can you start by giving an overview of some of the common security issues that occur when working with data?
    • What new security challenges are introduced by building data platforms in public cloud environments?
  • What are the organizational roles that are typically responsible for managing security and access control to data sources and repositories?
    • What are the tensions, technical or organizational, that lead to a problematic or incomplete security posture?
  • What are the differences in security requirements and implementation complexity between software applications and data systems?
  • What are the data systems that Cyral integrates with?
    • How did you determine what platforms to prioritize?
  • How does Cyral integrate into the toolchains used to deploy, maintain, and upgrade an organization’s data infrastructure?
  • How does the Cyral platform address security and access control of data across an organization’s infrastructure?
  • How are schema changes handled when using Cyral to enforce access control to PII or other attributes?
  • How does Cyral help with reducing sprawl of data across unmonitored systems?
  • What are some of the most interesting, unexpected, or challenging lessons that you learned while building Cyral?
  • When is Cyral the wrong choice?
  • What do you have planned for the future of the Cyral platform?

This article has been published from a wire agency feed without modifications to the text. Only the headline has been changed.

Source link

- Advertisment -

Most Popular

- Advertisment -