How operational models help with data security

Introduction to Data Security

Angeline Corvaglia

Founder & Digital Transformation Specialist

What are operational models?

  icon representing operational models

Address specific security challenges or protect particular types of data

  • Prevent cyberattacks
  • Mitigate human errors compromising data
  • Reduce unintentional data loss
  • Processes and rules defined internally by an organization
  • Flexible based on unique needs and risk profiles
Introduction to Data Security

Five popular operational models

 

  • Zero Trust Architecture (ZTA)
  • Separation of Duties (SoD)
  • Principle of Least Privilege (PoLP)
  • Data Loss Prevention (DLP)
  • Role-Based Control (RBC)

icon representing operational models

Introduction to Data Security

Zero Trust Architecture (ZTA)

icon representing ZTA

  • Never trust, always verify
  • All systems and users are untrustworthy until proven otherwise
Introduction to Data Security

Separation of Duties (SoD)

 icon representing SoD

  • Divides tasks and privileges among users
  • Prevent one person from controlling a critical process
  • Checks-and-balances system
Introduction to Data Security

Principle of Least Privilege (PoLP)

  icon representing PoLP

  • Restricts user access to what's necessary for their job functions
  • Information access only for those who need it
Introduction to Data Security

Data Loss Prevention (DLP)

  icon representing DLP

  • Protect sensitive information from unauthorized access, sharing, or theft
  • Monitoring, detection, and blocking mechanisms
Introduction to Data Security

Role-Based Control (RBC)

  icon representing RBC

  • Assigns access permissions based on job roles
  • Streamlines access management
Introduction to Data Security

Aim to fortify organizations

Operational models are defined internally by organizations, address specific security challenges and protect certain types of data

icon representing the goal of operational models to fortify organizations

The key to choosing the best operational model is identifying the most effective for specific needs and risks unique to each organization

Introduction to Data Security

AI has also affected the landscape

 icon role of AI in augmenting operational models

AI-powered tools can ensure operational models are practical and efficient, such as:

  • Risk assessment
  • Policy enforcement
  • Anomaly detection
Introduction to Data Security

Company leadership and culture

  To be effective, operational models must be a part of the company culture  

icon company leadership as data defenders

Introduction to Data Security

Let's practice!

Introduction to Data Security

Preparing Video For Download...