Data at Rest Managed Services

Even technology savvy companies can be caught off guard at the sheer volume of unaccounted data in their network. Organisations need to not only have their data accessible whilst being effectively secured, they also need to understand what data they are currently storing within At rest platforms such as Sharepoint farms, NAS or SAN environments and Application stacks. Whether structured or un-structured data; their is a high risk that you have toxic combinations of sensitive data within these volumes that may not currently be effectively secured.

CyberOrchard uses a number of technology solutions, paired to highly experienced people and tried and tested methods in order to resources and create processes to rapidly improve your organisations’s Data at Rest risk register.

We work closely with our clients’ own team to help understand the current gaps that exist and how best our team can fill those and extend functionality to rapidly respond to your key risk indicators and craft a programme that achieves your goals in a time-sensitive manner. [/text-with-icon].

Policy Standards and Procedures

When creating a Data At Rest Programme one of the most important elements is to go into the project understanding what data elements the programme is designed to discover, how this is currently classified and where you are expecting to find this information. These questions however are always designed to be headings as invariably we will find this data in many locations you didn’t expect and also other forms of data that you had no idea was going to trigger against rules of sensitivity.

When designing the DAR service it is important to know how the system and process will feed both from your existing data security operations and back in to formalised business processes. Working closely for example with Identity Access Management (IAM) teams to look at how users are provisioned access to data storage and where the majority of these pools are located, working with applications teams to understand where structured data is held, what access model these systems conform to and who is responsible for the data. CyberOrchard takes all of these aspects into account when creating a programme for your enterprise and will design the process around your existing business, adding policies and process to help supplement where you have any gaps.

We have pre-defined Target Operating models that can be adapted to your environment, policies for source target data, scanning policies creation both at a basic and advanced level, access control models for results distribution, remediation strategies defined and ready to deploy.

.

Role-Based Access Control

Rolebased groups mirroring business functions with different geographic territories. This enables the reporting team to create specific but common reports and dashboards for all users and these then against the specific access permissions for the user logged in against the specific access permissions for the user logged in against their business function.

 

 

Ownership Identification

Hundreds of thousands of documents with inaccurate owners can be frustrating to deal with. CyberOrchard uses Symantec DLP platform, an invaluable for cataloging your
data stores for owners and consumers but also enables dynamic results distribution, saving hundreds of hours of manual work.

.

Consequential Remediation Controls

With the results published to management, these issues are now a record within your organisation. The important piece of this is not that you now have a new problem to deal with, but that the challenge has been highlighted and that you have an effective plan to deal with the challenge. Get to grip with our pre-defined processes and templates to allow you to quickly and effectively tune and implement these to match your existing security strategies. Again if these are areas that you currently don’t have policies for; then allow us to deliver these for you.

Once you have identified content at risk it is important to have remediation plans you can execute in order to get control of this sensitive data.

We have developed a number of dynamic playbooks which allow you to either encrypt large volumes of stored content, or archive data; at the same time tagging the content for classification levels and marking it for records retention. When dealing with all data security standards cataloging the data is the first step, followed by being able to dynamically remediate the content dramatically reduces the risk window and also the amount of effort required by in-house staff to have to deal with the volume of data scanned and violations recorded. 

.

Records Retention

With more scrutiny coming into effect regarding records storage and with the new GDPR regulations already in effect and fines coming into effect as of May 2018 there are now significant drivers to get to grips with the pool of data you have stored and look at an effective retentions programme. Under GDPR customers have a “right to be forgotten” which will see businesses having to erase all records pertaining to that individual customer that is not governed by an existing contract. Ask yourself, how long would it take you to clear all data on an individual if it were demanded of you?

Data Security is all about making sensible decisions to restrict the information at risk, if you don’t have a requirement to store the pool of data then the simplest model is to remove this information and remove any risk from it being compromised. Marking records with appropriate removal points is key to ensuring a compliant state within your data management. 

.

Dashboards and Reporting

CyberOrchard’s platform enables dynamic dashboard to be created to help effectively communicate results to business stakeholders and onwards within your user community.

These reporting templates can be adapted to fit into your existing reporting standards, or if you currently have a gap we can help create reporting templates from scratch for multiple level reporting. These will be critical from Tier3  highly detailed analysis back all the way to Tier1 management summary data, and ensuring the data is clearly represented to allow all invested parties track the progress of risk reduction.

.

Remediation Support

CyberOrchard provides teams of analysts that deliver effective, friendly, helpful liaison between your users and the technical teams to provide support of your data rest initiative. Our team deliver advice on the best ways to achieve remediation, how to run user education training, and communicate effectively with your user base. Creation of specific instructions to individual users, distribution of results for your business functions and a concierge team that can either take the whole project of communications and support on, or can help supplement where you have less resources available for working on discovered results.

.

Huge rise in hack attacks as cyber-criminals target small businesses. Experts say consequences for SMEs that ignore security risks can be disastrous

- The Guardian

Estimates that cyber crime costs the UK economy a significant £27 billion a year. Cyber crime eating away at potential for small businesses

- Federation of Small Businesses

In 2014, 60% of small businesses experienced a cyber breach. The average cost of the worst breach was £65,000-£115,000.

- HM Government