0% found this document useful (0 votes)
53 views

Data Security Posture Management in Aws With Zscaler

Dspm concept

Uploaded by

wanderer99rw
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views

Data Security Posture Management in Aws With Zscaler

Dspm concept

Uploaded by

wanderer99rw
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Zscaler Data Security Posture

Management (DSPM) for


Amazon Web Services (AWS)

© 2024 Zscaler, Inc. All rights reserved. Solution Brief


Overview: Securing Cloud Data in Amazon Web Services (AWS)

The challenges associated with securing vast loads of business data in AWS environments include
managing the complexity and scale of data protection, dealing with insider threats, third party and vendor
access, supply chain risks, and complying with data regulations. Organizations struggle to inventory,
classify, control, and protect critical data assets while securing them from various risks. The complexity
is further compounded by the multitude of fragmented data locations, roles, and permissions across
different environments. The key challenges of securing data in AWS environments are numerous and
involve several factors as below:

Targeted,
Complex environments Data volume Overprivileged access
sophisticated attacks

82% of breaches involve 175 ZB estimated data USD 4.88M - The global 80% of organizations
data stored in the cloud1 to be stored in the cloud average cost of a data have suffered identity-
by 20252 breach in 20243 related breaches4

Unfortunately, legacy data protection solutions are not designed for dynamic AWS environments. All the
while, point DSPM vendors are delivering siloed approaches that fail to integrate seamlessly into existing
data protection programs. Organizations need a new, unified approach to securing their data in the AWS
environment.

Zscaler solves these data security challenges in AWS environments with an agentless, fully integrated data
security posture management (DSPM) solution.

What Is DSPM?

“Data security posture management (DSPM) provides visibility as to where sensitive data is, who has
access to that data, how it has been used, and what the security posture of the data stored or application
is.” — Gartner

First identified by industry analyst Gartner in its 2022 Hype Cycle for Data Security, DSPM is sometimes
referred to as ‘data first’ security, inverting the protection model embraced by other cybersecurity
technologies and practices. Instead of securing the devices, systems, and applications that house, move, or
process data, DSPM focuses on protecting the data directly, while still complementing many of the other
solutions in an organization’s security technology stack.

Specifically, DSPM involves continuous monitoring, assessment, and optimization of security controls to
protect sensitive data across multicloud platforms. By automating the identification of sensitive data as
well as any potential vulnerabilities, configuration errors, or compliance violations, DSPM ensures that
organizations can proactively address the risk of data exposure. In doing so, DSPM helps them strengthen
their overall data security posture, minimize the risk of data breaches, and meet regulatory compliance
requirements.

1. https://www.informationweek.com/cyber-resilience/data-breaches-just-keep-piling-up
2. https://www.forbes.com/sites/tomcoughlin/2018/11/27/175-zettabytes-by-2025/
3. https://www.ibm.com/reports/data-breach
4. https://www.darkreading.com/cybersecurity-operations/identity-related-breaches-last-12-months

©2024 Zscaler, Inc. All rights reserved. SOLUTION BRIEF 02


Why DSPM?

The main focus of DSPM tools is to evaluate and handle the security status of an organization’s data
environment by finding weaknesses, monitoring security settings, and identifying potential threats
to sensitive data. DSPM goes beyond policy alone to look at the actual data itself. By scanning and
categorizing data, it helps organizations fully understand where sensitive data is located and how it is being
used. It also helps prioritize identified issues and prevents overwhelming alerts that could lead to such
issues being overlooked.

Practical DSPM use cases include:

• Discover, classify, and inventory sensitive data, including shadow data

• Analyze hidden risks such as misconfiguration, excessive permissions, vulnerabilities, etc.

• Prioritize risk based on severity and easily fix issues with context-based guided remediation and easy
integration with existing security ecosystem

Meet Zscaler Data Security Posture Management (DSPM)

Zscaler AI Data Protection is the world’s most comprehensive, fully integrated data protection platform.
It secures both structured and unstructured data across web, SaaS-based services, public cloud
environments (AWS, Azure, GCP), private applications, email, and endpoints.

Secure Public Cloud


Data & Posture

Secure SaaS Secure Data on


Platforms & Posture Private Apps
Public

Email Private
Data
Protect Data at Automate
SaaS Web
Rest with CASB Incident Workflows

AI-Powered Discovery Zero Trust Contextual Visibility


Exchange

Secure Inline
Web & Email

Secure Endpoint Data Secure Data on BYOD &


Unmanaged assets
Unmanaged

©2024 Zscaler, Inc. All rights reserved. SOLUTION BRIEF 03


As part of the Zscaler platform, Zscaler Data Security Posture Management (DSPM) extends robust,
best-in-class security for your data into the AWS environment. It provides granular visibility into sensitive
data, classifies and identifies data and access, and contextualizes data exposure and security posture,
empowering organizations and security teams to prevent and remediate data breaches at scale.

Zscaler Data Security Posture Management

Map data stores Understand risks Policies and insights


Storage buckets Discover Sensitive Data Actionable Insights
Virtual Machines Entitlements to sensitive data Correlate Events
Databases Misconfigurations & Prioritize Risks
vulnerabilities
Data Access patterns
AWS

AWS 1 Discover Services 2 Map & Track Risk 3 Remediate Risk

Zscaler DSPM
AWS

Define DLP once

Zscaler DLP

Integrated DLP to secure structured & unstructured data in public cloud

It uses a single and unified DLP engine to deliver consistent data protection across all channels. By
following all users across all locations, and governing data in-use and at-rest, it ensures sensitive data is
seamlessly protected and compliance is achieved.

Zscaler DSPM Core Capabilities

Data Discovery, Classification, and Inventory


Traditional scanning methods are expensive and require efforts to yield the desired results. Zscaler DSPM,
with minimal access to resources in AWS environments, scans data stores, discovers sensitive data, and
accurately classifies data. It offers:

• Comprehensive data discovery: DSPM constantly monitors AWS environments to automatically discover
new datastores as they are instantiated in ever-changing data environments to save time and eliminate
data blind spots.

• Precise data classification: DSPM uses AI, ML, predefined DLP engines, and dictionaries for data
classification. It offers visibility into what type of sensitive data is stored in AWS data stores, the region,
the files containing sensitive data, the severity of risk associated with the sensitive data, etc. It also offers
flexibility to organizations to create or replicate the existing policies that are available.

©2024 Zscaler, Inc. All rights reserved. SOLUTION BRIEF 04


• Accurate data inventory: DSPM also creates an accurate map and inventory of data assets, helping
security teams locate sensitive data and understand who has access to it and how it is being used.

DSPM provides security teams with greater visibility into data within the AWS infrastructure. This then
makes it far easier to manage and improve the data security posture of AWS’ environment, which
encompasses complex layers of SaaS, PaaS, IaaS, and databases.

Map and Track Data Exposures

AWS services and configurations change frequently that might lead to data exposure. It is essential to fix
these security gaps before bad actors can exploit them. DSPM detects publicly exposed resources along
with the vulnerabilities or misconfigurations in the different components (network security group, load
balancer, virtual network, etc.) that are associated with the data resource. Zscaler helps with:

• Exposure analysis: DSPM determines public exposure, misconfigurations, and vulnerabilities for data
stores and services.

• Risk assessment: DSPM aggregates the overall risk level by combining the impact and likelihood.
This Involves categorizing risks into critical, high, medium, or low levels.

• Risk prioritization: DSPM helps security teams filter out the noise and prioritize incidents based on risk
and severity.

• Advanced threat correlation: DSPM leverages advanced threat correlation, threats, risk, and hidden
attack path to minimize risk.

• Adaptive access intelligence: DSPM provides a granular, risk-based, user-centric view of all access
paths to mission-critical data and configurations.

Risk Remediation

DSPM streamlines risk management with context-based guided remediation, enabling security teams to
easily fix issues and violations at the source, preventing future disruptions. Capabilities include:

• Effective investigation and response: DSPM helps security teams quickly understand potential root
causes during investigations of data security events.

• In-depth guided remediation: DSPM helps cross-functional teams with automated workflows and
step-by-step guidance with complete context to address data security risk and remediate effectively.

• Faster time-to-security: DSPM allows to configure custom real-time alerts to keep pace with rapid
change to data and its environment, speeding up investigation and response.

• Seamless integration: Easily integrate with the existing ITSM, SIEM, or chatops tools and platforms for
alerts, remediation, guidance, and workflows.

• MITRE Att&ck mapping: Strengthen data security by aligning defenses with known adversary tactics
and techniques.

©2024 Zscaler, Inc. All rights reserved. SOLUTION BRIEF 05


Experience Zscaler DSPM

Request a Demo Download the DSPM Buyer’s Guide


See Zscaler DSPM in action with a Learn about the top 5 requirements
guided demo. to consider while selecting the right
DSPM for your organization.

Request a demo Download now

For more information, visit zscaler.com/dp/dspm

About Zscaler © 2024 Zscaler, Inc. All rights reserved. Zscaler™,


Zero Trust Exchange™, Zscaler Internet Access™,
Zscaler (NASDAQ: ZS) accelerates digital transformation so that customers can be more agile, efficient, resilient, ZIA™, Zscaler Private Access™, ZPA™ and
and secure. The Zscaler Zero Trust Exchange protects thousands of customers from cyberattacks and data loss other trademarks listed at zscaler.com/legal/
trademarks are either (i) registered trademarks or
by securely connecting users, devices, and applications in any location. Distributed across more than 150 data service marks or (ii) trademarks or service marks
centers globally, the SSE-based Zero Trust Exchange is the world’s largest inline cloud security platform. of Zscaler, Inc. in the United States and/or other
countries. Any other trademarks are the properties
Learn more at zscaler.com or follow us on Twitter @zscaler.
of their respective owners.

+1 408.533.0288 Zscaler, Inc. (HQ) • 120 Holger Way • San Jose, CA 95134 zscaler.com

You might also like